Crypto-IT Logo
ου γαρ εστιν κρυπτον ο ου φανερον γενησεται ουδε αποκρυφον ο ου γνωσθησεται και εις φανερον ελθη
Wersja PL ENG Version

Double Columnar Transposition

  • Description
  • Algorithm
  • Implementation
The Double Columnar Transposition rearranges the plaintext letters, based on matrices filled with letters in the order determined by the secret keyword.
Transposition Cipher
The Double Columnar Transposition was introduced is a modification of the Columnar Transposition. It is quite similar to its predecessor, and it has been used in similar situations.

The encryption and decryption can be performed by hand, using a piece of paper and a simple matrix, in a similar way as it is done for the Columnar Transposition.

The Double Columnar Transposition was introduced to make cryptanalysis of messages encrypted by the Columnar Transposition more difficult. It was supposed to prevent anagrams of the plaintext words appearing in the analysed ciphertext.

The main idea behind the Double Columnar Transposition is to encrypt the message twice, by using the original Columnar Transposition, with identical or different secret keys. The output from the first encryption would be the input to the second encryption.

Double Columnar Transposition Scheme

The matrices used in both steps may have different sizes, if the two keywords of different lengths have been used.

All the operation performed during encryption and decryption, and all the parameters that have to be defined, remain the same, as in the Columnar Transposition.

Security of the Double Columnar Transposition

Breaking the Double Columnar Transposition is more difficult than breaking its simpler version, due to the fact that anagrams will not appear when trying to apply different sizes of matrices to the intercepted ciphertext.

An attacker has to try many different combinations of keywords in order to find patterns in the ciphertext. The cipher is more likely to be broken if multiple messages of the same length and encrypted with the same keys were intercepted. They can be anagrammed simultaneously, which makes the cryptanalysis much more effective.

It may be estimated that having a few messages of the same length, encrypted with identical keys, would allow the attacker to determine both the plaintexts and the secret keys. This technique was widely using by the French for breaking German messages at the beginning of World War I, until the Germans improved their system.

The Double Columnar Transposition remains one of the strongest ciphers that can by used manually, without the need of having electronic equipment. Another cipher that is considered to be as strong as it is the VIC cipher.

Site under development.