Hall IV · 19th – Early 20th Century

Transposition & Fractionation

Rearranging the message instead of replacing its letters

Substitution ciphers replace letters — but their frequencies always leak. What if instead you kept the letters but scrambled their positions? Transposition ciphers do exactly this. Combined with fractionation — splitting each letter into coordinate pieces before rearranging — these systems produced some of the most sophisticated manual ciphers ever designed, and directly inspired the diffusion layers in modern block ciphers.

19th Century WWI 3 Hard-to-Break Exhibits
🚂

Transposition vs Substitution: Substitution replaces letters (A→Q), preserving positions. Transposition keeps letters but moves them (position 1→7). Both methods preserve statistical information — substitution preserves frequency, transposition preserves frequency too. The letters are all still there. Only their arrangement changes.

Rail Fence Cipher — "HELLOWORLD" on 3 rails

H
·
·
·
O
·
·
·
L
·
·
E
·
L
·
W
·
R
·
D
·
·
L
·
·
·
O
·
·
·

Read row by row: HOL · ELWRD · LO → Ciphertext: HOLELWRDLO

Modern Connection

Transposition Lives in Every Modern Block Cipher

🔀ShiftRows in AES

AES's ShiftRows step cyclically shifts the rows of its 4×4 state matrix — a direct descendant of columnar transposition. Every byte's position changes, ensuring that input patterns don't propagate directly to output patterns.

🧮MixColumns = Fractionation

AES's MixColumns operation mixes the four bytes of each column using matrix multiplication over GF(2⁸) — exactly the fractionation principle from Bifid, made mathematically rigorous and non-linear.

🔁Diffusion

Shannon defined "diffusion" as spreading the influence of each plaintext bit across many ciphertext bits. Double transposition approximates this. AES achieves it completely: after 2 rounds, every output bit depends on every input bit.

← Previous Hall Hall III: Polyalphabetic Revolution