Search for a tool
Substitution Cipher

Tool to encrypt / decrypt a message by substitution cipher (all sizes) by replacing one or more characters with one or more others

Results

Substitution Cipher -

Tag(s) : Substitution Cipher

Share
Share
dCode and more

dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!


Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!


Feedback and suggestions are welcome so that dCode offers the best 'Substitution Cipher' tool for free! Thank you!

Substitution Cipher

Guide for Substitution

The most common simple substitution method replaces all 26 letters of the alphabet (one letter corresponds to only one other). dCode has a dedicated tool for this: Mono-alphabetic Substitution.
Other common substitutions are: Shift Cipher or Letter Number Code (A1Z26) A=1, B=2, C=3.
When the substituted characters are symbols/drawings, this page cannot be used; see Symbols Cipher List

Substitution Decoder

 



Loading...
(if this message do not disappear, try to refresh this page)

Auto fill: [A-Z] [A-Z0-9] [A-Za-z0-9]

Substitution Encoder

 



Loading...
(if this message do not disappear, try to refresh this page)

Auto fill: [A-Z] [A-Z0-9] [A-Za-z0-9]


Answers to Questions (FAQ)

What is a substitution cipher? (Definition)

Substitution ciphers are a cryptographic method in which each symbol in the plaintext (most often a letter) is replaced by another symbol according to a fixed lookup table called a key.

In its most common form (monoalphabetic substitution), each letter of the alphabet is associated with a unique, different letter, and this association remains the same throughout the entire text.

How to encrypt using substitution cipher?

For a simple monoalphabetic substitution to be correct, the correspondence between letters must be bijective: each letter in the plaintext corresponds to one and only one letter in the ciphertext, and vice versa. This guarantees the uniqueness of the encryption and decryption.

Example: The Caesar cipher is an alphabetical substitution which replaces each letter by the following in the alphabet: ABCD becomes BCDE

How to decrypt substitution cipher?

To decrypt by substitution, the user must either possess the lookup table (the key) or be able to retrieve it through cryptographic analysis.

Decryption then consists of applying the inverse combination of the one used for encryption.

How to recognize a substitution ciphertext?

If the substitution is monoalphabetic, frequency analysis often allows us to identify the language of the plaintext, because the letters retain their statistical distribution.

The presence of systematic correspondences between symbols (substitutes) and recurring patterns are typical indicators of a substitution cipher.

The concepts of substitutes and changes/replacements are clues.

What are the variants of the substitution cipher?

Substitution cipher is one of the most basic cryptography methods. Many variations are possible:

— Ciphers by mono-alphabetic substitution, with a disordered alphabet, one letter replaces another.

— Encryptions by poly-alphabetic substitution, with several alphabets.

— Encryptions by homophonic substitution, the same element can be substituted by several others.

— Substitution by dictionary (or book cipher), with words, n-grams substituted by others.

When was substitution cipher invented?

There is no single date for its invention, but attested examples of substitution ciphers appear as early as antiquity: the Atbash cipher is documented in ancient Hebrew, and the Caesar cipher is attested in Latin texts from the 1st century BCE. It is likely that substitution ciphers appeared shortly after the invention of writing.

Source code

dCode retains ownership of the "Substitution Cipher" source code. Any algorithm for the "Substitution Cipher" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Substitution Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Substitution Cipher" or any other element are not public (except explicit open source licence). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.

Cite dCode

The content of the page "Substitution Cipher" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source (Creative Commons CC-BY free distribution license).

Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).

To cite dCode.fr on another website, use the link: https://www.dcode.fr/substitution-cipher

In a scientific article or book, the recommended bibliographic citation is: Substitution Cipher on dCode.fr [online website], retrieved on 2026-02-14, https://www.dcode.fr/substitution-cipher

Need Help ?

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!

Questions / Comments

Feedback and suggestions are welcome so that dCode offers the best 'Substitution Cipher' tool for free! Thank you!


https://www.dcode.fr/substitution-cipher
© 2026 dCode — The ultimate collection of tools for games, math, and puzzles.
â–˛  
Feedback