Cipher methods Substitution
Monoalphabetic substitution
A free permutation of the alphabet. 26! possible keys — but letter frequencies give it up.
- Family :
- Substitution
- Difficulty :
- Intermediate
- Era :
- Antiquity (generalized in the Renaissance)
Also known as : simple substitution cipher
Monoalphabetic substitution is the parent family of which Caesar, ROT-13 and Atbash are just special cases. You permute the 26 letters by any bijection — yielding 26! ≈ 4 × 10²⁶ possible keys. An attacker cannot try them all.
Principle
Sender and receiver share a mapping table: each plaintext letter maps to exactly one cipher letter, and that bijection holds across the entire message. The key is therefore the cipher alphabet in order: (A → ?, B → ?, …, Z → ?).
Example key (QWERTY keyboard):
plain : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
cipher : Q W E R T Y U I O P A S D F G H J K L Z X C V B N M
Example
With the key above, CIPHERCHRONICLE becomes EOHITKEIKGFOEST.
Strengths and weaknesses
Strengths
- Astronomical keyspace (26!) — unbreakable by brute force.
- Easy to memorize from a keyword (write the keyword, then fill with the remaining letters in order).
Weaknesses
This is the great lesson of classical cryptography: keyspace size does not equal security.
- Frequency analysis: in English,
Eis about 13% of letters,T~9%,A~8%. The most frequent ciphertext letter is very likelyE. - Digrams (
TH,ER,ON,AN…) and trigrams (THE,AND,ION…) add strong constraints. - Short words (
THE,AND,TO) act as anchor points.
A seasoned cryptanalyst solves a monoalphabetic substitution of a paragraph in minutes by hand.
Close variants
- Atbash — keyless special case (alphabet mirror).
- Caesar / ROT-13 — special cases based on a fixed shift.
- Affine — substitution parameterized by
(a, b)withC = ax + b mod 26. - Homophonic — multiple cipher symbols per plain letter, flattening the frequency distribution.
In CipherChronicle
Monoalphabetic substitution is the grand practice field for frequency analysis. Grids range from short texts (where every word matters) to more generous paragraphs that let statistics do the heavy lifting.
Grid
- 1
Ciphertext
A string where every plain letter was replaced by a unique cipher symbol.
- 2
Frequency analysis
The most frequent ciphertext letters most likely map to E, T, A, O…
- 3
Rebuilding the key alphabet
From a few known mappings, the rest falls out via patterns and digrams.
- 4
Inverse substitution
Once the table is established, every letter is swapped back to its original.
- 5
Message revealed
The plaintext emerges, confirming or refuting the guessed alphabet.