Exhibit 19 of 37 WWI · March 1918 Broken

ADFGX Cipher

Germany's front-line WWI cipher — broken in weeks by one exhausted Frenchman

InventorColonel Fritz Nebel · German Army
YearMarch 1918
Key TypePolybius key square + columnar key
Broken ByGeorges Painvin · 1918 · Differential frequency analysis
Modern LessonSubstitution + transposition = modern cipher rounds

Why This Matters

The ADFGX cipher was Germany's front-line field cipher during the critical 1918 Spring Offensive. Its rapid cryptanalysis by French Lieutenant Georges Painvin — working under extreme exhaustion — may have altered the outcome of World War I.

📜Historical Context

As Germany prepared its 1918 Spring Offensive, Colonel Fritz Nebel designed the ADFGX cipher for front-line use. The letters A, D, F, G, X were specifically chosen because they sound very distinct in Morse code — reducing the risk of garbled transmissions misreading one letter as another.

French cryptanalyst Georges Painvin broke the cipher within weeks of its introduction, despite working under extreme pressure with limited ciphertext. When ADFGVX replaced it in June 1918, Painvin broke that version too — an achievement that may have changed the outcome of WWI.

⚙️How It Works
Step 1: Polybius substitution using 5×5 square
        Each letter → pair from {A,D,F,G,X}
        H → AF   E → DA   L → GX

Step 2: Columnar transposition with keyword
        Write pairs in rows, read by column order

HELLO → AF DA GX GX FD → columnar → ciphertext
STEP 1: POLYBIUS SQUARE ADFGX AP R I V A STEP 2: COLUMNAR TRANSPOSITION Write pairs in rows Read by keyed column order AF DA GX GX FD → reorder H E L L O AF DA GX GX FD COLUMNAR CIPHERTEXT
Two-step process: Polybius substitution (letters → pairs) then columnar transposition (reorder columns by keyword)
💀How It Was Broken
Painvin's Differential Analysis (1918)
Complexity: Hard · Broken under wartime pressure

Painvin exploited repeated message headers and known message structures (military traffic had predictable formats) to identify probable plaintext positions. He used differential frequency analysis across multiple messages with the same key to gradually recover first the transposition key, then the substitution square. The attack required enormous amounts of intercepted traffic and days of continuous work.

🔬What It Teaches Modern Cryptography
Concept from ADFGX CipherModern Evolution
Polybius substitution → columnar transpositionAES: SubBytes (substitution) → ShiftRows/MixColumns (permutation) every round
5-letter output alphabet (A,D,F,G,X)Binary encoding: all modern ciphers operate on bits (2-symbol alphabet)
Field-usable designHardware cipher implementations optimize for speed and resource constraints
Quick Facts
Exhibit19 of 37
EraWWI · March 1918
SecurityBroken
InventorColonel Fritz Nebel · German Army
YearMarch 1918
Key TypePolybius key square + columnar key
Broken ByGeorges Painvin · 1918 · Differential frequency analysis
← Previous Nihilist Cipher