Bifid Cipher

Keysquare
Period

Bifid Cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle, a Frenchman who invented several ciphers including the bifid, trifid, and four-square ciphers.


How it works?

First, a mixed alphabet Polybius square is drawn up, where the I and the J share their position:

  1 2 3 4 5
1 B G W K Z
2 Q P N D S
3 I O A X E
4 F C L U M
5 T H Y V R

The message is converted to its coordinates in the usual manner, but they are written vertically beneath:

F L E E A T O N C E
4 4 3 3 3 5 3 2 4 3
1 3 5 5 3 1 2 3 2 5

They are then read out in rows:

4 4 3 3 3 5 3 2 4 3 1 3 5 5 3 1 2 3 2 5

Then divided up into pairs again, and the pairs turned back into letters using the square:

44 33 35 32 43 13 55 31 23 25
U  A  E  O  L  W  R  I  N  S

In this way, each ciphertext character depends on two plaintext characters, so the bifid is a digraphic cipher, like the Playfair Cipher. To decrypt, the procedure is simply reversed.

Longer messages are first broken up into blocks of fixed length, called the period, and the above encryption procedure is applied to each block. One way to detect the period uses bigram statistics on ciphertext letters separated by half the period. For even periods, p, as in the example above (p=10), ciphertext letters at a distance of p/2 are influenced by two plaintext letters (e. g., U and W are influenced by F and T), but for odd periods, p, ciphertext letters at distances of p/2 (rounded either up or down) are influenced by three plaintext letters. Thus, odd periods are more secure than even against this form of cryptanalysis, because it would require more text to find a statistical anomaly in trigram plaintext statistics than bigram plaintext statistics. [Wikipedia]


Featured Tools

Featured tools that you might find useful.

Popular Tools

List of popular tools that users love and frequently use.

New Tools

The latest tools added to our collection, designed for you.

Topics

The tools grouped by topics to quickly find what you need.
ROT13 Cipher is a simple letter substitution cipher with a specific key where the letters of the alphabet are offset 13 places.

ROT13 Cipher

ROT13 Cipher is a simple letter substitution cipher with a specific key where the letters of the alphabet are offset 13 places.
Simple Substitution Cipher is a cipher that has been in use for many hundreds of years. It basically consists of substituting every plaintext character for a different ciphertext character.

Simple Substitution Cipher

Simple Substitution Cipher is a cipher that has been in use for many hundreds of years. It basically consists of substituting every plaintext character for a different ciphertext character.
Running Key Cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.

Running Key Cipher

Running Key Cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.
Straddle Checkerboard Cipher is a substitution cipher, except that the substitutions are of variable length. It has formed a component of several impotant field ciphers, the most notable being the VIC cipher used by russian spies during the cold war.

Straddle Checkerboard Cipher

Straddle Checkerboard Cipher is a substitution cipher, except that the substitutions are of variable length. It has formed a component of several impotant field ciphers, the most notable being the VIC cipher used by russian spies during the cold war.