Exhibit 16 of 37 1902 Broken

Trifid Cipher

Bifid extended to three dimensions — the 3×3×3 cube

InventorFelix Delastelle
Year1902
Key Type3×3×3 keyword cube
Broken ByStatistical analysis
Modern Lesson3D lookup tables in modern cipher design

Why This Matters

Delastelle’s Trifid extended the Bifid into three dimensions — using a 3×3×3 cube instead of a 5×5 square — achieving even greater diffusion by weaving three coordinate streams together before converting back to letters.

📜Historical Context

Delastelle extended his Bifid cipher one year later by adding a third dimension. Where Bifid used a 5×5 square (25 cells for 25 letters, I/J shared), Trifid uses a 3×3×3 cube (27 cells for 26 letters plus one null). Each letter becomes three coordinates: layer, row, and column. These three streams are woven together across the message before being converted back.

⚙️How It Works
3×3×3 cube: each letter has coordinates (layer, row, col)

A=(1,1,1)  B=(1,1,2)  C=(1,1,3)
D=(1,2,1)  E=(1,2,2)  F=(1,2,3)
...

HELLO encrypted:
1. Get L,R,C coordinates for each letter
2. Write all L values, then R values, then C values
3. Group into triples, look up in cube
3x3x3 CUBE (3 LAYERS) Layer 1 A B C D E F G H I Layer 2 J K L M..R Layer 3 S T U V..Z+ ENCRYPTION PROCESS: H = (1,3,2) E = (1,2,2) L = (2,1,3) Layers: 1 1 2 → concatenate Rows: 3 2 1 → all three Cols: 2 2 3 → streams Regroup into triples: (1,1,2)(3,2,1)(2,2,3) → look up each in cube
Three coordinate streams (layer, row, column) are interleaved — 3D diffusion is stronger than Bifid's 2D
💀How It Was Broken
Statistical Cryptanalysis
Complexity: Hard — more so than Bifid

The three-dimensional fractionation creates stronger diffusion than Bifid. Each ciphertext letter depends on three plaintext letters' coordinates woven together. Modern solvers use hill climbing with trigram statistics but require more ciphertext than Bifid attacks.

🔬What It Teaches Modern Cryptography
Concept from Trifid CipherModern Evolution
3D coordinate systemMulti-dimensional bit manipulations in modern hash functions
Three-stream interleavingAES: 4 operations per round create multi-dimensional diffusion
Larger coordinate space than BifidIncreasing output size increases security: SHA-256 vs SHA-512
Quick Facts
Exhibit16 of 37
Era1902
SecurityBroken
InventorFelix Delastelle
Year1902
Key Type3×3×3 keyword cube
Broken ByStatistical analysis
← Previous Bifid Cipher