> with the help of a key
So, where is the key?
Maybe this differentiation is not popular or well accepted, but it was surely part of my cryptography curriculum and the following exam. I'd rather believe my prof than strangers on the internet.
A bad substitution cipher is still a cipher. Just one you shouldn't use for anything important.
Base64 is an encoding. It's an algorithm, no attempt at secrecy, thus not a cipher.
You'd do better debating this with a real life friend over a pint, rather than wasting your time trying to argue with multiple people here.
> "I belong to a secret group of panda bear hunters! Eat a meaty flesh chunk...."
For anyone wondering..
https://gist.github.com/DavidBuchanan314/07da147445a90f7a049...
Since an arbitrarily tall stack of combining characters still counts as one grapheme cluster, if some application limits string length by counting grapheme clusters then you can stuff an unlimited amount of data in there, with "only" 2x overhead in the byte representation.
Unfortunately HN filters some of the codepoints so I can't demonstrate here. Since I chose "A" as the base character which the diacritics are stacked on, it has a similar aesthetic to the SCREAM cipher although a little more zalgo-y.
DonHopkins•2h ago
codeulike•1h ago