Search for a tool
Mono-alphabetic Substitution

Tool to decrypt monoalphabetical substitution and find each letter of a substituted message with a deranged alphabet (monoalphabetic cipher).

Results

Mono-alphabetic Substitution -

Tag(s) : Substitution Cipher

Share
Share
dCode and more

dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!


Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!


Feedback and suggestions are welcome so that dCode offers the best 'Mono-alphabetic Substitution' tool for free! Thank you!

Mono-alphabetic Substitution

Monoalphabetic Substitution Decoder


Loading...
(if this message do not disappear, try to refresh this page)



Other decryption methods






Monoalphabetic Substitution Encoder

 


See also: Caesar Cipher

Custom Deranged Alphabet Generator

Answers to Questions (FAQ)

What is a (mono-)alphabetical substitution? (Definition)

An alphabetic substitution is a substitution cipher where the letters of the alphabet are replaced by others according to a 1-1 correspondence (a plain letter always corresponds to the same cipher letter).

The substitution is said to be monoalphabetic because it uses only one alphabet, this alphabet is said to be disordered.

How to encrypt using an alphabetical substitution?

The monoalphabetical substitution consists in using a mixed alphabet (with the letters in an unusual order) and replacing the letters of the alphabet normal by it.

Example: BYKWASLFXOCZTDHJUMIGPVENQR is a totally random alphabet with the 26 letters of the Latin alphabet.

To understand, write the alphabet over the classic alphabet:

Plain alphabetABCDEFGHIJKLMNOPQRSTUVWXYZ
Substitution alphabetBYKWASLFXOCZTDHJUMIGPVENQR

The substitution involves a replacement in the plaintext of all the letters of the first row with the letters associated with the second row.

Example: All A become N, all the B remain B, all the C become A, etc.

Example: With this substitution DCODE is encrypted as WKHWA.

Any deranged alphabet can be used to create a mono alphabetic substitution provided it respects the criterion of an alphabet: not containing the same letter several times.

What do K1, K2, K3, K4 mean?

The K1, K2, K3, and K4 classifications are used by the ACA to describe the use of keywords in encryption alphabets.

— K1: The key is inserted into the substitution alphabet, usually at the beginning and then the rest of the letters follow in alphabetical order.

Example: Default CODEABFGHIJKLMNPQRSTUVWXYZ but an offset is possible XYZCODEABFGHIJKLMNPQRSTUVW

— K2: The key is inserted into the substitution (reciprocal) coded alphabet ⇅.

— K3: The key is used in both plaintext and coded alphabets.

— K4: Two different keys are used: one for the substitution alphabet and another for the coded alphabet.

How to decrypt using an alphabetical substitution?

Decryption requires knowing the alphabet mixed used and the inverse substitution encryption.

Substitution AlphabetNBAJYFOWLZMPXIKUVCDEGRQSTH
Plain AlphabetABCDEFGHIJKLMNOPQRSTUVWXYZ

The substitution involves replacing in the ciphertext all the letters of the first row with the letters associated with the second row.

Example: The encrypted message JAKJY has for plain message DCODE.

How to recognize a mono alphabetical substituted text?

The ciphered message has an index of coincidence identical to the language of the plain text.

English speakers call this encryption aristocrat (if there are spaces) or patristocrat (if there are no spaces between words).

How to decipher a substitution without the alphabet?

The MCMC technique (used by dCode) is one of the most effective for finding the most probable plain text and proposing a replacement alphabet.

dCode additionally adds an interactive tool to manually decrypt substitution-encrypted messages.

Another possibility, the known plaintext attack that makes possible to deduce some letters of the alphabet via the knowledge or the preliminary guess of certain portions of the plain text.

Example: The most common alphabets used for substitutions are: QWERTYUIOPASDFGHJKLZXCVBNM
MNBVCXZLKJHGFDSAPOIUYTREWQ
QAZWSXEDCRFVTGBYHNUJMIKOLP
AZERTYUIOPQSDFGHJKLMWXCVBN
NBVCXWMLKJHGFDSQPOIUYTREZA
AQWZSXEDCRFVTGBYHNUJIKOLPM
ZYXWVUTSRQPONMLKJIHGFEDCBA
AEIOUYBCDFGHJKLMNPQRSTVWXZ'
Pangrams can also be used as an alphabet (by removing redundant letters).

What is the MCMC technique?

MCMC (Markov Chain Monte Carlo) is the name given to a statistical method that applies very well to mono-alphabetical substitutions.

1 - Initialization: use a random substitution alphabet (but it is possible to carry out an analysis of letter frequencies to obtain a first plain alphabet - encrypted alphabet mapping table).

2 - Evaluation: calculation of the probability that the current substitution alphabet produces plain text (score generally based on the frequencies of appearance of bigrams in the target language).

3 - Modification of the alphabet: randomly exchange certain plain letter-cipher letter correspondences

4 - Repeat steps 2 and 3 as long as the plausibility score of the message obtained increases and the alphabet selected offers the most probable plain message.

Source: here Diaconis, Persi. (2009). The Markov Chain Monte Carlo Revolution. Bulletin of the American Mathematical Society. 46. 179-205. 10.1090/S0273-0979-08-01238-X.

What are the variants of the substitution cipher?

First, some substitution use specific alphabets, such as Atbash that takes the alphabet backwards ZYXWVUTSRQPONMLKJIHGFEDCBA or the Caesar cipher which uses a shifted alphabet DEFGHIJKLMNOPQRSTUVWXYZABC that is shifted by 3.

There are also substitutions that use several alphabets, alphabet that changes depending on an algorithm defined by encryption (e.g. Vigenere uses 26 alphabets).

In game-play journals, substitution games / exercises are often called cryptograms.

Source code

dCode retains ownership of the "Mono-alphabetic Substitution" source code. Any algorithm for the "Mono-alphabetic Substitution" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Mono-alphabetic Substitution" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Mono-alphabetic Substitution" or any other element are not public (except explicit open source licence like Creative Commons). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.

Cite dCode

The content of the page "Mono-alphabetic Substitution" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source. Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).
To cite dCode.fr on another website, use the link: https://www.dcode.fr/monoalphabetic-substitution
In a scientific article or book, the recommended bibliographic citation is: Mono-alphabetic Substitution on dCode.fr [online website], retrieved on 2025-04-18, https://www.dcode.fr/monoalphabetic-substitution

Need Help ?

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!

Questions / Comments

Feedback and suggestions are welcome so that dCode offers the best 'Mono-alphabetic Substitution' tool for free! Thank you!


https://www.dcode.fr/monoalphabetic-substitution
© 2025 dCode — The ultimate collection of tools for games, math, and puzzles.
 
Feedback