Tool to decrypt/encrypt with ADFGVX, a German cipher from World War 1 using a grid and the letters A,D,F,G,V,X.
ADFGVX Cipher - dCode
Tag(s) : Substitution Cipher, Transposition Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
ADFGVX is a German encryption system dating from the First World War using a grid and the letters A,D,F,G,V,X before subjecting the ciphertext to column transposition.
The ADFGVX encryption uses a 6x6 square grid of 36 distinct characters (often generated via a keyword allowing to shuffle the 26 letters of the latin alphabet and the 10 digits from 0 to 9).
Rows and columns are named, from top to bottom and from left to right, by the letters A, D, F, G, V and X in order for the letters of the grid to be located by a coordinate (row, column).
Example: A default ADFGVX grid (without keyword), such as A = (A,A), Z = (V,D) etc.
\ | A | D | F | G | V | X |
---|---|---|---|---|---|---|
A | A | B | C | D | E | F |
D | G | H | I | J | K | L |
F | M | N | O | P | Q | R |
G | S | T | U | V | W | X |
V | Y | Z | 0 | 1 | 2 | 3 |
X | 4 | 5 | 6 | 7 | 8 | 9 |
Perform a substitution by bigrams by replacing each letter of the message by the corresponding pair of coordinates (bigram).
Example: BERLIN becomes AD,AV,FX,DX,DF,FD
This message will get another encryption by columnar transposition. The transposition uses a permutation key/keyphrase, usually based on a keyword. This can be found it by rearranging its letters in alphabetic order.
Two same letters are ranked in order of appearance, but if possible avoid duplicates letters in the keyphrase as this can lead to encryption/decryption ambiguities.
Example: The keyword CODE gives the transposition 1,3,4,2 because C(1),O(2),D(3),E(4) ranks alphabetically C(1),D(3),E(4),O(2) i.e. columns 1,3,4,2
The message is written by rows in a table whose width is the key size.
Any empty cells in the last row are sometimes filled with X (or other letters) to simplify manual decryption.
Example:
C(1) | O(2) | D(3) | E(4) |
---|---|---|---|
A | D | A | V |
F | X | D | X |
D | F | F | D |
Columns are rearranged such as the permutation key.
Example: After transposition 1,3,4,2 (The 2nd column O(2) is placed at the end)
C(1) | D(3) | E(4) | O(2) |
---|---|---|---|
A | A | V | D |
F | D | X | X |
D | F | D | F |
The ADFGVX final ciphertext is made by reading the letters of the table by columns starting from top to bottom and from left to right.
Example: Final encrypted message is AFDADFVXDDXF
The coded message is usually transmitted in Morse code to the recipient.
The ADFGVX decryption process requires a key and a grid.
Example: The cipher text is AD,AX,FV,FF,GF,AX and the keyword is KEY (that correspond to permutation K(1),E(2),Y(3) => E(2),K(1),Y(3) => 2,1,3)
The ciphered message is then written from top to bottom and from left to right in a table with $ n $ columns where $ n $ is the length of the key. Columns are named according to the letters of the key, rearranged in alphabetic order.
Example:
E(2) | K(1) | Y(3) |
---|---|---|
A | F | G |
D | V | F |
A | F | A |
X | F |
If during the encryption, the last row was not completed by X, take this into account to fill in the cells of the last row.
The table gets a permutation of its columns according to the permutation key in order to get back the original order of the keyword's letters.
Example:
K(1) | E(2) | Y(3) |
---|---|---|
F | A | G |
V | D | F |
F | A | A |
F |
Reading the table by row gives the intermediate message.
Example: FAGVDFFAAFXX.
For each bigrams, replace it with the corresponding letter with coordinates (row, column) in the grid to get the plain text message.
Example:
\ | A | D | F | G | V | X |
---|---|---|---|---|---|---|
A | A | Z | E | R | T | Y |
D | U | I | O | P | Q | S |
F | D | F | G | H | J | K |
G | L | M | W | X | C | V |
V | B | N | 0 | 1 | 2 | 3 |
X | 4 | 5 | 6 | 7 | 8 | 9 |
Example: FA = row F, column A = D then GV = C, etc. The original plain text is DCODE.
The ciphertext must contain only 6 distinct characters: A, D, F, G, V and X.
If the array is completed during encryption, the message will have a number of characters which is a multiple of the length of the permutation key.
If the ciphertext hasn't be permuted, the text is a bigrammic substitution. After a substitution by a random alphabet, the text should have a the same index of coincidence as the plain text.
One can crack ADFGVX and find the permutation order without knowing the key by bruteforcing all possible permutation. Use the Permutation Brute-force button.
One can crack ADFGVX and find the substitution grid by making a alphanumeric replacement of the bigrams resulting from the permutations. Use dCode's tool for mono-alphabetic substitution.
One can crack ADFGVX without the key nor the grid by finding first the permutation (see below) and then do an alphabetical substitution.
The letters A, D, F, G, V and X have been selected because their equivalent in morse code are very distinguishable, his prevent transmission error by radio
ADFGVX cipher have been introduced at the end of the First World War (from 1917) by Fritz Nebel. He have been used on the 5th of March 1918 during the german attack of Paris, it was using an ADFGX version (with the letters A, D, F, G and X only).
GEDEFU 18 for GEheimschrift DEr FUnker 18, which can be translated in radio-operators' cipher 18 is the old name of ADFGVX cipher.
ADFGX is an ancestor of ADFGVX, a variant using a 5x5 square, on the base of the Polybius square cipher.
The crack is attributed to Georges-Jean Painvin. Among the deciphered messages, one text was nicknamed The radiogram of the victory because it allowed France to win a battle in June 1918.
George-Jean Painvin deciphered a first message in June 1918.
The theorem of Roitelet is a novel by Frédéric Cathala here (affiliate link) which has as protagonist a spy during the first world war having messages encrypted with ADFGVX.
dCode retains ownership of the "ADFGVX Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "ADFGVX Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "ADFGVX Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "ADFGVX Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.
The copy-paste of the page "ADFGVX Cipher" or any of its results, is allowed (even for commercial purposes) as long as you credit dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
ADFGVX Cipher on dCode.fr [online website], retrieved on 2024-12-19,