Crypto-IT Logo
ου γαρ εστιν κρυπτον ο ου φανερον γενησεται ουδε αποκρυφον ο ου γνωσθησεται και εις φανερον ελθη
Wersja PL ENG Version

Transposition Ciphers

  • Description
  • Algorithm
  • Implementation
To encrypt data, transposition ciphers rearrange the original message letters. The same letters will appear in both plaintext and ciphertext, but the idea is that the permutation used to protect data should be difficult to break without the knowledge of the secret key.
Transposition Ciphers
Transposition ciphers have been used since ancient times. They are perhaps as old, as the oldest substitution ciphers and steganography methods. At present, in modern ciphers, various transpositions are used together with substitutions, to make the cryptanalysis more difficult.

There is not any common algorithm, that would be used in all transposition ciphers. The main idea is to change the letter order in such a way, that would prevent attackers from reading it, while at the same time, allow the receiver to decrypt messages easily and effectively.

Both sender and receiver should share a common secret, usually a keyword, that determines the exact transpositions that should be applied to the text.

Transposition ciphers usually require more memory and more complex operations, than substitution ciphers. That is why modern ciphers implemented pragmatically and electronically are usually based on substitutions, and less often on transpositions.