Generating mixed Alphabets
Most ciphers need to generate a mixed alphabet. CipherClerk's Applet offers some
algorithms to generate such mixed alphabets. Descriptions and examples
for the key word william and the normal, 26 letter alphabet
are given below.
This page depicts how a letter substitution scheme is generated.
If a mixed alphabet is required, the letters of the Cipher
line read left to right represent the letters of the mixed alphabet (from
the first to it's last letter).
Keyword mixed
The key word is written, but each letter is only written at it's first
appearance, e.g. william reduces to wilam. Finally all
letters not found in the key word are appended.
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
W |
I |
L |
A |
M |
B |
C |
D |
E |
F |
G |
H |
J |
K |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
X |
Y |
Z |
Keyword mixed transposition
The keyword is written as before all letters not found in the alphabet
are written blow the key word, each line holding no more characters than
the key word:
| W |
I |
L |
A |
M |
| B |
C |
D |
E |
F |
| G |
H |
J |
K |
N |
| O |
P |
Q |
R |
S |
| T |
U |
V |
X |
Y |
| Z |
|
|
|
|
Now the cipher alphabet is read column by column:
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
W |
B |
G |
O |
T |
Z |
I |
C |
H |
P |
U |
L |
D |
J |
Q |
V |
A |
E |
K |
R |
X |
M |
F |
N |
S |
Z |
Keyword mixed transposition variant
The procedure differs from the one given above only in the way that repeated
letters in the key word are left blank in the table:
| W |
I |
L |
_ |
_ |
A |
M |
| B |
C |
D |
E |
F |
G |
H |
| J |
K |
N |
O |
P |
Q |
R |
| S |
T |
U |
V |
X |
Y |
Z |
Again, the cipher alphabet is read column by column:
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
W |
B |
J |
S |
I |
C |
K |
T |
L |
D |
N |
U |
E |
O |
V |
F |
P |
X |
A |
G |
Q |
Y |
M |
H |
R |
Z |
Keyword mixed transposition variant 2
As before, repeated letters in the key word are left blank in the table.
Now all letters of the alphabet are written in the lines below the keyword,
leaving blanks for those letters already used in the key word:
| W |
I |
L |
_ |
_ |
A |
M |
| _ |
B |
C |
D |
E |
F |
G |
| H |
_ |
J |
K |
_ |
_ |
N |
| O |
P |
Q |
R |
S |
T |
U |
| V |
_ |
X |
Y |
Z |
|
|
Again, the cipher alphabet is read column by column:
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
W |
H |
O |
V |
I |
B |
P |
L |
C |
J |
Q |
X |
D |
K |
R |
Y |
E |
S |
Z |
A |
F |
T |
M |
G |
N |
U |
Columnar transposition
All letters of the key word are written. Numbers are assigned to these
letters according to there position in the alphabet and the key word. All
letters of the alphabet are written line by line below these numbers:
| W |
I |
L |
L |
I |
A |
M |
| 7 |
2 |
4 |
5 |
3 |
1 |
6 |
| A |
B |
C |
D |
E |
F |
G |
| H |
I |
J |
K |
L |
M |
N |
| O |
P |
Q |
R |
S |
T |
U |
| V |
W |
X |
Y |
Z |
|
|
The cipher alphabet is obtained by reading column by column in the order
of the numbers.
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
F |
M |
T |
B |
I |
P |
W |
E |
L |
S |
Z |
C |
J |
Q |
X |
D |
K |
R |
Y |
G |
N |
U |
A |
H |
O |
V |
Double Transposition
The procedure outlined above is applied twice. Using the result given above
we obtain:
| W |
I |
L |
L |
I |
A |
M |
| 7 |
2 |
4 |
5 |
3 |
1 |
6 |
| F |
M |
T |
B |
I |
P |
W |
| E |
L |
S |
Z |
C |
J |
Q |
| X |
D |
K |
R |
Y |
G |
N |
| U |
A |
H |
O |
V |
|
|
The cipher alphabet is obtained by reading column by column in the order
of the numbers.
| Plain |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
| Cipher |
P |
J |
G |
M |
L |
D |
A |
I |
C |
Y |
V |
T |
S |
K |
H |
B |
Z |
R |
O |
W |
Q |
N |
F |
E |
X |
U |