Tool to encrypt / decrypt a message by substitution cipher (all sizes) by replacing one or more characters with one or more others
Substitution Cipher - dCode
Tag(s) : Substitution Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
The most common method of substitution replaces the 26 letters of the alphabet (one letter matches only one other). dCode has a dedicated tool for this:
When the substituted characters are symbols/glyphs/drawings, this page cannot be used but dCode has tools for that:
Substitution encryption consists, as its name suggests, of substituting (replacing) one element with another. In the case of a text, it is a question of replacing the characters (often letters) of the message by others.
For a substitution to be correct, it is necessary for the same element to be substituted by only one other (valid in both cases, for encryption and decryption) so that there is never more than one possibility of encryption or decryption.
Example: The Caesar cipher is an alphabetical substitution which replaces each letter by the following in the alphabet: ABC becomes 'BCD'
The condition for a successful substitution decryption is to know the correspondence lookup table used.
If the substitution is a simple transcription, then the frequency analysis can quickly recognize the language of the plain message.
If the substitution is more complex, it may become impossible to recognize the encryption.
The notions of substitutes, replacements and changes are clues.
Substitution cipher is one of the most basic cryptography methods. Many variations are possible:
— Ciphers by mono-alphabetic substitution, with a disordered alphabet, one letter replaces another.
— Encryptions by poly-alphabetic substitution, with several alphabets.
— Encryptions by homophonic substitution, the same element can be substituted by several others.
— Substitution by dictionary, with words, n-grams substituted by others.
It is likely that substitution encryption appeared short after the invention of writing.
dCode retains ownership of the "Substitution Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "Substitution Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Substitution Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Substitution Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.
The copy-paste of the page "Substitution Cipher" or any of its results, is allowed (even for commercial purposes) as long as you credit dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
Substitution Cipher on dCode.fr [online website], retrieved on 2024-12-19,