Tool to decrypt/encrypt with Collon cipher. Colon cipher is an encryption system using a grid and a conversion of letters into bigrams.
Collon Cipher - dCode
Tag(s) : Polygrammic Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Collon encryption uses a grid (usually 5x5) and requires a number N to separate the text into sets of N letters.
Example: Encrypt DCODE with series of N=2, ie DC/OD/E and the grid
For each series of N characters, and for each letter in the series, start by locating the letter in the grid and note the letter at the beginning of the row and the letter at the bottom of the column.
|Letter||Left of Row||Bottom of column|
Once the series has been completed, write consecutively in the encrypted message the N headers of lines and the N bottom of columns found.
Example: DCO is encrypted AA,YX
The complete encrypted message is AAYXLAYYAZ.
Deciphering Collon requires knowledge of the grid and the number N.
Example: Decrypt AKKXZVKKKVZY, with N=3 and the grid
Split the message into groups of size letters 2N then split each group into 2, to obtain 2 subgroups of N letters.
Example: AKKXZV,KKKVZY then AKK,XZV (for the first group)
Take the nth letters of each subgroup to get N bigrams
For each bigram (L1,L2), locate the letter at the intersection of the line containing L1 and the column containing L2
Example: The letter at the intersection of the line containing A and the column containing K is the letter C (letter of the plain message)
Repeat the operation to find each letter of the plain message.
Example: The plain text is COLLON
A Collon cipher message is:
— of even length
— composed of 9 distinct characters (at most)
— composed of blocks of N characters containing 5 distinct characters (at most)
It is possible to find the letters forming the first column and the last line by testing all possible series lengths from 1 to n / 2 (or n = length of the ciphertext).
For each series length, it is possible to reconstitute the bigrams and to test their validity (9 maximum characters, 5 characters at the beginning and at the end, 1 single common character, etc.)
Thus, for lengths that do not conflict with the encryption rules, the letters of the first column and the last line can be deduced.
It is then possible to create a grid and attack the cryptogram as a simple substitution number.
Example: If the encryption grid consists of a keyword not interfering with the composition of the last row of the grid (less than 20 distinct letters), then the letters of the last line will follow the alphabetical order ( and will often be UVXYZ if the W is omitted).
The cipher has several possible variants
— the use of other coordinates than the left of the row and the bottom of column (top of column, right/end of row, etc.)
— the reverse order of the coordinates, invert the coordinated letter of the row and the coordinated letter of the column
— the use of a variable N value (not available on dCode)
The copy-paste of the page "Collon Cipher" or any of its results, is allowed as long as you cite the online source
Reminder : dCode is free to use.