Tools to decrypt/encrypt with double transposition cipher, as its name indicates, it uses two transposition ciphers, with one or two keys, and applied on lines or columns or both.
Double Transposition Cipher - dCode
Tag(s) : Transposition Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Double transposition encryption consists in the consecutive applications of 2 transposition ciphers. Generally, it is 2 columnar transposition using 2 distinct keys (but variations exist).
The double transposition applies the simple transposition twice as the name suggests.
Example: Encrypt the message DCODE with the key KEY first, then the key WORD. The grid (1) is permuted a first time (2)
(1)
| (2)
|
The intermediate message is usually read in columns from bottom to top and then from left to right.
With the message found after the first permutation, then perform a second transposition with the key WORD. The ciphertext is also obtained by reading the grid by column (variations can apply).
Example: The encrypted intermediate message is CEDDO (3) and the final encrypted message is DEDCO (4):
(3)
| (4)
|
The encryption will be more robust if the lengths of the keys are coprime.
Double transposition decryption requires knowing the two permutation keys and the type of transposition for each (row or column)
Example: The crypted message is OECDDX has been transposed with 1 column transposition then with 1 line transposition with two identical keys: KEY.
The encrypted message must get two reversed transposition, in the opposite order of the original order, to get back the plain text.
Example: The grid (1) becomes after inverse permutation in rows (2)
(1)
| (2)
|
Example: The intermediate message CDOECX undergoes a second inverse permutation in columns (3) which gives the original starting grid (4) and the plain message DCODEX
(3)
| (4)
|
A message encrypted by Double Transposition has a frequency analysis and a coincidence index normal.
The number of letters in the message is not a prime number.
It is possible to find the key length by analyzing the prime decomposition of the text length.
By writing the text in the grid/checkerboard, permute the columns in order to find and recreate words on each rows, beginning with common bigrams (such as TH, HE, IN, etc.).
The lines should not follow each other, do not try to read words on several lines.
The second permutation is deductible from the line pieces that were created with the first permutation.
It is possible to shuffle rows or columns in the desired order.
The UBCHI cipher inserts null letters between the 2 transpositions.
The double transposition cipher has no date nor known author.
dCode retains ownership of the "Double Transposition Cipher" source code. Any algorithm for the "Double Transposition Cipher" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Double Transposition Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Double Transposition Cipher" or any other element are not public (except explicit open source licence like Creative Commons). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.
The content of the page "Double Transposition Cipher" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source.
Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).
To cite dCode.fr on another website, use the link:
In a scientific article or book, the recommended bibliographic citation is: Double Transposition Cipher on dCode.fr [online website], retrieved on 2025-04-15,