Tool to decrypt / encrypt with Porta cipher. Invented by an Italian physicist Della Porta, this poly alphabetical cipher changes of alphabet every letter.
Porta Cipher - dCode
Tag(s) : Poly-Alphabetic Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
The encryption by Porta uses a key and a series of 11 reversible alphabets each associated with 2 letters of the alphabet: A and B for the first, C and D for the second, and so on.
As Porta is Italian, its alphabet has only 22 letters: ABCDEFGHILMNOPQRSTVXYZ (missing J, K, U and W)
To use the Latin alphabet, the principle has been intrapolated to 26 letters and 13 alphabets.
Example: The alphabets used by default are:
AB | ABCDEFGHIJKLM NOPQRSTUVWXYZ |
CD | ABCDEFGHIJKLM ZNOPQRSTUVWXY |
EF | ABCDEFGHIJKLM YZNOPQRSTUVWX |
GH | ABCDEFGHIJKLM XYZNOPQRSTUVW |
IJ | ABCDEFGHIJKLM WXYZNOPQRSTUV |
KL | ABCDEFGHIJKLM VWXYZNOPQRSTU |
MN | ABCDEFGHIJKLM UVWXYZNOPQRST |
OP | ABCDEFGHIJKLM TUVWXYZNOPQRS |
QR | ABCDEFGHIJKLM STUVWXYZNOPQR |
ST | ABCDEFGHIJKLM RSTUVWXYZNOPQ |
UV | ABCDEFGHIJKLM QRSTUVWXYZNOP |
WX | ABCDEFGHIJKLM PQRSTUVWXYZNO |
YZ | ABCDEFGHIJKLM OPQRSTUVWXYZN |
The Porta algorithm consists of taking the first letter of the key, finding the corresponding alphabet, and making a substitution of the first letter of the plain text with this alphabet.
Example: Encrypt the message DCODE with the key PORTA. The first letter of the key P corresponds to the alphabet ABCDEFGHIJKLMTUVWXYZNOPQRS, which allows to substitute the letter D with W
The encryption is continued by taking the second letter of the key and the corresponding alphabet and substituting the second letter of the plain text, with this second alphabet and so on.
Example: DCODE is then encrypted WVJUR.
Decryption is the same as encryption if alphabets are reversible.
Since the original alphabet was Italian, it only had 22 letters, modernizing Porta to the current 26 letter alphabet is an interpolation.
Several sets of reversible alphabets are mentioned, including:
- (1) original version extrapolated (rotation of the second half of the alphabet to the right) :
NOPQRSTUVWXYZABCDEFGHIJKLM |
ZNOPQRSTUVWXYABCDEFGHIJKLM |
YZNOPQRSTUVWXABCDEFGHIJKLM |
XYZNOPQRSTUVWABCDEFGHIJKLM |
WXYZNOPQRSTUVABCDEFGHIJKLM |
VWXYZNOPQRSTUABCDEFGHIJKLM |
UVWXYZNOPQRSTABCDEFGHIJKLM |
TUVWXYZNOPQRSABCDEFGHIJKLM |
STUVWXYZNOPQRABCDEFGHIJKLM |
RSTUVWXYZNOPQABCDEFGHIJKLM |
QRSTUVWXYZNOPABCDEFGHIJKLM |
PQRSTUVWXYZNOABCDEFGHIJKLM |
OPQRSTUVWXYZNABCDEFGHIJKLM |
- (2) variant suggested by ACA (American Cryptogram Association) (rotation of the second half of the alphabet to the left):
NOPQRSTUVWXYZABCDEFGHIJKLM |
OPQRSTUVWXYZNABCDEFGHIJKLM |
PQRSTUVWXYZNOABCDEFGHIJKLM |
QRSTUVWXYZNOPABCDEFGHIJKLM |
RSTUVWXYZNOPQABCDEFGHIJKLM |
RSTUVWXYZNOPQABCDEFGHIJKLM |
TUVWXYZNOPQRSABCDEFGHIJKLM |
UVWXYZNOPQRSTABCDEFGHIJKLM |
VWXYZNOPQRSTUABCDEFGHIJKLM |
WXYZNOPQRSTUVABCDEFGHIJKLM |
XYZNOPQRSTUVWABCDEFGHIJKLM |
YZNOPQRSTUVWXABCDEFGHIJKLM |
ZNOPQRSTUVWXYABCDEFGHIJKLM |
- (3) variant (double rotation of the alphabet) :
NOPQRSTUVWXYZABCDEFGHIJKLM |
OPQRSTUVWXYZNMABCDEFGHIJKL |
PQRSTUVWXYZNOLMABCDEFGHIJK |
QRSTUVWXYZNOPKLMABCDEFGHIJ |
RSTUVWXYZNOPQJKLMABCDEFGHI |
STUVWXYZNOPQRIJKLMABCDEFGH |
TUVWXYZNOPQRSHIJKLMABCDEFG |
UVWXYZNOPQRSTGHIJKLMABCDEF |
VWXYZNOPQRSTUFGHIJKLMABCDE |
WXYZNOPQRSTUVEFGHIJKLMABCD |
XYZNOPQRSTUVWDEFGHIJKLMABC |
YZNOPQRSTUVWXCDEFGHIJKLMAB |
ZNOPQRSTUVWXYBCDEFGHIJKLMA |
- (4) variant (double rotation of the alphabet)
NOPQRSTUVWXYZABCDEFGHIJKLM |
ZNOPQRSTUVWXYBCDEFGHIJKLMA |
YZNOPQRSTUVWXCDEFGHIJKLMAB |
XYZNOPQRSTUVWDEFGHIJKLMABC |
WXYZNOPQRSTUVEFGHIJKLMABCD |
VWXYZNOPQRSTUFGHIJKLMABCDE |
UVWXYZNOPQRSTGHIJKLMABCDEF |
TUVWXYZNOPQRSHIJKLMABCDEFG |
STUVWXYZNOPQRIJKLMABCDEFGH |
RSTUVWXYZNOPQJKLMABCDEFGHI |
QRSTUVWXYZNOPKLMABCDEFGHIJ |
PQRSTUVWXYZNOLMABCDEFGHIJK |
OPQRSTUVWXYZNMABCDEFGHIJKL |
To increase the security in the transmission of the encryption, it is recommended to use other alphabets.
The message has a low index of coincidence due to the use of several alphabets.
A Friedman test retrieves the key length probabilistically.
This is not a variant but Porta is similar to the Bellaso Cipher, another Italian, who uses several alphabets.
In the 16th century by Giambattista della Porta, a physicist who dedicated a book on messages encryption.
dCode retains ownership of the online 'Porta Cipher' tool source code. Except explicit open source licence (indicated CC / Creative Commons / free), any 'Porta Cipher' algorithm, applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, translator), or any 'Porta Cipher' function (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and no data download, script, copy-paste, or API access for 'Porta Cipher' will be for free, same for offline use on PC, tablet, iPhone or Android ! dCode is free and online.
Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!
Thanks to your feedback and relevant comments, dCode has developed the best 'Porta Cipher' tool, so feel free to write! Thank you!