Skip to main content
CipherChronicle

Cipher methods Transposition

Columnar transposition

The text is written in rows and read in columns, ordered by a keyword. The basis of most advanced transpositions.

Family :
Transposition
Difficulty :
Intermediate
Era :
Classical cryptography, systematized in the 19th century

Also known as : keyed columnar transposition

Columnar transposition is the most widespread and useful form of transposition cipher. It is driven by a keyword that determines the order in which columns are read — making it far more resilient than geometric transpositions (Rail Fence, Scytale).

Principle

  1. Pick a keyword (e.g. KEY).
  2. Write the plaintext in rows, as many columns as the keyword length.
  3. Number the columns by the alphabetic order of the keyword letters.
  4. Read the ciphertext column by column, following that order.
Keyword :  K  E  Y
Order   :  2  1  3    (E < K < Y → E=1, K=2, Y=3)

Plaintext :
           C  I  P
           H  E  R
           C  H  R
           O  N  I
           C  L  E

Reading in order E, K, Y (cols 2, 1, 3):

  • Column E: IEHNL
  • Column K: CHCOC
  • Column Y: PRRIE

Ciphertext: IEHNLCHCOCPRRIE.

Variants

  • Incomplete columnar transposition — the last row isn’t fully filled, yielding columns of different lengths and making the attack harder.
  • Double transposition — the method applied twice with two different keywords. Used up through the 1960s by several militaries.
  • ADFGX / ADFGVX — columnar transposition applied to a text already enciphered by Polybius.
  • Rail Fence, Scytale — simpler transpositions, without a keyword.

Strengths and weaknesses

Strengths

  • Frequency distribution preserved, but no local order preserved — direct analysis fails.
  • Tangible parameter (the keyword), changeable per session.
  • Easily layered with a substitution to build a robust composite.

Weaknesses

  • The keyword length can be deduced from the reasonable divisors of the ciphertext length.
  • Column anagrams: with multiple same-length ciphertexts (probably the same key), you can reconstruct the permutation by comparison.
  • Probable words (cribs): guessing a plaintext segment, you test its possible placement in columns — usually one hypothesis survives.

Double transposition patches these weaknesses, and remained unbroken retrospectively for short messages with distinct keys.

In CipherChronicle

Columnar transposition is the natural pivot toward advanced ciphers: it introduces a text key that drives a permutation. Grids built on it can stage the column shuffling — a more tactile puzzle than pure substitution.

Grid

I
E
H
N
L
C
H
C
O
C
P
R
R
I
E
Q
R
S
T
U
V
W
X
Y
Z
KeyK = KEY
  1. 1

    Ciphertext

    Normal letter distribution — the signature of transposition (no substitution).

  2. 2

    Method recognition

    Every plaintext letter is there, only in a different order.

  3. 3

    Hypothesis: keyword « KEY » (3 columns)

    The alphabetic order of K, E, Y gives the reading order — E (2) then K (1) then Y (3).

  4. 4

    Grid reconstruction

    Redistribute the ciphertext into 3 columns following the read order, then read by rows.

  5. 5

    Message revealed

    The plaintext surfaces in its original order.