Transposition ciphers

May 2018
Transposition encryption methods involve rearranging data to be encrypted to make them incomprehensible. This may mean, for example, geometrically re-ordering data to make them visually unusable.

The Assyrian technique

The Assyrian cipher technique is probably the main proof that encryption methods were used in Greece as early as 600 BC to disguise messages written on papyrus strips.

encryption using a scytale

The technique involved:

  • rolling a strip of papyrus around a cylinder called a scytale;
  • writing the text lengthwise on the rolled strip (the message in the example shown above is "comment ça marche").
The message, when unrolled, is no longer meaningful ("cecaeonar mt c m mh"). The recipient simply has to have a cylinder with the same diameter to be able to decrypt the message. In reality, a code-breaker (there were code-breakers at the time!) can decrypt the message by trying cylinders with a series of different diameters; this means the method can be broken statistically (the characters just need to be taken one by one, separated by a certain distance).

Cifrado de transposición
Cifrado de transposición
Cryptage par transposition
Cryptage par transposition
Cifrario a trasposizione
Cifrario a trasposizione
Latest update on October 16, 2008 at 09:43 AM by Jeff.
This document, titled "Transposition ciphers," is available under the Creative Commons license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM (
Secure Sockets Layers (SSL)
The Vigenère cipher