Search for a tool
Collon Cipher

Tool to decrypt/encrypt with Collon cipher. Colon cipher is an encryption system using a grid and a conversion of letters into bigrams.

Results

Collon Cipher -

Tag(s) : Polygrammic Cipher, GRID_CIPHER

Share
dCode and more

dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!

Feedback and suggestions are welcome so that dCode offers the best 'Collon Cipher' tool for free! Thank you!

# Collon Cipher

## Collon Encoder

### What is the Collon cipher? (Definition)

The Colon cipher is a polygrammic (a letter is replaced by a bigram) and polyalphabetic (the bigram can change) associated with a transposition. Using a grid, Collon's cipher is similar to Polybius' square, but whose coordinates are the letters of the grid.

### How to encrypt using Collon cipher?

Collon encryption uses a grid (usually 5x5) and requires a number N to separate the text into sets of N letters.

Example: Encrypt DCODE with series of N=2, ie DC/OD/E and the grid

1 2 3 4 5 \ A B C D E F G H I K L M N O P Q R S T U V W X Y Z

For each series of N characters, and for each letter in the series, start by locating the letter in the grid and note the letter at the beginning of the row and the letter at the bottom of the column.

Example:

LetterLeft of RowBottom of column
DAY
CAX

Once the series has been completed, write consecutively in the encrypted message the N rows headers and the N bottom of columns found.

Example: DCO is encrypted AA,YX
The complete encrypted message is AAYXLAYYAZ.

### How to decrypt a Collon cipher?

Deciphering Collon requires knowledge of the grid and the number N.

Example: Decrypt AKKXZVKKKVZY, with N=3 and the grid

1 2 3 4 5 \ A B C D E F G H I J K L M N O P Q R S T U V X Y Z

Split the message into groups of size letters 2N then split each group into 2, to obtain 2 subgroups of N letters.

Example: AKKXZV,KKKVZY then AKK,XZV (for the first group)

Take the nth letters of each subgroup to get N bigrams

Example: AX,KZ,KV

For each bigram (L1,L2), locate the letter at the intersection of the row containing L1 and the column containing L2

Example: The letter at the intersection of the row containing A and the column containing K is the letter C (letter of the plain message)

Repeat the operation to find each letter of the plain message.

Example: The plain text is COLLON

### How to recognize a Collon ciphertext? (Cryptanalysis)

A Collon cipher message is:

— of even length

— composed of 9 distinct characters (at most)

— composed of blocks of N characters containing 5 distinct characters (at most)

### How to decipher Collon without the grid?

It is possible to find the letters forming the first column and the last row by testing all possible series lengths from 1 to n / 2 (or n = length of the ciphertext).

For each series length, it is possible to reconstitute the bigrams and to test their validity (9 maximum characters, 5 characters at the beginning and at the end, 1 single common character, etc.)

Thus, for lengths that do not conflict with the encryption rules, the letters of the first column and the last row can be deduced.

It is then possible to create a grid and attack the cryptogram as a simple substitution number.

Example: If the encryption grid consists of a keyword not interfering with the composition of the last row of the grid (less than 20 distinct letters), then the letters of the last row will follow the alphabetical order ( and will often be UVXYZ if the W is omitted).

If a bigram consists of a double letter (example AA), then the plain letter corresponding to the encrypted bigram is the letter (example UU gives U).

### What are the variants of the Collon cipher?

The cipher has several possible variants

— the use of other coordinates than the left of the row and the bottom of column (top of column, right/end of row, etc.)

— the reverse order of the coordinates, invert the coordinated letter of the row and the coordinated letter of the column

— the use of a variable N value (not available on dCode)

## Source code

dCode retains ownership of the "Collon Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "Collon Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Collon Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Collon Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.

## Cite dCode

The copy-paste of the page "Collon Cipher" or any of its results, is allowed (even for commercial purposes) as long as you credit dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
Collon Cipher on dCode.fr [online website], retrieved on 2024-06-18, https://www.dcode.fr/collon-cipher

## Need Help ?

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!