• Main Menu
  • Substitution and Transposition Ciphers


    Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process.

    Substitution ciphers

    Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time.

    The Caesar Cipher was an early substitution cipher. In the Caesar Cipher, each character is shifted three places up. Therefore, A becomes D and B becomes E, etc…

    This table shows “VOYAGER” being encrypted with the Caesar substitution cipher:

    Plaintext V O Y A G E R
    Key +3 +3 +3 +3 +3 +3 +3
    Ciphertext Y R B D J H U

    A more complex substitution cipher would be created if, instead of incrementing each character by three, we used a more complex key. This table shows a simple substitution cipher with a key of “123”.

    Plaintext V O Y A G E R
    Key +1 +2 +3 +1 +2 +3 +1
    Ciphertext W Q B B I H S

    An even more complex substitution cipher can be made by having each character of the alphabet correspond to a different letter of the alphabet, without a set pattern.

    Plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
    Key T O E U N Z I A G X P Q Y R H V S M D F C J W B K L

    Using this substitution cipher to encrypt VOYAGER would give us these results:

    Plaintext V O Y A G E R
    Ciphertext J H K T X N M

    The Vernam Cipher, or one time pad, is a simple substitution cipher where the key length equals the message length.

    ROT-1 is a simple substitution cipher used to encode messages on Usenet.

    Transposition ciphers

    Transposition ciphers encrypt plaintext by moving small pieces of the message around. Anagrams are a primitive transposition cipher.

    This table shows “VOYAGER” being encrypted with a primitive transposition cipher where every two letters are switched with each other:

    V O Y A G E R
    O V A Y E G R

    Substitution and transposition ciphers in modern times

    Modern cryptanalysis makes simple substitution and transposition ciphers obsolete.

    However, these techniques remain useful for understanding cryptography and the workings of more complex modern ciphers.

    Got Something To Say:

    Your email address will not be published. Required fields are marked *

    3 comments
    1. saurabh h

      15 November, 2016 at 7:49 am

      It hepled a lot.

      Reply
    2. PeaceMan

      10 September, 2015 at 8:29 am

      Thanks!

      Reply
    3. govind singh

      26 September, 2011 at 4:09 pm

      very intersting….

      Reply
    Cryptology
    } 252 queries in 0.464 seconds.