In transposition ciphers, messages are kept safe by moving small pieces (letters) of the message around. Here's a quick sample of a transposition cipher. See if you can figure out what transposition method was used in the second row of the message, "top secret." Here's the answer.
To learn about other types of transposition ciphers choose from these links.
An easy way to encode a message is to put the spaces in different spots. For example:
The message is: plan sneak attack
The secret code is: pla nsn eak att ack
message is divided into groups of 2, 3, 4 and 5 letters to make the message harder to
decipher. Be sure the person you
are sending the message to knows what cipher you are using.
way of encoding a message is to write it backwards. For example:
The message is: enemy attack
The secret code is: kcatta ymene
Be careful that your message is not the same forward as backwards. For example, don't write "too hot to hoot."
makes codes easier to decipher. Donít use it.
space cipher and the backward cipher are easy to decode, but the backward and
space cipher put together is harder. Itís simply doing both. For example:
The message is: Danger come back to base
The secret code is: es abo tkca bemo creg nad
create this cipher, the letters will be written in two rows. Zigzag the
letters up and down. Place the first letter in the top row, and the second
letter on the bottom row. Continue zigzagging the letters back-and-forth. Count
the letters in the message. If there is an odd number, add a dummy letter on the end.
The message is: great danger
Answer to transposition puzzle: Every two letters were switched with each other. Return to top of page.
Sarnoff, Jane and Reynold Ruffins. The Code and Cipher Book. New York: Charles Scribnerís Sons, 1975.
Copyrighted image of picket fence from "Microsoft Office Online" <http://office.microsoft.com/clipart/default.aspx?lc=en-us&cag=1> (October-March, 2004-2005). Clip art available only to licensed users for non-commercial purposes.
|Code and Cipher Basics| |Spies| |Bugs, Taps and Surveillance| |The Enigma Machine| |Invisible Ink| |Morse Code Cipher| |Picture Cipher| |Transposition Ciphers| |Pig Pen Cipher| |Hand Signal Code| |American Sign Language Code| |Jefferson's Wheel Cipher| |Substitute Cipher| |Alberti Cipher Wheels| |The Scytale Cipher| |Grid Cipher|