Tool to decript/encrypt Two-square automatically. Two-square cipher uses a playfair-like process to encrypt (it is also called double playfair), except that it uses two keys or 5x5 square-grids
Two-square Cipher - dCode
Tag(s) : Polygrammic Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Two-Square cipher (or double square cipher) encryption uses two squared grid/checkboard placed side to side (horizontal variant), or one above the other (vertical variant), sometimes generated with a key word (deranged alphabet)
Example: Crypt DCODE with two grids (horizontal) generated with the words KEY and WORD respectively
The first step consists in splitting the plain text into bigrams (couples of two letters).
Example: DC, OD, EZ (a random letter from the grid is added if necessary)
Second step, for each bigram, find the first letter in the first grid and the second letter in the second grid and apply the following rules:
— if the letters are on the same row (line) of the table, switch them. (in the vertical version, apply with columns rather than lines)
— else, replace them by the letters one the same lines but on the opposite corner of an imaginary rectangle, with the two first letters as opposite vertices. In practice, locate the two original letters and find the two other letters that create an imaginary rectangle. Encrypted letters are written begining with the one on the same row (horizontal variant) as the first letter of the plain bigram (use same column with vertical variant)
Example: D (grid 1) and C (grid 2) are on the same line, switch them: CD
O (grid 1, line 3, column 5) and D (grid 2, line 1, column 4) are not on the same line, opposite corners are L (grid 2, line 3, column 4) and B (grid 1, line 1, column 5)
E (grid 1, line 1, column 2) and Z (grid 2, line 5, column 5) are not on the same line, opposite corners are A (grid 2, line 1, column 5) and V (grid 1, line 5, column 2)
Final encrypted text is then CDLBAV
Two-Square cipher Decryption requires two grids/checkboards generated with two keys. The cipher text is split into bigrams (couples of 2 letters).
Example: The cipher text is CDLBAV (split in CD, LB, AV) and the grids are in horizontal position
For each bigram, locate the first letter in grid 2 and the second letter in grid 1.
If the two letters are on the same row (or column in vertical version), swap them.
Else, find the 2 original letters by locating the two letters that completes the imaginary rectangle (see encryption). As for the encryption process, write the letters by starting with the same row (or column depending on the variant used) as the first letter of the encrypted bigram.
Example: C (grid 2) and D (grid 1) are on the same line, switch them: DC
L (grid 2, line 3, column 4) and B (grid 1, line 1, column 5) are not on the same line, opposite corners are O (grid 1, line 3, column 5) and D (grid 2, line 1, column 4)
A (grid 2, line 1, column 5) and V (grid 1, line 5, column 2) are not on the same line, opposite corners are E (grid 1, line 1, column 2) and Z (grid 2, line 5, column 5)
The original plain text is DCODEZ.
The ciphered message needs 2 keys, and had generally a maximum of 25 distinct characters.
The presence of 2 grids or 2 squares is a clue.
Excepting variations due to creating a deranged alphabet out of the keys, it is possible to modify :
— the position of the grids, for example, by setting them vertically rather than horizontally. In this case, encryption and decryption processes should take into account bigram letters on the same column rather than on the same line
— the order of the grid (switch grid 1 and 2)
Probably near of the invention of the PlayFair algorithm (towards 1850)