Exhibit 39 of 137 Ancient · ~500 BC Trivial

Atbash

The ancient Hebrew reflection cipher — A↔Z, B↔Y, C↔X…

OriginHebrew scribes (Book of Jeremiah)
Year~500 BC
Key TypeNone (fixed reflection)
Broken ByInspection (it is its own inverse)
Modern LessonCiphers without keys offer no security

Why This Matters

Atbash is the simplest substitution cipher: A maps to Z, B to Y, on through M↔N. It appears inside the Hebrew Bible — the prophet Jeremiah uses Atbash to disguise the names BABEL and KASDIM as SHESHACH (Jeremiah 25:26 and 51:41) and LEB-KAMAI (Jeremiah 51:1). It is the ancestor of every reflection-based cipher that followed, including the wirings inside Enigma's reflector.

📜Historical Context

Atbash predates the Caesar cipher by half a millennium. Because it is its own inverse — encrypting twice returns the original — it is the historical root of the "involution" property that later appears in many machines (Enigma, Lorenz). It offered minimal secrecy even in its day; its purpose was likely religious or scribal convention rather than security.

⚙️How It Works

Replace each letter with its mirror across the alphabet:

A B C D E F G H I J K L M
| | | | | | | | | | | | |
Z Y X W V U T S R Q P O N
So HELLO → SVOOL. Encrypt twice and you are back where you started.

💀How It Was Broken
Recognition
Complexity: Trivial

There is no key. Anyone who recognizes the system can decrypt instantly. Frequency analysis is not even needed — the unique letter pattern of A↔Z reflection is visible at a glance once a reader knows the trick.

🔬What It Teaches Modern Cryptography
Concept from AtbashModern Evolution
Self-inverse operationXOR in modern stream ciphers — same operation encrypts and decrypts
Reflector conceptEnigma's Umkehrwalze (reflector) made the machine reciprocal
Security through obscurity failsKerckhoffs' principle: only the key should be secret
Quick Facts
Exhibit39 of 49
EraAncient · ~500 BC
SecurityTrivial
OriginHebrew scribes (Book of Jeremiah)
Year~500 BC
Key TypeNone (fixed reflection)
Broken ByInspection (it is its own inverse)
Modern LessonCiphers without keys offer no security
🎬Culture Link: Atbash in Modern Fiction

Atbash appears repeatedly in puzzle fiction because it is both discoverable and dramatic. See Hall XIII's Da Vinci Code exhibit for how simple substitution layers are staged as "ancient mysteries" in modern thriller narratives.

← Previous Polybius Square