Tool to decrypt / encrypt with a columnar transposition, also called column permutations cipher, a cryptographic technique that modifies the order of the letters of a previously written text in a table.
Columnar Transposition Cipher - dCode
Tag(s) : Transposition Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
A columnar transposition cipher is an encryption method that swaps the columns of a table (or a grid) containing the plain message to obtain an encrypted message.
Column transposition encryption writes plaintext in a rectangular array of N columns (inline fill) with N the size of the permutation key.
Example: The text COLUMNS is encrypted with the permutation 1,3,2 of the key word COL, it is written in the table
Columns | 1,2,3 | Permuted cols | 1,3,2 |
Plaintext | C,O,L | Ciphertext | C,L,O |
U,M,N | U,N,M | ||
S,X,X | S,X,X |
Fill in the empty boxes with a neutral letter (like X).
The encrypted message is then read in columns
Example: CUSLNXOMX
It is possible to read line by line, in which case the encrypted message would be CLOUNMSXX
Decryption by Columnar Transposition is similar to encryption. The difference lies in the writing in the table (in row or in column according to the reading method used during the encryption), as well as in the order of the columns which are permuted before being sorted again in ascending order.
Example: A permutation 1,3,2 was used to obtain the message CUSLNXOMX (reading by columns):
Permuted cols | 1,3,2 | Sorted cols | 1,2,3 |
Ciphertext | C,L,O | Plaintext | C,O,L |
U,N,M | U,M,N | ||
S,X,X | S,X,X |
The message consists of the transposed / swapped letters, so it has all the letters of the original message but in a different order.
The coincidence index after transposition of columns is unchanged from that of the plain text language.
For short permutations (up to 5-6 letters), a brute-force algorithm can test all permutations.
Otherwise, by knowing a word of the plain text (if possible with unusual letters), it is possible to find the position of its letters and to deduce the compatible columns permutations.
dCode retains ownership of the "Columnar Transposition Cipher" source code. Any algorithm for the "Columnar Transposition Cipher" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Columnar Transposition Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Columnar Transposition Cipher" or any other element are not public (except explicit open source licence like Creative Commons). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.
The content of the page "Columnar Transposition Cipher" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source.
Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).
To cite dCode.fr on another website, use the link:
In a scientific article or book, the recommended bibliographic citation is: Columnar Transposition Cipher on dCode.fr [online website], retrieved on 2025-04-15,