Cipher methods Transposition
Columnar transposition
The text is written in rows and read in columns, ordered by a keyword. The basis of most advanced transpositions.
- Family :
- Transposition
- Difficulty :
- Intermediate
- Era :
- Classical cryptography, systematized in the 19th century
Also known as : keyed columnar transposition
Columnar transposition is the most widespread and useful form of transposition cipher. It is driven by a keyword that determines the order in which columns are read — making it far more resilient than geometric transpositions (Rail Fence, Scytale).
Principle
- Pick a keyword (e.g.
KEY). - Write the plaintext in rows, as many columns as the keyword length.
- Number the columns by the alphabetic order of the keyword letters.
- Read the ciphertext column by column, following that order.
Keyword : K E Y
Order : 2 1 3 (E < K < Y → E=1, K=2, Y=3)
Plaintext :
C I P
H E R
C H R
O N I
C L E
Reading in order E, K, Y (cols 2, 1, 3):
- Column E:
IEHNL - Column K:
CHCOC - Column Y:
PRRIE
Ciphertext: IEHNLCHCOCPRRIE.
Variants
- Incomplete columnar transposition — the last row isn’t fully filled, yielding columns of different lengths and making the attack harder.
- Double transposition — the method applied twice with two different keywords. Used up through the 1960s by several militaries.
- ADFGX / ADFGVX — columnar transposition applied to a text already enciphered by Polybius.
- Rail Fence, Scytale — simpler transpositions, without a keyword.
Strengths and weaknesses
Strengths
- Frequency distribution preserved, but no local order preserved — direct analysis fails.
- Tangible parameter (the keyword), changeable per session.
- Easily layered with a substitution to build a robust composite.
Weaknesses
- The keyword length can be deduced from the reasonable divisors of the ciphertext length.
- Column anagrams: with multiple same-length ciphertexts (probably the same key), you can reconstruct the permutation by comparison.
- Probable words (cribs): guessing a plaintext segment, you test its possible placement in columns — usually one hypothesis survives.
Double transposition patches these weaknesses, and remained unbroken retrospectively for short messages with distinct keys.
In CipherChronicle
Columnar transposition is the natural pivot toward advanced ciphers: it introduces a text key that drives a permutation. Grids built on it can stage the column shuffling — a more tactile puzzle than pure substitution.
Grid
- 1
Ciphertext
Normal letter distribution — the signature of transposition (no substitution).
- 2
Method recognition
Every plaintext letter is there, only in a different order.
- 3
Hypothesis: keyword « KEY » (3 columns)
The alphabetic order of K, E, Y gives the reading order — E (2) then K (1) then Y (3).
- 4
Grid reconstruction
Redistribute the ciphertext into 3 columns following the read order, then read by rows.
- 5
Message revealed
The plaintext surfaces in its original order.