Skip to main content
CipherChronicle

Cipher methods Code

Ave Maria cipher (Trithemius)

Each plaintext letter is replaced by a Latin word drawn from a pious table. The ciphertext reads as a prayer — steganography before the term existed.

Family :
Code
Difficulty :
Intermediate
Era :
1518, Johannes Trithemius (Polygraphiae)
Inventor :
Johannes Trithemius

Also known as : Trithemius Ave Maria · Latin polygraphy · word-per-letter cipher

The Ave Maria cipher, also known as Trithemian polygraphy, is the central cryptographic device in Polygraphiae libri sex, the treatise by Johannes Trithemius posthumously published in 1518. It is one of the earliest printed cryptographic systems in Western history, and it gave rise to the modern concept of steganography — the art of hiding not the contents, but the very existence of a message.

Principle

Trithemius built twenty-four tables (one per letter of the Latin alphabet, without J or U), each containing twenty-four Latin words — one word per slot. The ciphertext is produced by replacing each plaintext letter with a word drawn from the matching table.

Sample table (simplified, fictional)

For the first plaintext letter you use table 1:

  Slot 1: DEUS           Slot 7: ALTISSIMUS
  Slot 2: SANCT          Slot 8: BEATUS
  Slot 3: DOMINUS        Slot 9: ALTUS
  Slot 4: PATER          Slot 10: MAGNI
  Slot 5: REX            Slot 11: BONUS
  Slot 6: REGNA          Slot 12: DIVINUS

The slot used for each letter is its alphabetic rank: A = slot 1, B = 2, …, Z = 24.

Final reading

The recipient reassembles the plaintext by noting, for each word in the ciphertext, the slot it occupies in its assigned table. The result is a sequence of numbers (A1Z26 in disguise) that converts back to letters.

The steganographic effect comes from the fact that the ciphertext reads like a Latin prayer — something along the lines of:

SANCTUS ALTUS MAGNIFICUS BENEDICTUS REGNANS IN AETERNUM…

To an inattentive reader, it’s just a devotional text. Only someone holding the tables can recover the hidden message.

Why it’s revolutionary

Trithemius here introduces two major ideas:

  1. Word-for-letter substitution — in contrast with Bacon’s later letter-for-two-symbols × 5 binary approach. Two opposite directions of the same insight: mask a letter behind a bigger object (a word) or a smaller one (two symbols × 5 positions).
  2. Deliberate steganography — the cipher is engineered so that the ciphertext does not look like a cipher. Invisible messaging through pious texts would later be used by Jesuit agents and by most 17th-century diplomatic cryptography.

Religious context

Trithemius was a Benedictine abbot at Sponheim (1483–1506). His cryptographic work earned him posthumous accusations of witchcraft — his tables resembled angelic invocations, and some contemporaries believed his Steganographia (1499) enabled communication with demons. In reality, behind the angelic framing, lay rigorously mathematical ciphers that founded modern Western cryptography.

His pupil Johannes Heidenberg and his successor Giambattista della Porta would generalise these methods through the 16th century.

Weaknesses

  • Catastrophic compression ratio: each plaintext letter becomes a 4- to 12-letter word — ciphertext is 5× to 10× longer.
  • If the adversary identifies even a single table, partial decryption plus cross-analysis reveals the rest.
  • The Latinate style is ultimately recognisable: a Trithemian stego-text has a very distinct lexical texture that a trained eye can spot.

Against a modern adversary with access to the Polygraphia (published and widely available for five centuries), the cipher is transparent. Its value is historical and conceptual.