Tool to decrypt/encrypt with Bellaso. Bellaso cipher created by Giovanni Battista Bellaso is a cryptographic poly-alphabetic process using one or two keys and adapted to the italian alphabet
Bellaso Cipher - dCode
Tag(s) : Poly-Alphabetic Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Tool to decrypt/encrypt with Bellaso. Bellaso cipher created by Giovanni Battista Bellaso is a cryptographic poly-alphabetic process using one or two keys and adapted to the italian alphabet
Bellaso encryption uses an alphabet, a key to generate N alphabets from the first one and a cipher key.
The original author used the latin alphabet with 20 letters ABCDEFGHILMNOPQRSTVX
Example: Encrypt DCODE ME with the alphabet ABCDEFGHILMNOPQRSTVX, the generation key CHIAVEALPHABET for 5 alphabets and CHIAVE the ciphering key.
The message is split into words. For the nth word of the message, get the nth letter of the key (modulo key length) and substitute using the alphabet for the nth letter.
Example: Word 1 : DCODE, Word 2 = ME
1st letter of the key : C, alphabet for C = CHIAVDFGMN/ELPBTOQRSX, DCODE becomes OEDOC
2nd letter of the key : H, alphabet for H = CHIAVDFGMN/XELPBTOQRS, ME becomes RH
The message is encrypted OEDOC RH
Bellaso decryption is identical to encryption.
To decrypt, take distinct letters of the generating key and split it in half
Example: CHIAVEALPHABET becomes CHIAVELPBT so CHIAV and ELPBT
The two parts are filled with remaining letters in order to make it reversible
Example: CHIAVDFGMN/ELPBTOQRSX
To generate the next N-1 alphabets, keep the first part but make a rotation of i times n characters of the second part.
Example: i=1, n=1, ELPBTOQRSX becomes XELPBTOQRS
i=2, n=1, ELPBTOQRSX becomes SXELPBTOQR
For each letter of the alphabet 1 is associated one of the N generated alphabet, in order, ie, the first letter is associated to the first alphabet, the second letter to the second alphabet, etc.
Example: For N=5 alphabets, C,H,I,A,V,D,F,G,M,N,E,L,P,etc. are associated, respectively to alphabets 1,2,3,4,5,1,2,3,4,5,1,2,3,etc.
The ciphered message has a smaller index of coincidence than to the language of the plaintext.
In its original version, only 20 characters are used (latin alphabet, U=V)
In its original version, the message use a word-separator (space).
Clues on Italy or Vigenere are not to be neglected.
It is hard. However it is possible to find the number N of alphabet by analyzing frequency of one word out of N.
A book from Giovanni Battista Bellaso describing the process is dated 1553.
dCode retains ownership of the online 'Bellaso Cipher' tool source code. Except explicit open source licence (indicated CC / Creative Commons / free), any algorithm, applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, translator), or any function (convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (PHP, Java, C#, Python, Javascript, Matlab, etc.) no data, script or API access will be for free, same for Bellaso Cipher download for offline use on PC, tablet, iPhone or Android !
Please, check our community Discord for help requests!