Exhibit 08 of 37 Victorian · 1857 Broken

Beaufort Cipher

The cipher that encrypts and decrypts with the same operation

InventorAdmiral Sir Francis Beaufort
Year1857
Key TypeRepeating keyword
Broken ByKasiski Examination · Index of Coincidence
Modern LessonSymmetric operations in stream ciphers

Why This Matters

The Beaufort cipher is a Vigenère variant with an elegant reciprocal property: the same operation both encrypts and decrypts. Used by the Royal Navy, it demonstrated that cipher design could prioritize operational simplicity without adding new vulnerability.

📜Historical Context

Sir Francis Beaufort — famous for the Beaufort wind scale — devised a variant of the Vigenère cipher with an elegant property: the same operation encrypts and decrypts. Where Vigenère adds key to plaintext modulo 26, Beaufort subtracts plaintext from key. Because of this reciprocal property, you never need to switch between an encryption and decryption mode.

Beaufort's cipher was used by the British Royal Navy and represents one of the cleaner historical cipher designs. Its weakness is identical to Vigenère's: the repeating key creates detectable periodicity.

⚙️How It Works

The Beaufort cipher uses a tabula recta like Vigenère but with a different lookup direction:

Vigenère: C = (P + K) mod 26
Beaufort: C = (K - P + 26) mod 26

Key:    S  E  C  R  E  T
Plain:  H  E  L  L  O  W
Cipher: K  A  R  G  A  N

Because subtraction is its own inverse: Decrypt(C, K) = Encrypt(C, K). This makes key management simpler — operators only need one table.

VIGENÈRE C = (P + K) mod 26 BEAUFORT C = (K − P) mod 26 ★ Beaufort is reciprocal: Enc(P) = Dec(C) with same key Key=S Plain=H → C = (S−H) = (18−7) = 11 = L | C=L → P = (S−L) = (18−11) = 7 = H ✓
Subtraction instead of addition makes Beaufort self-inverse — encryption and decryption are the same operation
💀How It Was Broken
Kasiski Examination
Complexity: Moderate

The Beaufort cipher shares Vigenère's fatal flaw: the repeating key. Identical plaintext segments that align with identical key segments produce identical ciphertext. Kasiski's method finds the key length; Index of Coincidence confirms it; frequency analysis recovers each key letter.

🔬What It Teaches Modern Cryptography
Concept from Beaufort CipherModern Evolution
Reciprocal operation (encrypt = decrypt)XOR: the foundation of all modern stream ciphers (A XOR B XOR B = A)
Key-driven alphabet selectionPRNG keystream: cryptographically random key material per position
Repeating key weaknessModern ciphers use nonce + counter to ensure keystream never repeats
Quick Facts
Exhibit08 of 37
EraVictorian · 1857
SecurityBroken
InventorAdmiral Sir Francis Beaufort
Year1857
Key TypeRepeating keyword
Broken ByKasiski Examination · Index of Coincidence
← Previous Vigenère Cipher