Bifid Cipher

Keysquare
Period

Bifid Cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle, a Frenchman who invented several ciphers including the bifid, trifid, and four-square ciphers.


How it works?

First, a mixed alphabet Polybius square is drawn up, where the I and the J share their position:

  1 2 3 4 5
1 B G W K Z
2 Q P N D S
3 I O A X E
4 F C L U M
5 T H Y V R

The message is converted to its coordinates in the usual manner, but they are written vertically beneath:

F L E E A T O N C E
4 4 3 3 3 5 3 2 4 3
1 3 5 5 3 1 2 3 2 5

They are then read out in rows:

4 4 3 3 3 5 3 2 4 3 1 3 5 5 3 1 2 3 2 5

Then divided up into pairs again, and the pairs turned back into letters using the square:

44 33 35 32 43 13 55 31 23 25
U  A  E  O  L  W  R  I  N  S

In this way, each ciphertext character depends on two plaintext characters, so the bifid is a digraphic cipher, like the Playfair Cipher. To decrypt, the procedure is simply reversed.

Longer messages are first broken up into blocks of fixed length, called the period, and the above encryption procedure is applied to each block. One way to detect the period uses bigram statistics on ciphertext letters separated by half the period. For even periods, p, as in the example above (p=10), ciphertext letters at a distance of p/2 are influenced by two plaintext letters (e. g., U and W are influenced by F and T), but for odd periods, p, ciphertext letters at distances of p/2 (rounded either up or down) are influenced by three plaintext letters. Thus, odd periods are more secure than even against this form of cryptanalysis, because it would require more text to find a statistical anomaly in trigram plaintext statistics than bigram plaintext statistics. [Wikipedia]


Featured Tools

Featured tools that you might find useful.

Popular Tools

List of popular tools that users love and frequently use.

New Tools

The latest tools added to our collection, designed for you.

Topics

The tools grouped by topics to quickly find what you need.
ChaCha Cipher is a stream cipher designed by Daniel J. Bernstein. It is a variant of the Salsa stream cipher. Several parameterizations exist; 'ChaCha' may refer to the original construction, or to the variant as described in RFC-8439.

ChaCha Cipher

ChaCha Cipher is a stream cipher designed by Daniel J. Bernstein. It is a variant of the Salsa stream cipher. Several parameterizations exist; 'ChaCha' may refer to the original construction, or to the variant as described in RFC-8439.
LS47 Cipher is a slight improvement of the ElsieFour cipher as described by Alan Kaminsky. It use 7x7 characters instead of original (barely fitting) 6x6, to be able to encrypt some structured information. It also describe a simple key-expansion algorithm, because remembering passwords is popular.

LS47 Cipher

LS47 Cipher is a slight improvement of the ElsieFour cipher as described by Alan Kaminsky. It use 7x7 characters instead of original (barely fitting) 6x6, to be able to encrypt some structured information. It also describe a simple key-expansion algorithm, because remembering passwords is popular.
RC2 (also known as ARC2) is a symmetric-key block cipher designed by Ron Rivest in 1987. 'RC' stands for 'Rivest Cipher'.

RC2 Cipher

RC2 (also known as ARC2) is a symmetric-key block cipher designed by Ron Rivest in 1987. 'RC' stands for 'Rivest Cipher'.
Characters Escape & Unescape can escapes special characters in a string so that they do not cause conflicts, and unescapes Characters in a string that have been escaped.

Characters Escape & Unescape

Characters Escape & Unescape can escapes special characters in a string so that they do not cause conflicts, and unescapes Characters in a string that have been escaped.