Exhibit 10 of 37 17th Century Broken

Gronsfeld Cipher

Vigenère with numeric keys — simpler to memorize, easier to break

InventorCount Josef von Gronsfeld
Year~1650
Key TypeNumeric keyword (digits 0-9)
Broken ByKasiski · Only 10 possible shifts per position
Modern LessonKey alphabet size matters

Why This Matters

The Gronsfeld cipher illustrates a persistent tension in cryptography: usability versus security. Its numeric keys were easier for soldiers to memorize, but limiting shifts to 0–9 instead of 0–25 dramatically weakened the cipher.

📜Historical Context

Count Josef von Gronsfeld modified the Vigenère cipher to use numeric keys instead of letter keys. A soldier could memorize '31415' far more easily than 'LEMON'. The tradeoff: digits only give 10 possible shift values (0-9) instead of 26, dramatically weakening the cipher.

The Gronsfeld cipher illustrates a persistent tension in cryptography: usability versus security. A cipher that field operators can't remember correctly is useless — but a cipher that trades security for memorability may be worse than none.

⚙️How It Works
Key:    3  1  4  1  5  3  1  4
Plain:  A  T  T  A  C  K  A  T
Cipher: D  U  X  B  H  N  B  X

Formula: C = (P + digit) mod 26
Only 10 possible shifts per position (0-9)
KEY DIGITS 3 1 4 1 5 PLAIN A T T A C CIPHER D U X B H Vigenère: 26 shifts/position Gronsfeld: 10 shifts/position → 62% less keyspace per column
Digit-only keys (0–9) reduce each position's keyspace from 26 to 10 — making brute-force trivial once key length is found
💀How It Was Broken
Kasiski + Reduced Keyspace
Complexity: Easy

Gronsfeld shares Vigenère's periodicity weakness, but with only 10 possible shift values per position, each column's key digit can be found by testing just 10 possibilities instead of 26. A cryptanalyst with the key length (from Kasiski) can break each column in seconds.

🔬What It Teaches Modern Cryptography
Concept from Gronsfeld CipherModern Evolution
Digit keys (0-9)Key entropy matters: AES-256 uses 256-bit keys for 2²⁵⁶ possible values
Usability-security tradeoffModern KDFs (PBKDF2, Argon2) derive strong keys from memorable passwords
Small effective alphabetFull 256-byte S-box in AES uses all possible values uniformly
Quick Facts
Exhibit10 of 37
Era17th Century
SecurityBroken
InventorCount Josef von Gronsfeld
Year~1650
Key TypeNumeric keyword (digits 0-9)
Broken ByKasiski · Only 10 possible shifts per position
← Previous Porta Cipher