The following ciphers use the classical cryptography techniques of transposition and substitution. This list includes both modern and historical ciphers. The list is from the American Cryptogram Association, but the explanations and examples are written by Thonky.
- Amsco
- Autokey
- Baconian
- Bazeries
- Beaufort
- Bifid
- Cadenus
- Checkerboard
- Complete Columnar Transposition
- CM Bifid
- Digrafid
- Foursquare
- Fractionated Morse
- Grandpre
- Gromark
- Gronsfeld
- Headlines
- Homophonic
- Incomplete Columnar
- Interrupted Key
- Key Phrase
- Monome-Dinome
- Morbit
- Myszkowski
- Nicodemus
- Nihilist Substitution
- Nihilist Transposition
- Null
- Periodic Gromark
- Phillips
- Phillips-C
- Phillips-RC
- Playfair
- Pollux
- Porta
- Portax
- Progressive Key
- Quagmire I
- Quagmire II
- Quagmire III
- Quagmire IV
- Ragbaby
- Railfence
- Redefence
- Route Transposition
- Running Key
- Seriated Playfair
- Slidefair
- Swagman
- Tridigital
- Trifid
- Tri-square
- Twin Bifid
- Twin Trifid
- Two-Square
- Variant
- Vigenère