Multi Decoder
This tool is designed to solve a wide variety of codes and ciphers (currently 255 supported variations). To use this tool, enter the encrypted text in the box below along with any other relevant data (keywords, alphabets, numbers, etc) and it will attempt to solve it for you. See the FAQ below for more details.
Result: ABCDEFGHIJKLMNOPQRSTUVWXYZ
This multi decoder is designed to support a large number of codes and ciphers. Not all codes and ciphers have keywords, alphabets, numbers, letter translation, etc so if the code or cipher doesn't require it, those fields
will be ignored. If one does require something, the text of that box will be updated to tell you what it is missing in order to decode.
Typically you would put any keywords in the first Key/Alphabet box and any
custom alphabets in the next one. If all you have are keywords or alphabets, try rotating the order just in case the cipher was coded with them switched.
If you find any tools that aren't working quite right,
please reach out to me. It would be helpful if you provided as much information as you can and an example of how it should be.
Caesar Cipher - Automatic Solver
Caesar Cipher - Rot 5
Caesar Rot 5: Just numbers are rotated (ie: 5 => 0, 3 => 8).Caesar Cipher - Rot 18
Caesar Rot 18: Both numbers and letters are rotated by 5 and 13 respectively.Caesar Cipher - Rot 47
Caesar Rot 47: All ASCII characters are rotated.Caesar Cipher - Rot 123 (Forward)
Caesar Rot 123 (Forward): This special version of the Rot Cipher takes a set of characters and rotates them each forward in incremental order.Caesar Cipher - Rot 123 (Reverse)
Caesar Rot 123 (Forward): This special version of the Rot Cipher takes a set of characters and rotates them each in decremental order.Vigenère Automatic Solver
Vigenère
Vigenère: This is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword.Autokey
Autokey: This version starts with a relatively-short keyword and appends the message to it. For example if the keyword is "QUEEN" and the message is "ATTACK AT DAWN", the key would be "QUEENATTACKATDAWN".The standard Bacon code typically uses A's and B's or 0's and 1's (both are supported by default). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters for Standard Bacon, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions.
Standard A/B (Distinct)
Standard A/B (Distinct - Inverted)
Standard A/B (I = J and U = V)
Standard A/B (I = J and U = V - Inverted)
Odd / Even (Distinct)
This determines if the bacon was enciphered as odd/even letters or numbers.Odd / Even (Distinct - Inverted)
Odd / Even (I = J and U = V)
Odd / Even (I = J and U = V - Inverted)
Case Sensitive (Distinct)
Case Sensitive (Distinct - Inverted)
Case Sensitive (I = J and U = V)
Case Sensitive (I = J and U = V - Inverted)
Alphabet Halves A-M & N-Z (Distinct)
Alphabet Halves A-M & N-Z (Distinct - Inverted)
Alphabet Halves A-M & N-Z (I = J and U = V)
Alphabet Halves A-M & N-Z (I = J and U = V - Inverted)
Prime Number / Letter (Distinct)
This determines if the bacon was enciphered as a prime number from 0 - 9 or if a letter falls on a prime number. Example: B = 2, C = 3, G = 7, etc.Prime Number / Letter (Distinct - Inverted)
Prime Number / Letter (I = J and U = V)
Prime Number / Letter (I = J and U = V - Inverted)
Vowels (Distinct)
This determines if the bacon was enciphered by vowels versus consonants.Vowels (Distinct - Inverted)
Vowels (I = J and U = V)
Vowels (I = J and U = V - Inverted)
Enclosed Letters / Numbers (Distinct)
This determines if the bacon was enciphered by enclosed letters or numbers. Example: A = 0, B = 0, C = 1, D = 0, etc.Enclosed Letters / Numbers (Distinct - Inverted)
Enclosed Letters / Numbers (I = J and U = V)
Enclosed Letters / Numbers (I = J and U = V - Inverted)
Morse code typically uses dots (.) and dashes (-). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions. If you have a custom separator between words (besides a space, /, \, or |), enter this in the Key/Alphabet #3 position. If you only have dots and dashes with NO separators, try using the UnMorse tool.
Morse - Normal
Morse - Reverse
Morse - Swapped
Morse - Swapped Reverse
Guess Mode: This attempts to try all 6 different patterns that could exist in this code.
Guess Mode 1
Guess Mode 2
Guess Mode 3
Guess Mode 4
Guess Mode 5
Guess Mode 6
The Abaddon code consists of three characters ¥, µ, and þ. However if your code only consists of 3 characters, it could still be this code if it is obfuscated. To customize the three characters, enter the first one in Key/Alphabet #1, second one in Key/Alphabet #2 position, and third one in the Key/Alphabet #3 position. You might also try rearranging the order of your custom letters just in case.
Abaddon Code
Guess Mode: This attempts to try all 6 different patterns that could exist in this code.
Guess Mode 1
Guess Mode 2
Guess Mode 3
Guess Mode 4
Guess Mode 5
Guess Mode 6
ADFGX
ADFGX: Enter the keyword under Key/Alphabet #1. The default 25-character alphabet has J swapped for I. If you have a custom alphabet, enter this under Key/Alphabet #2. To customize this alphabet, see the full ADFGX tool.ADFGVX
ADFGVX: Enter the keyword under Key/Alphabet #1. The default 36-character alphabet consists of A-Z and 0-9. If you have a custom alphabet, enter this under Key/Alphabet #2. To customize this alphabet, see the full ADFGVX tool.The Backslash Code in text form is represented by a backward slash (\), a pipe (|) and a forward slash (/). However if your code only consists of 3 characters, it could still be this code if it is obfuscated. To customize the three characters for the Backslash, enter the first one in Key/Alphabet #1, second one in Key/Alphabet #2 position, and third one in Key/ Alphabet #3 position.
Backslash
Guess Mode: This attempts to try all 6 different patterns that could exist in this code.
Guess Mode 1
Guess Mode 2
Guess Mode 3
Guess Mode 4
Guess Mode 5
Guess Mode 6
Base32
Base32: Base32 uses the characters A - Z and 2 - 7 to make a human-readable output. It uses rough 20% less space than Hexadecimal (base16) but uses roughly 20% more space than base64.Base58 - Bitcoin
Base58 - Bitcoin: This is an encoding scheme used for Bitcoin addresses designed to reduce visually identical looking account numbers in some fonts. The alphabet consists of 123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz.Base58 - Flickr
Base58 - Flickr: Flickr uses the same encoding as Bitcoin but their alphabet consists of 123456789abcdefghijkmnopqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZBase58 - Aa1
Base58 - Aa1: This versions puts the numbers at the end and begins with uppercase letters and then lowercase letters. ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz123456789Base58 - aA1
Base58 - aA1: This versions puts the numbers at the end and begins with lowercase letters and then uppercase letters. abcdefghijkmnopqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ123456789Base64
Base64: This is an encoding scheme commonly used when there is a need to encode binary data to be stored and transferred over media that are designed to deal with textual data.Base85 (ASCII-85)
Base85 (ASCII-85): This is a coding system created by Paul E. Rutter of Adobe Systems that uses 5 ASCII characters to code 4 bytes (similar to base64 encoding). ASCII 85 is used in PDF file format for example.The standard Baudot/Murray code uses 0's and 1's. If your code has just two single characters that aren't 0 or 1, it could still be this code if it was obfuscated. To customize the two characters, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions.
Baudot - ITA1
Baudot - ITA1: The original Baudot code was a 5-bit code that became known as the International Telegraph Alphabet No 1 (ITA1).Baudot - ITA1 (Inverted)
Baudot Murray - ITA2
Baudot Murray - ITA2: In 1901, the Baudot code was improved by Donald Murray to minimize the wear on the machinery. He assigned the most frequently used symbols and letters to the codes with fewest punched holes. This led to the International Telegraph Alphabet No 2 (ITA2) standard.Baudot Murray - ITA2 (Inverted)
Beaufort - Standard
Beaufort: This is a polyalphabetic substitution cipher that is similar to the Vigenère cipher, only that instead of adding letter values, it calculates the cipher letter by taking the key letter minus the plaintext letter.Beaufort - Autokey
Beaufort Autokey: Similar to above but this version starts with a relatively-short keyword and appends the message to it.Beaufort Variant - Standard
Beaufort Variant: Similar to above but the key difference is the encryption is performed like decryption in the Vigenère and decryption is performed like the encryption in the Vigenère.Beaufort Variant - Autokey
Beaufort Variant Autokey: Similar to the variant above but this version starts with a relatively-short keyword and appends the message to it.ASCII to Numbers
ASCII to Numbers: This finds the corresponding ASCII number to text and provides a sum at the end.Numbers to ASCII
Numbers to ASCII: This converts numbers from 0 to 255 into their corresponding ASCII character. Each set of numbers must be separated by a space.This section shows each of these number formats converted back into ASCII.
Binary
Decimal
Hexadecimal
Octal
Brainf*ck
Brainf*ck: Brainf*ck is an (unfortunately named) esoteric programming language created in 1993 by Urban Müller. The language consists of eight commands: > < + - . , [ and ].Ook Ook
Ook Ook: Ook! is a joke programming language created by David Morgan-Mar. It is identical to brainf*ck, except that the instructions are changed into Orangutan words. The Ook! commands are: Ook. Ook?, Ook? Ook., Ook. Ook., Ook! Ook!, Ook! Ook., Ook. Ook!, Ook! Ook? and Ook? Ook!.Short Ook
Short Ook: A variant of Ook! is called Short Ook! where the Ook are stripped out, leaving the following commands: .?, ?., .., !!, !., .!, !? and ?!.The End of File (EOF) character must be unique to the message. The default is "$" but you may enter a custom one in the Pad position.
The Chinese Code in text form is represented by a dash (-) and a pipe (|). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters for the Chinese Code, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions. If you have a custom separator between words (besides a space), enter this in the Key/Alphabet #3 position.
Chinese Code - Forward
Chinese Code - Reverse
The default pad character is "X". If you have a custom pad character, enter this in the Pad box above.
The standard decabit code typically uses "+" and "-". However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters for decabit, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions.
Decabit
Decabit: This code consists of 10 characters of "+" and "-" that directly translate to numbers from 0 to 126. These values are then mapped to the corresponding ASCII characters/numbers.Decabit - Inverted
Digital Root - A1 Z26
Digital Root A1 Z26: This tool works by converting text to its alphanumeric value and uses a recursive function to find the digital root value. Letters arranged with A = 1 and Z = 26.Digital Root - A0 Z25
Digital Root A0 Z25: Letters arranged with A = 0 and Z = 25.Digital Root - A26 Z1
Digital Root A26 Z1: Letters arranged with A = 26 and Z = 1.Digital Root - A25 Z0
Digital Root A25 Z0: Letters arranged with A = 25 and Z = 0.Digital Root - Vanity
Digital Root Vanity: Letters arranged by the numbers on a phone's keypad. A = 2 and Z = 9.Digital Root - Scrabble
Digital Root Scrabble: Letters are arranged by the numbers on Scrabble tiles.Dvorak - Two Hands
Dvorak: This converts from Dvorak Simplified keyboard layout into the Qwerty keyboard layout.Dvorak - Right Hand
Dvorak - Left Hand
Atomic Numbers
Atomic Numbers: These are the matching atomic numbers of the elements.Atomic Symbols
Atomic Symbols: These are the matching atomic symbols of the elements. This will attempt to match the symbols based on Uppercase and Lowercase characters in the message.Atomic Names
Atomic Names: These are the matching atomic names of the elements.The Five Needle Telegraph Code in text form is represented by a backward slash (\), a pipe (|) and a forward slash (/). However if your code only consists of 3 characters, it could still be this code if it is obfuscated. To customize the three characters for this code, enter the first one in Key/Alphabet #1, second one in Key/Alphabet #2 position, and third one in Key/ Alphabet #3 position.
Five Needle Telegraph
Five Needle Telegraph: Also known as the Cooke and Wheatstone telegraph, this code is represented by three characters \ | / in a set of 5. To save space, uncommon letters were omitted in the code so the letters C, J, Q, V, X and Z are not included here.Guess Mode: This attempts to try all 6 different patterns that could exist in this code.
Guess Mode 1
Guess Mode 2
Guess Mode 3
Guess Mode 4
Guess Mode 5
Guess Mode 6
If you have a custom alphabet, enter this in the Key/Alphabet #1 position.
Geocache Number to ID
GC Number to ID: This uses a custom Base-31 conversion to convert the GC Number to or from the GC-ID. The characters used for the Base-31 conversion are 0123456789ABCDEFGHJKMNPQRTVWXYZ (the letters ILOSU are omitted). Example: GCK25B = 156997Geocache ID to Number
GC ID to Number: This converts the ID number back to the GC format. Example 156997 = GCK25BGronsfeld Standard
Gronsfeld: This cipher is a polyalphabetic cipher (a series of Caesar ciphers) where the shift is determined by numbers (between 0 and 9). It is similar to the Vigenère cipher, but the key uses digits instead of letters.Gronsfeld Autokey
Gronsfeld Autokey: This version starts with a relatively-short keyword and appends the message to it. For example if the keyword is "QUEEN" and the message is "ATTACK AT DAWN", the key would be "QUEENATTACKATDAWN".The Kenny code consists of a group of 3 letters in a combination of M, F & P. However if your code only consists of 3 characters, it could still be this code if it is obfuscated. To customize the three characters, enter the first one in Key/Alphabet #1, second one in Key/Alphabet #2 position, and third one in the Key/Alphabet #3 position.
Kenny
Guess Mode: This attempts to try all 6 different patterns that could exist in this code.
Guess Mode 1
Guess Mode 2
Guess Mode 3
Guess Mode 4
Guess Mode 5
Guess Mode 6
Keyboard Cipher - QWERTY
QWERTY: This simple substitution cipher maps the keys of a keyboard layout to letters like this: QWERTY = ABCDEF. The keyboard layout is QWERTYUIOPASDFGHJKLZXCVBNM.Keyboard Cipher - QWERTZ
QWERTZ: This simple substitution cipher maps the keys of a keyboard layout to letters like this: QWERTZ = ABCDEF. The keyboard layout is QWERTZUIOPASDFGHJKLYXCVBNM.Keyboard Cipher - AZERTY
AZERTY: This simple substitution cipher maps the keys of a keyboard layout to letters like this: AZERTY = ABCDEF. The keyboard layout is AZERTYUIOPQSDFGHJKLWXCVBNM.Keyboard Coordinates - Function Row Start (A = 42)
Keyboard Coordinates - This allows you to convert QWERTY letters from their coordinate location on the keyboard by rows and columns. It will first look for which row from the top of the keyboard and then which column from the left that the character appears.Keyboard Coordinates - Number Row Start (A = 32)
Keyboard Coordinates - Letter Row Start (A = 22)
Keyboard Neighbors
Shift Right with A-Z, 0-9, Special Chars
Keyboard Neighbors: This tool allows you to shift letters on a qwerty keyboard right or left.
Keyboard Neighbors
Shift Left with A-Z, 0-9, Special Chars
Keyboard Neighbors
Shift Right with A-Z, 0-9
Keyboard Neighbors
Shift Left with A-Z, 0-9
Keyboard Symbols
Keyboard Symbols: This converts the "[email protected]#$%^&*()" characters to their number equivalent on a QWERTY keyboard.Letters Numbers
Letters Numbers: This converts from letters (A - Z) to numbers (1 - 26).Numbers Letters
Numbers Letters: This converts from numbers (1 - 26) to letters (A - Z). Be sure to put a space or newline between each set of numbers for the tool to work correctly.Numbers Numerical Words
Numbers Numerical Words: This converts from numbers to spelled out words. Be sure to put a space or newline between each set of numbers for the tool to work correctly.Numerical Words Numbers
Numerical Words Numbers: This converts from spelled out numerical words to numbers from 0 to 100. Be sure to put a space or newline between each set of words for the tool to work correctly.Numbers Numerical Words - Alphabetical Order
Numbers Numberical Words - Alphabetical Order: This converts from numbers to numerical words but in alphabetical order of the words. (Example: 51 = One, 100 = Two) Be sure to put a space or newline between each set of numbers for the tool to work correctly. See Graumann.net for more details.Numerical Words Numbers - Alphabetical Order
Numerical Words Numbers - Alphabetical Order: This converts from numerical words into numbers but in alphabetical order based on the spelling of the word. (Example: One = 51, Two = 100) Be sure to put a space or newline between each set of words for the tool to work correctly. See Graumann.net for more details.Numbers Spelled Out
Numbers Spelled Out: This takes the numbers in the message (up to 33 digits in length) and spells them out into their word form. Everything that is not 0 - 9 is removed before translating.Character Count
Character Count: Provides a character count of the message text.Syllables
Syllables: This attempts to count the number of syllables in a set of words. If you have multiple sets of words, enter each set on its own line and it will give a count for each group. It's not perfect but should get pretty close.Reverse Text
Reverse Text: This reverses the text of the message.Reverse Words
Reverse Words: This splits the text by spaces and puts them in reverse order.Nihilist - 5 x 5
Nihilist 5 x 5: This cipher constructs a polybius square using a mixed alphabet. This is used to convert both the plaintext and a keyword to a series of two digit numbers. These numbers are then added together in the normal way to get the ciphertext, with the key numbers repeated as required.Enter the keyword in the Key/Alphabet #1 position and polybius alphabet or seed word in the Key/Alphabet #2 position. This verion's polybius square only has 25 characters, with one character swapped for another (Default is "J" for "I"). If your alphabet has a different swap letter, customize this in the "Translate this letter" section above.
Nihilist - 6 x 6
Nihilist - 6 x 6: This version's polybius square contains all letters A - Z and numbers 0 - 9. Enter the keyword in the Key/Alphabet #1 position and polybius alphabet or seed word in the Key/Alphabet #2 position.Numerology - Pathagorean
Numerology - Pathagorean: This cipher uses values for letters and adds them together based on a specific number set. This version splits the standard alphabet every 9th character and numbers them like this: 12345678912345678912345678. (Ex. A = 1, J = 1, S = 1, Z = 8, SUM = 11)Numerology - Pathagorean (With 0)
Numerology - Pathagorean (With 0): This version is exactly the same as above except it splits the alphabet at every 10th character and numbers them like this: 12345678901234567890123456. (Ex. A = 1, J = 0, S = 9, Z = 6, SUM = 16)Numerology - Chaldean
Numerology - Chaldean: This version is the same as above except it arranges the alphabet like ABCDEUOFIKGMHVZPJRLTNWQSXY and numbers them like 12345678123456781234561351. (Ex. A = 1, J = 1, S = 3, Z = 7, SUM = 12)The standard Planet barcode typically uses "╻" and "┃" or i's and I's (both are supported by default). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions.
Planet Barcode
Planet Barcode: The Postal Alpha Numeric Encoding Technique (PLANET) barcode was used by the United States Postal Service to identify and track pieces of mail during delivery.Note: The name of this cipher is commonly confused with the Tap/Knock Code. Check that section below as a possibility.
The standard postnet barcode typically uses "╻" and "┃" or i's and I's (both are supported by default). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions.
Postnet Barcode
Postnet Barcode: Postal Numeric Encoding Technique (POSTNET) is a barcode symbology used by the United States Postal Service to assist in directing mail. The ZIP Code or ZIP+4 code is encoded in half- and full-height bars.Primality
Primality: In math, prime numbers are whole numbers greater than 1 that have only two factors – 1 and the number itself. This attempts to check if a number is a prime number. It will only work for numbers under 16 digits in length.Prime Factorization
Prime Factorization: This finds which prime numbers multiply together to make the original number. This works for whole numbers between 2 and 253. It can handle a number up to 9007199254740991.Resistor Code - Numbers to Colors
Resistor Code - Numbers to Colors: On a resistor (electical component), there are colored bands that correlate to a number from 0 to 9. This converts the numbers back to colors.Resistor Code - Colors to Numbers
Resistor Code - Colors to Numbers: This converts the colors back to numbers. Note: Be sure the colors have a space between them.Roman Numerals
Roman Numerals: This is a numeral system that originated in ancient Rome and remained the usual way of writing numbers throughout Europe well into the Late Middle Ages. Numbers in this system are represented by combinations of letters from the Latin alphabet. "I": 1, "V": 5, "X": 10, "L": 50, "C": 100, "D": 500 and "M": 1000Roman Numerals - Chronogram
Chronogram: This is a sentence or inscription in which specific letters (interpreted as numerals) stand for a particular date when rearranged. Example: AMORE MATVRITAS = MMVI = 2006Route Transposition - Left to Right (With Spaces)
Route Transposition: This cipher rearranges the plaintext letters into columns and rows based on a shape of an imaginary path drawn on a grid, which contains all the message letters.Route Transposition - Left to Right (No Spaces)
Route Transposition - Right to Left (With Spaces)
Route Transposition - Right to Left (No Spaces)
Route Transposition - Alternating Left to Right (With Spaces)
Route Transposition - Alternating Left to Right (No Spaces)
Segment Display - 7
Segment Display: The segment display is not universal and can be assigned different values than what is translated here be default. If your code has different values than what is listed below, you may need to modify your text to fit the default values.Default 7 Values: A, B, C, D, E, F, and G.
Segment Display - 9
Segment Display 9: Default Values: A, B, C, D, E, F, G, H, and I.Segment Display - 14
Segment Display 14: Default Values: A, B, C, D, E, F, G1, G2, H, I, J, K, L and M.Segment Display - 16
Segment Display 16: Default Values: A1, A2, B, C, D2, D1, E, F, G1, G2, H, I, J, K, L and M.The Slash and Pipe Code in text form is represented by a forward slash (/), a pipe (|) and a backward slash (\). However if your code only consists of 3 characters, it could still be this code if it is obfuscated. To customize the three characters for this code, enter the first one in Key/Alphabet #1, second one in Key/Alphabet #2 position, and third one in Key/ Alphabet #3 position.
Substitution
Substitution: This is a cipher that consists of substituting every plaintext character for a different ciphertext character. It differs from the Caesar cipher in that the cipher alphabet is not simply the alphabet shifted, it is completely jumbled. Enter the keyword or custom alphabet into Key/Alphabet #1 position.Albam
Albam: The alphabet used is LMNOPQRSTUVWXYZABCDEFGHIJK.Carbonaro
Carbonaro: The alphabet used is OPGTIVCHEJKRNMABQLZDUFWXYS.Tap Code Numbers 5 x 5
Tap Code Numbers 5 x 5: Based on a 5 x 5 grid of letters with K being replaced by C. Each letter is communicated by tapping two numbers: the first designated the row (horizontal) and the second designated the column (vertical).Tap Code Pattern 5 x 5
Tap Code Pattern 5 x 5: This section chops up the text by spaces and counts the sections to translate into Tap Code. It works for any character just in case the code has been obfuscated but the pattern still exists.Tap Code Numbers 6 x 6
Tap Code Numbers 6 x 6: Based on a 6 x 6 grid of all letters and numbers. Each character is communicated by tapping two numbers: the first designated the row (horizontal) and the second designated the column (vertical).Tap Code Pattern 6 x 6
Tap Code Pattern 6 x 6: This section chops up the text by spaces and counts the sections to translate into Tap Code. It works for any character just in case the code has been obfuscated but the pattern still exists.The Tomtom Code in text form is represented by a forward slash (/) and a backward slash (\). However if your code only consists of 2 characters, it could still be this code if it is obfuscated. To customize the two characters, enter the first one in Key/Alphabet #1 and second one in Key/Alphabet #2 positions. If you have a custom separator between words (besides a space), enter this in the Key/Alphabet #3 position.
Tomtom - Forward
Tomtom - Reverse
Übchi Transposition - Duplicates Forward
Übchi: This was used by the Germans during World War 1 and is a double columnar transposition cipher. This takes the column order and if there are any duplicates, it arranges them in forward or backward order. This cipher was originally found on Rumkin.com and was created by Tyler Akins.Enter a column order (or keyword) in the Key/Alphabet #1 position. If you have a custom pad character (default is "X"), put this in the Pad position.
Übchi Transposition - Duplicates Backwards
Unicode Characters
Click the button below to see the the Hex value and description of each Unicode character in the message. This is a copy of the message above but you can modify the text here and it will be used to decode the characters.Note: Due to the size of the file needed for the unicode decoding, it will copy and open the text below in a new window.
This code corresponds to the letters used on the telephone number pad. The number 0 does not correspond to letters and is used as a space in the output. If you have a custom separator, put this in the Num 1 position.
Vanity Method 1: Example "CACHE" in this method would be as follows: 222 2 222 44 33. The decoder extracts and deciphers the numbers from the encrypted text. Vanity Method 2: Example "CACHE" in this method would be as follows: 23 21 23 42 32. This method decrypts in sets of two. Vanity Method 3: Example "CACHE" in this method would be as follows: 2/ 2\ 2/ 4| 3|.Note: Due to the dictionary size needed to decode T9 encryption, T9 is not supported here. See the T9 Decoder if you think your text might be this code. Example: 43622243 = GEOCACHE.