Fact-checked by Grok 2 weeks ago

Jefferson disk

The Jefferson disk, also known as the wheel cipher, is a encryption device invented by in the early 1790s, consisting of approximately 36 wooden disks mounted on an iron spindle, each inscribed with the 26 letters of the alphabet in a unique random order around its circumference. To encode a message, the operator aligns the disks so that the appears consecutively across one horizontal line, then transcribes any other arbitrary line of letters as the , which appears as a ; decoding requires an identical device to rotate the disks until the aligns and the meaningful emerges in another row. This polyalphabetic substitution system was intended for secure diplomatic correspondence, motivated by the vulnerability of letters to interception by European postal officials that Jefferson experienced during his time as U.S. minister from 1785 to 1789. Jefferson devised the cipher during his tenure as Secretary of State under President George Washington, likely between 1790 and 1793, though he detailed its construction in an undated manuscript discovered in his papers and referenced in a letter to mathematician Robert Patterson on March 22, 1802. The device measured about 2 inches in diameter and 6 to 8 inches long, with disks cut to roughly 1/6-inch thickness and strung on a spindle secured by a screw for rotation; each disk's lettering was deliberately jumbled, ensuring no two were identical to enhance security against frequency analysis. Despite its ingenuity, there is no historical evidence that Jefferson employed the wheel cipher in practice, and he eventually abandoned it in favor of other encoding methods, such as nomenclators. The Jefferson disk gained renewed significance in the 20th century when French cryptographer Étienne Bazeries independently reinvented a similar wheel system in 1891, leading to its adaptation by the U.S. Army as the M-94 cipher device in 1922, which remained in service through for field encryption. This military version featured 25 brass wheels and was valued for its simplicity and resistance to casual decryption, underscoring the device's enduring influence on American despite Jefferson's own limited use of it. Modern reproductions, such as those at and the , demonstrate its operation and highlight Jefferson's broader interest in , including ciphers provided to explorers like in 1803—though that was a distinct tabular system rather than the wheel design.

History and Development

Invention by Thomas Jefferson

Thomas Jefferson invented the Jefferson disk, also known as the wheel cipher, during his tenure as the first United States Secretary of State from 1790 to 1793. This mechanical cipher device emerged in the early 1790s as a means to enhance secure communications for the young American republic. Jefferson's motivation stemmed from the vulnerabilities of diplomatic correspondence during a period of international tension, including the French Revolution and strained relations with European powers like Britain and France. Having served as U.S. minister to France from 1784 to 1789, Jefferson was acutely aware of how foreign postal services intercepted and read official letters, prompting his experiments with advanced cryptographic tools involving multiple randomized alphabets to protect sensitive information. The original consisted of wooden disks, each approximately 2 inches in and 1/6 inch thick, with the letters of the inscribed in a randomized order around the rim of each disk. These disks were mounted on an iron forming a about 6 to 8 inches long and 2 inches in , allowing to align letters for encoding messages. Jefferson documented the device in manuscript notes, including detailed sketches, operational instructions, and explanations of its use, which were preserved among his papers at the . These writings, dated before March 22, 1802, describe the cipher's construction and potential for creating vast numbers of unique key variations through disk permutations. The device saw no official adoption during Jefferson's lifetime, largely due to his departure from the State Department in 1793 amid shifting priorities for the U.S. government, which lacked pressing cryptographic demands in peacetime, and the absence of evidence that Jefferson constructed or deployed the beyond theoretical development.

Rediscovery and Historical Context

In , a detailed description of the Jefferson disk was rediscovered among Thomas Jefferson's papers held in the by Dr. John M. Manly, a examining historical documents. This find brought to light Jefferson's innovative mechanical device, invented in the but previously unknown to the broader cryptographic community. The discovery occurred the same year the U.S. Army adopted a similar wheel-based as the M-94, though independently developed from precedents. The rediscovery prompted immediate analysis by , a leading American cryptologist then working with the U.S. Army Signal Corps. In a 1922 report, Friedman verified the device's practical functionality through and testing, confirming its polyalphabetic mechanism, which generated unique substitutions for each message segment based on wheel alignments. His findings, published in military cryptographic bulletins, highlighted the disk's advanced design relative to contemporary systems and contributed to its historical evaluation as an early mechanical cipher. The Jefferson disk emerged amid the early American republic's diplomatic vulnerabilities, where insecure communications exposed sensitive negotiations to interception by foreign powers. A prime example was the of 1797–1798, in which French agents demanded bribes from U.S. diplomats, escalating tensions toward potential war and underscoring the fragility of transatlantic correspondence reliant on public mails. , serving as during the crisis, recognized the need for robust secrecy in but did not implement his disk, opting instead for established nomenclator codes in limited diplomatic exchanges. In the broader early 19th-century cryptographic landscape, U.S. and diplomatic efforts predominantly employed simpler ciphers and codebooks, such as dictionary-based nomenclators that replaced words or phrases with numbers for basic . These systems, while sufficient for routine field use, lacked the Jefferson disk's mechanical randomization and resistance to , reflecting the era's limited technological integration in . The disk remained unused throughout 's presidency from 1801 to 1809 and was apparently abandoned after 1802, as diplomatic priorities favored personal envoys and verbal instructions over mechanical encoding tools.

Design and Mechanism

Physical Components

The Jefferson disk consists of 36 rotatable wooden disks, each approximately 2 inches in diameter and 1/6 inch thick, threaded onto a central iron spindle measuring 6 to 8 inches long. The disks are crafted from white wood, with the 26 letters of the English alphabet engraved or inscribed around their outer edges in a unique random order, ensuring each provides a distinct substitution alphabet; the letters are spaced evenly in 26 divisions around the periphery to facilitate alignment. Each disk is also marked with a unique identifying number for arrangement purposes. The assembled device forms a compact , roughly 2 inches in diameter and 6 inches long, designed for portability and fitting easily into a pocket for field use. 's original description emphasizes the spindle's nut and to secure the disks in place. The 36 disks exceed the -letter to accommodate extended messages; each disk features the standard 26 letters. Later military adaptations, such as the U.S. Army's M-94 cipher device introduced in 1922, modified the design for durability using 25 aluminum disks, each 1 7/16 inches in diameter and 3/16 inch thick, mounted on a similar metal to form a 4.5-inch-long cylinder. Some transitional or replica versions employed for the disks to balance weight and resilience, while retaining the randomized 26-letter arrangement on the edges. These variations prioritized ruggedness for tactical deployment, with disks featuring notches for interlocking and alignment, but maintained the core cylindrical structure of Jefferson's concept.

Alignment and Rotation System

The Jefferson disk operates through a rotation mechanism in which each of the wooden disks is mounted on a central iron , allowing them to spin freely and independently while maintaining their fixed order along the . This design enables the user to rotate individual disks by hand to position specific letters at a designated reference point, such as the edge of a or any other fixed external object, without requiring additional tools. The is secured with a screw or thumb nut at one end to prevent the disks from shifting position during use, ensuring stability while permitting smooth rotation. In the alignment process, the sender rotates the disks so that the letters of the message—up to 36 characters—are aligned horizontally in a single row across the device, using the external reference point to guide placement. Once aligned, the entire set of disks is rotated together as a unit by a predetermined number of positions (), creating a new horizontal row of scrambled letters that forms the , which is then read off visually. The recipient, using an identical device with the same disk order, aligns the received letters in a row and rotates the assembly in the reverse direction to reveal the original row among the possible alignments. This mechanical alignment leverages the visual presentation of the alphabets on the disk peripheries, eliminating the need for writing or external notation during the process. For the M-94 adaptation, messages are limited to 25 characters due to the reduced number of disks. The polygraphic functionality arises from the disk positions, which generate up to 36 unique alphabets simultaneously, as each disk bears a distinct scrambled relative to the others. The consists of the pre-agreed sequence in which the disks are arranged on the , denoted by unique identifiers on each disk, ensuring that sender and receiver produce identical alphabet mappings. For handling multiple messages, the disks can be reordered on the to change the entirely or rotated to new starting positions for subsequent encipherments, though both parties must synchronize these changes in advance to maintain compatibility. Mechanically, this system offers advantages such as the absence of writing during alignment, allowing for rapid visual scrambling that obscures the from casual observers, and the portability of the compact , which facilitates secure field use without leaving traces.

Operational Use

Enciphering Process

The enciphering process using the disk begins with preparation, where and must agree on the specific order of the disks, typically through a secret such as a numeric or keyword that determines the arrangement of the 36 wooden wheels on the . This order is crucial, as it generates a unique set of 36 , with each wheel featuring a randomized of the 26 letters; the devices must be identically configured for successful communication. Additionally, the parties establish a master reference, often the first wheel or a fixed line, to guide alignments. To encipher a message, the sender first aligns the plaintext letters in a straight horizontal line by individually rotating each disk until the desired letters appear aligned across the full set of wheels, using the master disk as a guide to ensure uniformity. For example, to encipher "ATTACK," the sender rotates the first six disks to position A on the first, T on the second and third, A on the fourth, C on the fifth, and K on the sixth, forming a complete row. Once aligned, the position is fixed using a screw or clamp to prevent shifting. The sender then selects and reads the ciphertext from an alternative aligned line, typically the opposite row (such as the bottom if the is at the top) or any other of the 25 possible horizontal lines excluding the plaintext row itself, copying the resulting jumbled letters in sequence. In the "ATTACK" example, if the selected row yields letters X-Q-W-P-L-Z, this becomes the block "XQWPLZ." For messages longer than 36 letters, the is divided into segments of up to 36 letters each (spaces and omitted), and the disks are realigned and enciphered separately for each segment. Key management involves changing the disk order after each message or session to create fresh alphabets, rendering previous configurations obsolete and maintaining secrecy; recommended periodic reconfiguration to counter potential compromises. This practice, combined with the device's mechanical alignment, allows for rapid enciphering while relying on the order for exclusivity.

Deciphering Process

The recipient of a Jefferson disk ciphertext begins the deciphering process by assembling the set of wheels—typically 36 wooden cylinders threaded onto an iron —in the exact pre-agreed order, ensuring identical configuration to the sender's , and establishing a master reference line for alignment. This preparation is critical, as the security and accuracy of decryption rely on matching the wheel and random alphabets inscribed on each disk's edge. Once assembled, the recipient aligns the ciphertext letters across all disks in a single straight horizontal line by individually rotating each wheel until the received sequence appears consecutively in one row, often using a fixed reference point like the top or bottom edge. With the ciphertext fixed in position, the recipient then examines the remaining 25 possible lines formed by the aligned wheels, rotating the entire set as a unit if necessary, to identify the row containing the coherent plaintext message. The plaintext emerges as the only line forming recognizable words, distinguishable through linguistic context that resolves any minor ambiguities from transmission errors or partial alignments. The Jefferson disk's bidirectional design allows the same physical device to serve for both enciphering and deciphering without requiring additional tools or tables, making the process efficient for manual operation despite handling messages in fixed-length segments of up to 36 characters. For longer messages, the wheels are reset after each segment, and null characters may be inserted by the sender to pad incomplete blocks, aiding clean alignment during decryption. A representative example illustrates this: the "NKYGNSUSNXMLCQYOTYUHHFTD" (derived from a without spaces) is aligned across the wheels; upon inspection, the line reading "COOLJEFFERSONWHEELCIPHER" appears as the sensible . In , the recipient would insert spaces post-decryption to restore , confirming the through contextual .

Cryptanalysis and Security

Inherent Vulnerabilities

The Jefferson disk relies on the of its disks as the , yielding a total of 36! possible orders, or approximately 3.72 × 10^{41} configurations, which equates to about 138 bits of and represents a vast but ultimately finite key space. While this scale provided robust protection against exhaustive search in the , practical constraints often reduced effective security; for instance, subsequent adaptations like the U.S. military's M-94 variant used only 25 disks, shrinking the key space to 25! permutations and roughly 84 bits of entropy, making it more susceptible to systematic attacks over time. The fixed nature of the disk alphabets further limits , as adding more disks exponentially increases complexity without addressing core design bounds. A primary inherent stems from the device's physical embodiment, where capture by an adversary exposes all randomized alphabets inscribed on the disks, allowing of the substitution tables essential to the system. Lacking any built-in safeguards such as mechanisms or ephemeral key generation, the Jefferson disk offers no means to prevent key material compromise in scenarios of theft or , a critical flaw in field or diplomatic use where devices could be lost or inspected. Operator dependency introduces additional risks, as even minor errors in assembling the disks according to the shared order or maintaining alignment during encipherment can produce garbled output, rendering messages undecipherable and demanding absolute trust and precision from users—qualities not always assured in operational settings. Despite its polyalphabetic structure, which employs 36 unique alphabets to obscure letter frequencies within a single message, the falls short of perfect ; reuse of the same disk order across multiple messages exposes positional substitutions to , potentially revealing patterns as volume grows. In the era of its invention, the system also lacked defenses against broader threats prevalent in 18th-century , such as of message volumes and timings or insider betrayal, where a compromised operator could divulge the disk order outright.

Methods of Attack

The Jefferson disk, being a , resists standard due to its use of multiple alphabets, one per disk position. However, adaptations of can be applied across multiple ciphertexts encrypted with the same disk order. By examining letter co-occurrences in aligned positions from several messages, an attacker can infer probable adjacencies between disk alphabets, particularly if the alphabets on the disks are not optimally randomized. This approach, known as the de Viaris method, exploits patterns where specific letter positions on different disks repeat or show limited variation, allowing reconstruction of the disk sequence through systematic comparison of ciphertext columns. For instance, if the fifth letter on one strip consistently matches patterns in another, the relative positions can be deduced, narrowing down the possibilities. A provides a more direct method to compromise the , especially if the attacker possesses a copy of the disks but lacks the secret order. By guessing or obtaining a portion of the —such as common diplomatic phrases like " at dawn"—the attacker aligns the known letters with the corresponding , revealing the relative rotations and thus the full mappings for those positions. With sufficient known (estimated at around letters for a 36-disk to uniquely determine the order), the entire key can be reconstructed by iteratively matching across disks. This is particularly effective in historical contexts where message structures were predictable. Historically, Marquis Gaetan Henri Leon de Viaris analyzed Bazeries' wheel cipher in 1893, demonstrating practical breaks on variants similar to Jefferson's design using captured devices. De Viaris applied methods like partial recovery and to reconstruct orders from intercepted equipment, highlighting vulnerabilities when devices fell into enemy hands. His work emphasized that while the system was robust against casual interception, possession of the physical disks enabled rapid decryption through trial alignments of common message elements. During , German cryptanalysts broke U.S. M-94 messages by exploiting operational practices, such as repeated use of the same wheel order in messages longer than 25 characters and standardized headers, allowing reconstruction of the key without exhaustive search. Brute-force attacks on the Jefferson disk face severe limitations due to the immense key space: for 36 disks, there are 36! possible orders, approximately 3.7 × 10^{41} permutations, rendering exhaustive search computationally infeasible even with modern hardware. Pre-computer era efforts were limited to manual trials, which were practical only for systems with fewer disks (e.g., 10-20), where permutations could be tested by hand in days or weeks using educated guesses on rotations. In contemporary settings, software simulations facilitate attacks on short messages or reduced-disk variants of the Jefferson disk. Programs implemented in languages like can employ optimization techniques, such as hill-climbing algorithms, to permute disk orders and test rotations against cribs or n-gram frequencies, breaking instances with 20-30 disks in hours on standard hardware. These methods leverage computational power unavailable historically, though full 36-disk breaks remain prohibitive without additional information like partial keys.

Legacy and Influence

Impact on Subsequent Ciphers

The Jefferson disk's mechanical design, utilizing multiple rotatable wheels for polyalphabetic substitution, provided a foundational concept for subsequent cipher devices in applications. French cryptanalyst Bazeries independently reinvented a similar cipher in 1891, consisting of 20 to 30 disks each bearing a unique alphabet arrangement, which he proposed for use though it saw limited adoption. In the United States, the device evolved into the M-94 cipher wheel, introduced in 1922 for the U.S. Army , featuring 25 lightweight aluminum disks that could be rearranged for keying and used for until the early 1940s. This system addressed some of Jefferson's original limitations by standardizing disk alphabets and improving portability, and it later influenced the M-138-A strip cipher, a variant employing sliding strips instead of disks for greater flexibility during . Derivatives generally incorporated automatic stepping mechanisms to dynamically alter wheel positions, mitigating the Jefferson disk's static vulnerability to known-plaintext attacks, alongside expanded alphabets or additional components for increased key space. Cryptanalyst William Friedman's examinations of historical wheel ciphers in the , including the Jefferson disk, informed U.S. cryptologic training and directly contributed to the adoption of devices like the M-94 for operational and instructional purposes in the .

Modern Interpretations and Reproductions

In the late , replicas of the Jefferson disk were produced to preserve and demonstrate its historical significance, with the displaying an early cipher device attributed to Jefferson's design since at least the museum's establishment in 1965, though modern reproductions have incorporated advanced manufacturing techniques. By the , 3D-printed models became widely available through online repositories, allowing enthusiasts and educators to fabricate functional versions using accessible technology. Commercial kits, such as wooden decoder wheels sold by Retroworks since 2013, provide affordable, hands-on reproductions for hobbyists, featuring engraved alphabets on rotating disks. Digital emulations have extended the Jefferson disk's accessibility into the , with like , initiated in 1998, incorporating classical polyalphabetic ciphers for educational analysis, including wheel-based systems similar to Jefferson's. Online simulators, such as the Jefferson Wheel Cipher tool on dCode.fr, enable users to encode and decode messages virtually without physical hardware, supporting interactive learning on websites. Mobile applications, like the Jefferson Disk Cipher app released on in the , offer configurable digital wheels with presets mimicking historical variants, facilitating portable experimentation. The Jefferson disk features prominently in educational applications, particularly within curricula that introduce polyalphabetic substitution ciphers through hands-on activities, as seen in programs like the Civil Air Patrol's Introduction to Cybersecurity module, which uses the device to illustrate early encryption principles. Exhibits at sites like Thomas Jefferson's and the showcase replicas to contextualize its role in early American , with 's ongoing display emphasizing Jefferson's inventive legacy since the site's interpretive expansions in the early 2000s. In contemporary contexts, the Jefferson disk serves as a foundational example of early , highlighting principles of and substitution that remain relevant in cybersecurity , where it is analyzed for historical vulnerabilities like dependency on shared wheel orders. Recent developments include durable 3D-printed and app-based versions in the , enhancing its use in classrooms and exhibits, though the device sees no classified modern applications due to its obsolescence following adaptations like the M-94 cipher wheel.

References

  1. [1]
    Wheel Cipher - Thomas Jefferson's Monticello
    The Wheel Cipher is an encoding (enciphering) device first described by Jefferson in early 1790s that was later adopted (as M-94) by the U.S. military.
  2. [2]
    Jefferson's Cipher – Pic of the Week | In Custodia Legis
    Aug 17, 2018 · Thomas Jefferson was an avid inventor of multiple ciphers used to encrypt confidential information.
  3. [3]
    Description of a Wheel Cipher, [before 22 March 1802]
    TJ's description of a wheel cipher was apparently unnoticed by cryptographers until it was discovered in his papers in the 1920s (Louis Kruh, “The Genesis of ...
  4. [4]
    Jefferson Cipher Disk | International Spy Museum
    Invented by Thomas Jefferson, this wheel decipher was a way to transfer messages between allies using a special code. The ingenious cylindrical cipher was a ...Missing: history | Show results with:history
  5. [5]
    Thomas Jefferson's Codes and Ciphers: II (1790-1803) - Cryptiana
    In 1802, Jefferson sent Livingston a cipher based on a new scheme which he found "the easiest to use" and "the most indecypherable". It employed transposition ...Missing: invention disk primary sources<|control11|><|separator|>
  6. [6]
    The Founding Fathers Encrypted Secret Messages, Too - The Atlantic
    Mar 30, 2017 · Sometime in the 1790s, Jefferson designed a “wheel cipher,” which was “so far ahead of its time, and so much in the spirit of the later ...
  7. [7]
    Jefferson disk - Crypto Museum
    Aug 16, 2010 · The Jefferson disk is also known as the Jefferson Wheel Cipher or the Bazeries Cylinder. It was invented in 1795 by the third US president ...Missing: 1790-1795 primary sources
  8. [8]
    [PDF] THE GENESIS OF THE JEFFERSON/BAZERIES CIPHER DEVICE
    Jun 4, 2010 · Cipher Device M-94 was adopted by the United States Army in 1922, the same year papers found in the Library of Congress revealed that Thomas ...
  9. [9]
    [PDF] BASIC CRYPTOGRAPHY - National Security Agency
    example will be given, employing the obsolete U. S. Army Cipher Disk. Starting with the disk so that ~ = A. (or with any other prearranged initial setting) ...
  10. [10]
    XYZ Affair - Thomas Jefferson's Monticello
    The XYZ Affair refers to an attempt by members of France's Revolutionary government to bribe an American delegation during John Adams's presidency.Missing: cipher | Show results with:cipher
  11. [11]
    [PDF] American Systems in the Revolutionary War
    The codes by which Jefferson and Monroe corresponded between May 1784 and March 1785 are still in existence and permit the reading of letters otherwise ...Missing: XYZ Affair
  12. [12]
    Thomas Jefferson Wheel Cypher - Instructables
    In this Instructable, I will build a Wheel Cypher that was invented by Thomas Jefferson in the early 1790's. His was made from wood.Missing: source | Show results with:source
  13. [13]
  14. [14]
    M-94
    ### M-94 Cipher Device Summary
  15. [15]
    M-94
    The M-94 is 4.5" long with 25 numbered interlocking code wheels. One end is impressed with M-94 while the other bears the orange Signal Corps inspection stamp ...Missing: dimensions size materials
  16. [16]
    Jefferson cipher
    The cipher wheel was originally invented by Thomas Jefferson around 1795. ... The M-94 has 25 disks, with a different alphabetic arrangement around each wheel.
  17. [17]
    [PDF] The Cipher Disk
    This simple device has a distinguished history. Ever since its first invention it has been repeatedly re-invented in forms only slightly different from the.<|control11|><|separator|>
  18. [18]
    Jefferson-Lewis Cryptology - Discover Lewis & Clark
    Thomas Jefferson presented Meriwether Lewis with a cipher based on a square table or tableau such as that published in 1516 by Johannes Trithemius.
  19. [19]
    Thomas Jefferson's Code and Ciphers: III (Miscellaneous) - Cryptiana
    Apr 29, 2009 · Jefferson used a polyalphabetic cipher based on a keyword "NICHOLAS" in his correspondence with William Short on and after 18 January 1784.
  20. [20]
    The Bazeries Cylinder
    The main attack against this type of cipher is the de Viaris method. If the alphabets on the cylinder are poorly chosen, it may be that the fifth letter ...Missing: wheel | Show results with:wheel
  21. [21]
    CS551: Problem Set 1: Classical Ciphers - Computer Science
    Sep 11, 2000 · The US Army used a variant of the Jefferson Wheel cipher from 1923-1942. Jefferson's Wheel Cipher consisted of 36 wheels, each containing ...
  22. [22]
    Any historical accounts of cryptanalysis of Jefferson's wheel cipher?
    Feb 10, 2013 · In fact, it is hardly impregnable, and the "Pers z" code-breaking group of the German Foreign Office cracked the M-138-A in 1944. However, by ...
  23. [23]
    [5.0] The Mechanization of Ciphers - Vectors
    Jul 1, 2025 · A Bazeries cylinder consists of a set of roughly 20 to 30 numbered disks, with a different cipher alphabet on the edge of each disk, and a hole ...
  24. [24]
    [PDF] Ciphers - Princeton University
    Unfortunately, his idea was filed away and only rediscovered among his papers in 1922. ... The rotors, similar to Jefferson's disks, have circumferences divided.
  25. [25]
    [PDF] Communication Intelligence and Security, William F Friedman ...
    Jan 14, 2015 · His name was James Lovell. Besides being a self-trained cryptographer, he was also a member of the. Continental Congress, as I mentioned ...
  26. [26]
    World's Oldest True Cipher Device, the “Jefferson Cipher,” on ...
    Dec 19, 2022 · This early cipher machine, whether Jefferson's or not, is on display in the National Cryptologic Museum. Come visit and examine the device up close!
  27. [27]
    thomas jefferson wheel cipher 3D Models | Page 1 - STLFinder
    Find 102818 thomas jefferson wheel cipher 3D models for 3D printing, CNC and design. President Thomas Jefferson is renowned for writing the Declaration of ...
  28. [28]
    Retroworks Secret Cipher Decoder Wheel - Jefferson Wheel
    Detailed instructions: Starting from the left, spell out the message you want to create by rotating each disk to line up the letters of your message. For ...
  29. [29]
    History of Cryptography - CrypTool
    The Californian Edward Hebern built the first cipher machine based on the rotor principle. 1922. Thomas Jefferson's wheel cipher was re-discovered in the US, ...Missing: disk | Show results with:disk
  30. [30]
    Jefferson Wheel Cipher - Disk Decoder/Encoder Online Solver
    Tool to decrypt/encrypt according to Jefferson. The Jefferson wheel cipher is a polyalphabetic cipher invented by Thomas Jefferson and using a cylinder with ...Missing: primary manuscript
  31. [31]
    Jefferson Disk - Cipher wheel - Apps on Google Play
    Sep 13, 2025 · Features ✓ Interactive cipher wheel ✓ Fully configurable ✓ Share configuration with others ✓ Presets (M94, Jefferson-36) Historic BackgroundMissing: simulators | Show results with:simulators
  32. [32]
    [PDF] CAP's Introduction to Cybersecurity - pdf. - Civil Air Patrol
    Objective: The objective of this activity is to experiment with President Jefferson's chosen solution to address flaws in simple substitution ciphers. We ...
  33. [33]
    M-94 Cipher Wheels - PRC68.com
    My friend Bryan Locks made a working replica of the Army M-94 in 1989. It uses 25 Bakelite disks with the alphabets taped around the outer edge. A central ...