Frequently Asked Questions
Find answers to common questions about our cryptography tools, security practices, and educational resources. Can't find what you're looking for? Contact us for help.
General Questions
Is my data safe when using your tools?
Absolutely! All cryptographic operations happen entirely in your browser using JavaScript. Your data never leaves your device, is never transmitted to our servers, and we have no way to access it.
This client-side approach means even we can't see what you're encrypting or decrypting. Your privacy is guaranteed by design, not just by policy.
Can I use classical ciphers for real security?
⚠️ Security Warning
Classical ciphers (Caesar, Vigenère, ROT13) are easily broken with modern techniques and should never be used to protect sensitive information.
These tools are excellent for learning cryptographic concepts, understanding historical encryption methods, and educational purposes. For real security, use modern encryption standards like AES, proper password hashing (bcrypt, Argon2), and established security libraries.
What about MD5 and SHA-1 hashes?
MD5 and SHA-1 are cryptographically broken and unsuitable for security-sensitive applications. We include them because:
- • They're still used for non-security purposes (checksums, identifiers)
- • Educational value in understanding hash evolution
- • Legacy system compatibility
For password storage, use bcrypt, scrypt, or Argon2. For data integrity, use SHA-256 or higher.
Using the Tools
Why doesn't my Caesar cipher match other tools?
Different implementations handle edge cases differently:
- • Character handling: Some preserve spaces/punctuation, others don't
- • Case sensitivity: Some maintain uppercase/lowercase, others convert all
- • Character sets: Some include numbers and symbols, others only letters
Our implementation follows standard academic conventions. Check the specific settings if results differ.
What's the difference between encoding and encryption?
Great question! This is a common point of confusion:
Encoding (Base64, URL)
- • Format conversion
- • No security purpose
- • Easily reversible
- • Standard algorithms
Encryption (Ciphers)
- • Security purpose
- • Requires key/password
- • Designed to be secret
- • Various algorithms
Base64 looks scrambled but anyone can decode it. Caesar cipher requires knowing the shift value.
How do I choose a good password with your generator?
Our password generator follows current security best practices:
- • Length: At least 12 characters, preferably 16+
- • Character types: Mix uppercase, lowercase, numbers, symbols
- • Avoid patterns: Don't use dictionary words or predictable sequences
- • Unique: Different password for each account
Consider using a password manager to store generated passwords securely.
Learning Cryptography
I'm new to cryptography. Where should I start?
Great choice for learning! Here's a suggested learning path:
- Start with Caesar cipher - understand basic substitution
- Try Vigenère cipher - learn about keys and polyalphabetic ciphers
- Explore hash functions - understand one-way functions
- Learn about modern encryption - AES, RSA concepts
- Study real-world applications - HTTPS, password storage
Each tool includes educational content explaining the concepts and proper usage.
Can I use these tools for homework/assignments?
Absolutely! Our tools are designed for educational use. However:
- • Make sure you understand the concepts, don't just copy results
- • Check with your instructor about tool usage policies
- • Use our explanations to learn the underlying principles
- • Practice implementing algorithms yourself for deeper understanding
Learning is the goal—our tools should supplement, not replace, understanding.
What's the historical significance of these ciphers?
Classical ciphers have fascinating histories:
- • Caesar cipher: Used by Julius Caesar for military communications (~50 BCE)
- • Vigenère cipher: Called "le chiffre indéchiffrable" (the indecipherable cipher) for centuries
- • ROT13: Modern internet culture for hiding spoilers
- • Atbash: Ancient Hebrew cipher found in religious texts
Understanding this history helps appreciate how cryptography evolved to meet changing needs.
Technical Questions
Can I use your tools in my own projects?
Yes! Our tools are free for any legal purpose, including commercial use. However:
- • Consider the security limitations of classical ciphers
- • Use established cryptographic libraries for production systems
- • Our implementations prioritize education over performance
- • Attribution is appreciated but not required
Do you have an API?
Currently, no. All our tools run client-side by design for privacy. If there's significant demand for programmatic access, we might consider a privacy-preserving API in the future. For now, you can view our JavaScript implementations for integration ideas.
Can I contribute new tools or improvements?
We'd love community contributions! Here's how you can help:
- • Report bugs or suggest features via contact
- • Submit pull requests on GitHub (coming soon)
- • Share educational content or explanations
- • Help with translations for international users
Still Have Questions?
Can't find the answer you're looking for? We're here to help with any questions about cryptography, our tools, or security concepts.
Contact Us