Exhibit 13 of 139 19th Century Broken

Columnar Transposition

Write in rows, read by columns — letter frequencies preserved, positions scrambled

InventorVarious 19th century cryptographers
Year~1800s
Key TypeColumn-ordering keyword
Broken ByFrequency analysis · Anagramming
Modern LessonColumn-mixing in AES MixColumns

Why This Matters

Columnar transposition was the workhorse of 19th-century military cryptography — simple enough to perform in the field without equipment, yet resistant enough to casual interception to protect battlefield communications through World War I.

📜Historical Context

Columnar transposition became the workhorse of 19th-century military cryptography. Simple enough to perform in the field without equipment, it resists casual interception while remaining fast to encrypt and decrypt. The system was used by various military forces throughout the 1800s and into WWI, often combined with substitution ciphers for added security.

⚙️How It Works

Write the message in rows across a grid whose width is the keyword length. Number the columns by alphabetical order of the keyword letters. Read off columns in that numbered order.

Keyword: ZEBRA → Z=5, E=2, B=1, R=4, A=3
Columns:  5  2  1  4  3
          W  E  A  T  H
          E  R  F  O  R
          C  A  S  T  I
          N  G  X  X  X

Read col 1(B): AFSX
Read col 2(E): ERAG
Read col 3(A): HRIX
Read col 4(R): OTXX
Read col 5(Z): WECN
Write in rows → Read by column order ↓ Z E B R A 5 2 1 4 3 WEATH ERFOR CASTI NGXXX Output: AFSX · ERAG · HRIX · OTXX · WECN Col 1 (B): A F S X Col 2 (E): E R A G Col 3 (A): H R I X Col 4 (R): O T X X Col 5 (Z): W E C N
Columnar transposition: plaintext fills a grid by rows, then columns are read in keyword-alphabetical order
Columnar transposition cipher grid showing plaintext arranged in rows and read by keyword-ordered columns
Columnar transposition grid — arranging plaintext in keyword-width rows and reading columns alphabetically. Illustration: Google Gemini AI
💀How It Was Broken
Frequency Analysis + Anagramming
Complexity: Moderate

Because transposition preserves all original letters, the ciphertext has the same letter frequency distribution as English plaintext. This immediately identifies it as a transposition cipher. With enough ciphertext, the column width can be determined and columns rearranged using digram/trigram frequency analysis.

🔬What It Teaches Modern Cryptography
Concept from Columnar TranspositionModern Evolution
Column reorderingAES ShiftRows: cyclic column position shifts
Grid-based permutationNetwork permutation layers in Feistel ciphers
Keyword-controlled orderKey-scheduled permutation in AES key expansion
Quick Facts
Exhibit13 of 40
Era19th Century
SecurityBroken
InventorVarious 19th century cryptographers
Year~1800s
Key TypeColumn-ordering keyword
Broken ByFrequency analysis · Anagramming
🧭Transposition Variants

Classical transposition practice includes route systems, regular columnar, Myszkowski ordering, and compound forms such as double transposition. Each variant preserves letter frequencies while changing positional structure.

The Nihilist transposition family extends these ideas into numbered-grid operations, showing how small procedural tweaks can significantly change attack difficulty.

← Previous Rail Fence Cipher