The universes of cryptography 12 methods
Transposition ciphers
No substitution — the letters move. The Spartan scytale, the Russian turning grille, the schoolyard rail fence, the double transposition smuggled by Cold War spies: geometry put to the service of secrecy.
Spotlight cipher
Scytale (Spartan rod)
The Spartan rod. The oldest known military cipher device.
The other great family
Transposition is the other great family of classical cryptography, next to substitution. The principle is radically different: no letter is replaced. Every letter of the plaintext is preserved, but its position is scrambled according to a geometric rule.
Direct consequence: the ciphertext and the plaintext share exactly the same letter-frequency distribution. A brute frequency analysis becomes utterly useless.
The Spartan scytale: the ancestor
The ancestor is the Spartan scytale (5th century BC): a wooden cylinder around which Lacedaemonian generals wrap a leather strip. The message is written line by line along the cylinder; once the strip is unwound, the letters appear in a seemingly random order.
To decrypt, you only need a cylinder of the same diameter. It is one of the earliest documented ciphers, and it already introduces the central idea: the key is not a word, it is a geometric parameter.
Rail fence, columns, double transposition
Through the centuries, transposition has grown more sophisticated. The rail fence alternates letters across several imaginary rails. Columnar transposition writes the plaintext in a rectangle and reads it back column by column in the order dictated by a keyword.
Double transposition applies the operation twice with two different keys. Long considered robust enough for serious diplomatic use, it held until fine statistical analyses (n-gram scoring, hill-climbing attacks) brought it down.
Three historical feats: Painvin, Fleissner, VIC
The German ciphers of the First World War, ADFGX and then ADFGVX, combine transposition and substitution. French cryptanalyst Georges Painvin spent three months of 1918 on them before breaking them in time to help stop the Spring Offensive.
The Fleissner turning grille, popularised by the Soviet services and used until the 1960s, relies on a punched paper square rotated by a quarter-turn between layers. The VIC cipher (Soviet agent Reino Häyhänen, 1950s, recovered by the FBI inside a hollow five-cent coin) adds a numerical key derived from a date and a memorised phrase.
Why study transposition today?
First, because it combines beautifully with substitution: text that is first transposed then substituted (or vice versa) gains far more security than the product of their individual strengths. Every modern block cipher relies on this insight — AES alternates substitution layers (S-Box) and transposition layers (ShiftRows, MixColumns) sixteen times in a row.
Second, because it is pedagogically perfect: a message at the right spot in the wrong order is just as mysterious as a message at the wrong spot in the right order.
Catalogue
Methods in this universe
12 methods
- Transposition Beginner
Rail Fence (zig-zag)
Zigzag transposition across rails. Simple, visual, pedagogical.
- Transposition Intermediate
Columnar transposition
Text in rows, read in columns ordered by a keyword.
- Transposition Advanced
Double transposition
Two columnar transpositions in a row. Held unbreakable for short messages.
- Transposition Beginner
Scytale (Spartan rod)
The Spartan rod. The oldest known military cipher device.
- Transposition Advanced
AMSCO cipher
Alternating 1-2 transposition. Harder to reconstruct.
- Transposition Intermediate
Rotating grille
A perforated grille rotated 4 times. Visual and tactile.
- Transposition Intermediate
Spiral cipher
Cleartext drawn as a spiral inside a grid, then read back row by row.
- Symbols Beginner
Friderici (window-shutter alphabet)
A 17th-century alphabet where letters are open shutters.
- Homophonic Intermediate
Grandpré cipher
10×10 word grid. Per-letter coordinates — naturally homophonic.
- Grid Advanced
ADFGX cipher
First used on the German Western Front, 5 March 1918. Broken by Painvin.
- Grid Advanced
ADFGVX cipher
Six-letter extension of ADFGX, covering digits 0-9.
- Polygraphic Advanced
VIC cipher
Straddling checkerboard + double transposition + numeric key. KGB in the field.