Porta Cipher

Keyword

Porta Cipher is a polyalphabetic substitution cipher invented by Giovanni Battista della Porta. Where the Vigenere cipher is a polyalphabetic cipher with 26 alphabets, the Porta is basically the same except it only uses 13 alphabets. The 13 cipher alphabets it uses are reciprocal, so enciphering is the same as deciphering.

How it works?

The 'key' for a porta cipher is a key word. e.g. 'FORTIFICATION'. The Porta Cipher uses the following tableau to encipher the plaintext:

  Keys| a b c d e f g h i j k l m n o p q r s t u v w x y z
  ---------------------------------------------------------
  A,B | n o p q r s t u v w x y z a b c d e f g h i j k l m
  C,D | o p q r s t u v w x y z n m a b c d e f g h i j k l
  E,F | p q r s t u v w x y z n o l m a b c d e f g h i j k 
  G,H | q r s t u v w x y z n o p k l m a b c d e f g h i j
  I,J | r s t u v w x y z n o p q j k l m a b c d e f g h i
  K,L | s t u v w x y z n o p q r i j k l m a b c d e f g h
  M,N | t u v w x y z n o p q r s h i j k l m a b c d e f g
  O,P | u v w x y z n o p q r s t g h i j k l m a b c d e f
  Q,R | v w x y z n o p q r s t u f g h i j k l m a b c d e
  S,T | w x y z n o p q r s t u v e f g h i j k l m a b c d
  U,V | x y z n o p q r s t u v w d e f g h i j k l m a b c
  W,X | y z n o p q r s t u v w x c d e f g h i j k l m a b
  Y,Z | z n o p q r s t u v w x y b c d e f g h i j k l m a

To encipher a message, repeat the keyword above the plaintext:

FORTIFICATIONFORTIFICATIONFO
DEFENDTHEEASTWALLOFTHECASTLE

Now we take the first key letter 'F', and find it on the first column (the key column containing two letters) on the tableau. Then, we move along the 'F' row of the tableau until we come to the column with the 'D' at the top (The 'D' is the first plaintext letter), the intersection is our ciphertext character, 'S'. The same process is repeated for all the characters.

So, the ciphertext for the above plaintext is:

FORTIFICATIONFORTIFICATIONFO
DEFENDTHEEASTWALLOFTHECASTLE
synnjscvrnrlahutukucvryrlany

You may notice that it is possible for two different keywords to produce exactly the same enciphered message. The encryption and decryption process for this cipher is identical, so encrypting a piece of text twice with the same key will return the original text.

Morse code is a system of communication that uses two different signal durations, called dots and dashes, to encode text characters. It was invented by Samuel F.B. Morse in the 1830s and became widely used for telegraphy, the transmission of messages over long distances by electric wires.

Morse Code

Morse code is a system of communication that uses two different signal durations, called dots and dashes, to encode text characters. It was invented by Samuel F.B. Morse in the 1830s and became widely used for telegraphy, the transmission of messages over long distances by electric wires.
SHA encryption is a term that refers to a family of cryptographic hash functions that are used to verify the integrity and authenticity of data. A hash function is a mathematical function that takes an input and produces a fixed-length output, called a hash or a digest, that is unique for each input. SHA encryption can be used to generate digital signatures, checksums, passwords and other security applications.

SHA Encrypt

SHA encryption is a term that refers to a family of cryptographic hash functions that are used to verify the integrity and authenticity of data. A hash function is a mathematical function that takes an input and produces a fixed-length output, called a hash or a digest, that is unique for each input. SHA encryption can be used to generate digital signatures, checksums, passwords and other security applications.
​PBKDF2 Encryption is a specific type of Password-Based Key Derivation Function Encryption (PBKDF Encryption) that uses a pseudorandom function, such as hash-based message authentication code (HMAC), to generate a derived key from a password or a passphrase

PBKDF2 Encrypt

​PBKDF2 Encryption is a specific type of Password-Based Key Derivation Function Encryption (PBKDF Encryption) that uses a pseudorandom function, such as hash-based message authentication code (HMAC), to generate a derived key from a password or a passphrase
Symmetric Encrypt & Decrypt Online Tool is a web online tool that allows you to encrypt and decrypt text using symmetric encryption algorithms such as AES, Triple DES and DES. Symmetric encryption is widely used for data protection, authentication and digital signatures.

Symmetric Encrypt & Decrypt

Symmetric Encrypt & Decrypt Online Tool is a web online tool that allows you to encrypt and decrypt text using symmetric encryption algorithms such as AES, Triple DES and DES. Symmetric encryption is widely used for data protection, authentication and digital signatures.