Skip to content

Transposition Cipher

tags:: #Cipher #atomic projects::

Another basic Cipher Dooley mentions is the transposition cipher. It works by rearranging letters to a specific rule or key. It is very hard to break because there are n factorial ciphertexts for an n-letter plaintext message. The simplest form would be the columnar transposition (complete and incomplete). You write the message in columns with rows as long as the key, it is then pulled off by columns according to the key. Example: transpositioncipher example.png if the key was 321654, you would first write the 3rd column then the second so on and until you reach the end. The encoded message would be: cvdng eiaii sdncn donox nsatt oivgh


Citational Information

Dooley, J. 2018. History of Cryptography and Cryptanalysis. 2018. Available at https://books-scholarsportal-info.proxy.library.carleton.ca/en/read?id=/ebooks/ebooks4/springer4/2019-06-27/1/9783319904436 [Last accessed 29 January 2023].


A great ancient example of this would be the Syctale tool used in Ancient Greece.