Chapter 3

Transposition Ciphers

In substitution ciphers, plaintext letters are encrypted by being replaced by other letters given by correspondences in a cipher alphabet. Transposition ciphers differ from substitution ciphers in that plaintext letters are not encrypted by being replaced by other letters, but rather by being rearranged according to some rule agreed upon by the two parties wishing to exchange the message. That is, to form the ciphertext for a transposition cipher, the plaintext letters are rearranged in some manner, as opposed to being replaced by other letters.

Transposition ciphers, like substitution ciphers, are not very secure, but have a rich history of being used. The scytale cipher used in ancient Greece was a transposition ...

Get Cryptology, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.