Empower Your Cipher-Solving Journey

Free tools to help you solve cryptograms, CTFs, ciphers, logic puzzles and room escape games - all in one place.

Conquer Cryptograms & Beyond

Whether you are a beginner or seasoned puzzle solver, Boxentriq is for you. Learn about classic ciphers and analysis methods. Try solving Boxentriq's own puzzles, or why not solve the legendary Cicada 3301 puzzle.

Why not begin your puzzling journey by trying to solve this cryptogram? :)

Fnwxsvn js b fslwe st xbpjqgbjqur xibwwnurnk, finln ngnlc phaawn qk b tlnki sppsljhuqjc js wnblu, rlsf, bue ibgn thu bwsur jin fbc.

πŸ› οΈ Cipher identifier

This tool uses AI/Machine Learning technology to analyze your input and detect common cipher types including: Caesar Cipher, Vigenère Cipher, Playfair Cipher, Columnar Transposition Cipher and many more!

Try cipher identifier

πŸ“œ Cipher solvers

These tools will help you solve classic cryptograms of various cipher types either automatically or assist you in solving them manually. Some examples:

Try substitution cipher solver Try Vigenère cipher solver

πŸ”’ Letters to numbers converter

This translation tool will help you easily convert between letters and numbers in various formats such as A1Z26, ASCII codes and tap codes.

Try letters to numbers Try numbers to letters

See complete list of tools below, or check the alphabetical list of Boxentriq's tools.

Classic Ciphers

In cryptography, a cipher (or cypher) is a method for protecting data through encryption and decryption. Most ciphers require a specific key for encryption and decryption, but some ciphers like the ROT13 or Atbash ciphers have fixed keys. Many of the ciphers listed here were for military or other significant use during an earlier time, but today mostly are used only by puzzle makers.

πŸ”— Adfgvx cipher
πŸ”— Adfgx cipher
πŸ”— Affine cipher
πŸ”— Atbash cipher
πŸ”— Bifid cipher
πŸ”— Caesar cipher
πŸ”— Cryptogram
πŸ”— One-time pad
πŸ”— Pigpen cipher
πŸ”— Rot13
πŸ”— Trifid cipher

Text and Word Tools

Wordplay and witty texts is one of the oldest forms of puzzles. Anagrams have been traced to the time of the Ancient Greeks, and they still are popular in modern brain teasers. Synonyms are common not only in crosswords, but plays a role in a wider range of puzzles. This section also contains text processing tools, which are useful for reversing, changing case, etc of texts.

πŸ”— Convert case
πŸ”— Remove spaces
πŸ”— Reverse text
πŸ”— Synonyms

Analysis Tools

These tools will help you identify the types of encodings and ciphers used.

πŸ”— Hex analysis
πŸ”— Text analysis

Modern Ciphers

Modern encryption methods can be divided by the key type and their operation on input data. Symmetric key algorithms use the same key for encryption and decryption (private key cryptography). Asymmetric key algorithms use different keys for encryption and decryption (public key cryptography). With symmetric keys, the sender and receiver must have agreed upon a key in advance, while with asymmetric keys anyone can send messages to the receiver. Also depending on their operation, ciphers are either block ciphers (encrypting a fixed block size) or stream ciphers (encrypting a continuous stream of data).

πŸ”— Aes
πŸ”— Des
πŸ”— Rc4
πŸ”— Rsa

Steganography

While encryption protects information from being understood, an even higher protection would be if the information is hidden. The word steganography comes from the Greek word "steganos", meaning concealed, and "graphein", meaning writing. Modern steganography can hide information in images and audio files. Also information can be manually hidden in images through the use of very low contrast colors or metadata.

πŸ”— Exif
πŸ”— Openpuff
πŸ”— Outguess
πŸ”— Spectrograms
πŸ”— Steghide
πŸ”— Stereograms

Encodings

Computers and digital devices need to represent letters in appropriate ways. ASCII codes are very common for storing texts, but with the demand to support more non-English texts, the popularity of Unicode is increasing. Hashes are not encodings, but since they are more or less unique for all words, they can be considered like encodings (although much more difficult to reverse).

πŸ”— A1z26
πŸ”— Ascii table
πŸ”— Barcode
πŸ”— Baudot code
πŸ”— Book cipher
πŸ”— Geek code
πŸ”— Qr codes
πŸ”— Tap code
πŸ”— Unicode
πŸ”— Utf-8 decoder
πŸ”— Utf-8 encoder

Math

Mathematics play an important role in logic puzzles and code-breaking. It is important to be able to convert between different number systems, and detect special properties of numbers such as that they are prime numbers. Also number sequences, like the Fibonacci sequence, are commonly used in puzzles.


Alphabets

Every alphabet has a number of symbols that are the building blocks of the specific language. In addition to traditional written languages, alphabets have evolved for telegraphy (Morse code), visually impaired people (Braille) and maritime signal flags. Further alphabets have evolved in popular culture, such as the Klingon alphabet (from Star Trek) or dancing men code (from Sherlock Holmes).

πŸ”— Braille
πŸ”— Elder futhark
πŸ”— Hexahue
πŸ”— Morse code

Other

Are you ready to take the "red pill" and go even further down the "rabbit hole"? Then this section is for you.


You can't rely on tools only

Although tools can be helpful, there's a saying: "A fool with a tool is still only a fool". Good quality code-breaking puzzles can't be solved simply by using tools. It's your wits and creativity that matter, and the tools are just there to help explore your ideas.