Tool to encrypt / decrypt a message by substitution cipher (all sizes) by replacing one or more characters with one or more others
Substitution Cipher - dCode
Tag(s) : Substitution Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
The most common method of substitution replaces the 26 letters of the alphabet (one letter matches only one other). dCode has a dedicated tool for this:
When the substituted characters are symbols/glyphs/drawings, this page cannot be used but dCode has tools for that:
Substitution encryption consists, as its name suggests, of substituting (replacing) one element with another. In the case of a text, it is a question of replacing the characters (often letters) of the message by others.
For a substitution to be correct, it is necessary for the same element to be substituted by only one other (valid in both cases, for encryption and decryption) so that there is never more than one possibility of encryption or decryption.
Example: The Caesar cipher is an alphabetical substitution which replaces each letter by the following in the alphabet: ABC becomes 'BCD'
The condition for a successful substitution decryption is to know the correspondence lookup table used.
If the substitution is a simple transcription, then the frequency analysis can quickly recognize the language of the plain message.
If the substitution is more complex, it may become impossible to recognize the encryption.
The notions of substitutes, replacements and changes are clues.
Substitution cipher is one of the most basic cryptography methods. Many variations are possible:
— Ciphers by mono-alphabetic substitution, with a disordered alphabet, one letter replaces another.
— Encryptions by poly-alphabetic substitution, with several alphabets.
— Encryptions by homophonic substitution, the same element can be substituted by several others.
— Substitution by dictionary, with words, n-grams substituted by others.
It is likely that substitution encryption appeared short after the invention of writing.
dCode retains ownership of the "Substitution Cipher" source code. Any algorithm for the "Substitution Cipher" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Substitution Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Substitution Cipher" or any other element are not public (except explicit open source licence like Creative Commons). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.
The content of the page "Substitution Cipher" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source.
Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).
To cite dCode.fr on another website, use the link:
In a scientific article or book, the recommended bibliographic citation is: Substitution Cipher on dCode.fr [online website], retrieved on 2025-04-16,