Tools to decrypt/encrypt with double transposition cipher, as its name indicates, it uses two transposition ciphers, with one or two keys, and applied on lines or columns or both.
Double Transposition Cipher - dCode
Tag(s) : Transposition Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Double transposition encryption consists in the consecutive applications of 2 transposition ciphers. Generally, it is 2 columnar transposition using 2 distinct keys (but variations exist).
The double transposition applies the simple transposition twice as the name suggests.
Example: Encrypt the message DCODE with the key KEY first, then the key WORD. The grid (1) is permuted a first time (2)
(1)
| (2)
|
The intermediate message is usually read in columns from bottom to top and then from left to right.
With the message found after the first permutation, then perform a second transposition with the key WORD. The ciphertext is also obtained by reading the grid by column (variations can apply).
Example: The encrypted intermediate message is CEDDO (3) and the final encrypted message is DEDCO (4):
(3)
| (4)
|
The encryption will be more robust if the lengths of the keys are coprime.
Double transposition decryption requires knowing the two permutation keys and the type of transposition for each (row or column)
Example: The crypted message is OECDDX has been transposed with 1 column transposition then with 1 line transposition with two identical keys: KEY.
The encrypted message must get two reversed transposition, in the opposite order of the original order, to get back the plain text.
Example: The grid (1) becomes after inverse permutation in rows (2)
(1)
| (2)
|
Example: The intermediate message CDOECX undergoes a second inverse permutation in columns (3) which gives the original starting grid (4) and the plain message DCODEX
(3)
| (4)
|
A message encrypted by Double Transposition has a frequency analysis and a coincidence index normal.
The number of letters in the message is not a prime number.
It is possible to find the key length by analyzing the prime decomposition of the text length.
By writing the text in the grid/checkerboard, permute the columns in order to find and recreate words on each rows, beginning with common bigrams (such as TH, HE, IN, etc.).
The lines should not follow each other, do not try to read words on several lines.
The second permutation is deductible from the line pieces that were created with the first permutation.
It is possible to shuffle rows or columns in the desired order.
The UBCHI cipher inserts null letters between the 2 transpositions.
The double transposition cipher has no date nor known author.
dCode retains ownership of the "Double Transposition Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "Double Transposition Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Double Transposition Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Double Transposition Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.
The copy-paste of the page "Double Transposition Cipher" or any of its results, is allowed (even for commercial purposes) as long as you credit dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
Double Transposition Cipher on dCode.fr [online website], retrieved on 2024-12-21,