Transposition ciphers

Transposition encryption methods involve rearranging data to be encrypted to make them incomprehensible. This may mean, for example, geometrically re-ordering data to make them visually unusable.

The Assyrian technique

The Assyrian cipher technique is probably the main proof that encryption methods were used in Greece as early as 600 BC to disguise messages written on papyrus strips.

encryption using a scytale

The technique involved:

  • rolling a strip of papyrus around a cylinder called a scytale;
  • writing the text lengthwise on the rolled strip (the message in the example shown above is "comment ça marche").
The message, when unrolled, is no longer meaningful ("cecaeonar mt c m mh"). The recipient simply has to have a cylinder with the same diameter to be able to decrypt the message. In reality, a code-breaker (there were code-breakers at the time!) can decrypt the message by trying cylinders with a series of different diameters; this means the method can be broken statistically (the characters just need to be taken one by one, separated by a certain distance).
Ask a question
CCM is a leading international tech website. Our content is written in collaboration with IT experts, under the direction of Jean-François Pillou, founder of CCM.net. CCM reaches more than 50 million unique visitors per month and is available in 11 languages.
This document, titled « Transposition ciphers », is available under the Creative Commons license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM (ccm.net).