Bifid Cipher

Keysquare
Period

Bifid Cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle, a Frenchman who invented several ciphers including the bifid, trifid, and four-square ciphers.


How it works?

First, a mixed alphabet Polybius square is drawn up, where the I and the J share their position:

  1 2 3 4 5
1 B G W K Z
2 Q P N D S
3 I O A X E
4 F C L U M
5 T H Y V R

The message is converted to its coordinates in the usual manner, but they are written vertically beneath:

F L E E A T O N C E
4 4 3 3 3 5 3 2 4 3
1 3 5 5 3 1 2 3 2 5

They are then read out in rows:

4 4 3 3 3 5 3 2 4 3 1 3 5 5 3 1 2 3 2 5

Then divided up into pairs again, and the pairs turned back into letters using the square:

44 33 35 32 43 13 55 31 23 25
U  A  E  O  L  W  R  I  N  S

In this way, each ciphertext character depends on two plaintext characters, so the bifid is a digraphic cipher, like the Playfair Cipher. To decrypt, the procedure is simply reversed.

Longer messages are first broken up into blocks of fixed length, called the period, and the above encryption procedure is applied to each block. One way to detect the period uses bigram statistics on ciphertext letters separated by half the period. For even periods, p, as in the example above (p=10), ciphertext letters at a distance of p/2 are influenced by two plaintext letters (e. g., U and W are influenced by F and T), but for odd periods, p, ciphertext letters at distances of p/2 (rounded either up or down) are influenced by three plaintext letters. Thus, odd periods are more secure than even against this form of cryptanalysis, because it would require more text to find a statistical anomaly in trigram plaintext statistics than bigram plaintext statistics. [Wikipedia]


Featured Tools

Featured tools that you might find useful.

Popular Tools

List of popular tools that users love and frequently use.

New Tools

The latest tools added to our collection, designed for you.

Topics

The tools grouped by topics to quickly find what you need.
Cetacean Cipher is an interesting encryption algorithm that it can converts any input into

Cetacean Cipher

Cetacean Cipher is an interesting encryption algorithm that it can converts any input into "Cetacean Language".
Blowfish is a symmetric-key block cipher designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

Blowfish Cipher

Blowfish is a symmetric-key block cipher designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.
Fernet Cipher is a symmetric encryption method which makes sure that the message encrypted cannot be manipulated/read without the key. It uses URL safe encoding for the keys. Fernet uses 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication.

Fernet Cipher

Fernet Cipher is a symmetric encryption method which makes sure that the message encrypted cannot be manipulated/read without the key. It uses URL safe encoding for the keys. Fernet uses 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication.
ChaCha Cipher is a stream cipher designed by Daniel J. Bernstein. It is a variant of the Salsa stream cipher. Several parameterizations exist; 'ChaCha' may refer to the original construction, or to the variant as described in RFC-8439.

ChaCha Cipher

ChaCha Cipher is a stream cipher designed by Daniel J. Bernstein. It is a variant of the Salsa stream cipher. Several parameterizations exist; 'ChaCha' may refer to the original construction, or to the variant as described in RFC-8439.