Exhibit 13 of 37 19th Century Broken

Columnar Transposition

Write in rows, read by columns — letter frequencies preserved, positions scrambled

InventorVarious 19th century cryptographers
Year~1800s
Key TypeColumn-ordering keyword
Broken ByFrequency analysis · Anagramming
Modern LessonColumn-mixing in AES MixColumns

Why This Matters

Columnar transposition was the workhorse of 19th-century military cryptography — simple enough to perform in the field without equipment, yet resistant enough to casual interception to protect battlefield communications through World War I.

📜Historical Context

Columnar transposition became the workhorse of 19th-century military cryptography. Simple enough to perform in the field without equipment, it resists casual interception while remaining fast to encrypt and decrypt. The system was used by various military forces throughout the 1800s and into WWI, often combined with substitution ciphers for added security.

⚙️How It Works

Write the message in rows across a grid whose width is the keyword length. Number the columns by alphabetical order of the keyword letters. Read off columns in that numbered order.

Keyword: ZEBRA → Z=5, E=2, B=1, R=4, A=3
Columns:  5  2  1  4  3
          W  E  A  T  H
          E  R  F  O  R
          C  A  S  T  I
          N  G  X  X  X

Read col 1(B): AFSX
Read col 2(E): ERAG
Read col 3(A): HRIX
Read col 4(R): OTXX
Read col 5(Z): WECN
Write in rows → Read by column order ↓ Z E B R A 5 2 1 4 3 WEATH ERFOR CASTI NGXXX Output: AFSX · ERAG · HRIX · OTXX · WECN Col 1 (B): A F S X Col 2 (E): E R A G Col 3 (A): H R I X Col 4 (R): O T X X Col 5 (Z): W E C N
Columnar transposition: plaintext fills a grid by rows, then columns are read in keyword-alphabetical order
💀How It Was Broken
Frequency Analysis + Anagramming
Complexity: Moderate

Because transposition preserves all original letters, the ciphertext has the same letter frequency distribution as English plaintext. This immediately identifies it as a transposition cipher. With enough ciphertext, the column width can be determined and columns rearranged using digram/trigram frequency analysis.

🔬What It Teaches Modern Cryptography
Concept from Columnar TranspositionModern Evolution
Column reorderingAES ShiftRows: cyclic column position shifts
Grid-based permutationNetwork permutation layers in Feistel ciphers
Keyword-controlled orderKey-scheduled permutation in AES key expansion
Quick Facts
Exhibit13 of 37
Era19th Century
SecurityBroken
InventorVarious 19th century cryptographers
Year~1800s
Key TypeColumn-ordering keyword
Broken ByFrequency analysis · Anagramming
← Previous Rail Fence Cipher