Double Transposition
Two columnar transpositions — the permutation space becomes astronomical
Why This Matters
Double transposition dramatically multiplied the keyspace of columnar transposition and was used extensively by military forces in both World Wars. It remains one of the hardest classical ciphers to crack automatically, even with modern computers.
The German military recognized that a single columnar transposition was breakable and responded with the obvious solution: do it twice with different keys. The combined permutation creates a dramatically larger effective keyspace. Messages encrypted with double transposition were used extensively in WWI and remained in limited military use through WWII.
Even modern computer attacks struggle with double transposition when the ciphertext is short and the key lengths are unknown. It remains one of the hardest classical ciphers to crack automatically.
Apply columnar transposition twice using two different keywords:
Step 1: Apply columnar transposition with key MARK Step 2: Apply columnar transposition with key LION The resulting permutation of n characters has approximately (k1! × k2!) possible arrangements where k1, k2 are the key lengths.
A 7-letter key gives 5,040 possible column orders. Two such keys give ~25 million combinations — far beyond manual brute force.
Modern solvers use hill climbing: start with random keys, score the decryption using English n-gram statistics, mutate the keys, and keep improvements. For double transposition with unknown key lengths, this requires millions of iterations and can fail on short messages where statistical signals are weak.
| Concept from Double Transposition | Modern Evolution |
|---|---|
| Two-pass permutation | AES applies 10–14 rounds of operations — multiple passes through cipher structure |
| Large combined keyspace | AES 128-bit key: 2¹²⁸ possible keys — exponentially larger |
| No substitution, only permutation | AES combines SubBytes (substitution) + ShiftRows/MixColumns (permutation) every round |
| Exhibit | 14 of 37 |
| Era | WWI · Germany |
| Security | Weak |
| Inventor | German Military Intelligence |
| Year | ~1914 |
| Key Type | Two columnar keywords |
| Broken By | Anagramming · Hill climbing (difficult) |