The double columnar transposition cipher is considered one of the most secure ciphers that can be performed by hand. It is equivalent to using two columnar transposition ciphers, with same or different keys. During World War I and II, it was used by various agents and military forces.

Double Transposition Cipher Tool

🌎

Instructions

You can decode (decrypt) or encode (encrypt) your message with your key. If you don't have any key, you can try to auto solve (break) your cipher.

Settings
  • Language: The language determines the letters and statistics used for decoding, encoding and auto solving.
  • Min/Max Key Length: This is the search range for keys when auto solving a cipher.
  • Max Results: This is the maximum number of results you will get from auto solving.
  • Spacing Mode: This is about the spaces (word breaks) in the text. In most cases it should be set to Automatic. In case a specific letter (for instance X) is used as word separator, set it to Substitute.

Auto Solver options

Knowing the encryption key

🔑
You must enter the encryption key.
🔑
You must enter the encryption key.

Not able to find the correct result? Try Auto Solve or use the Cipher Identifier Tool.


Auto Solve results

Score Key Text

Still not seeing the correct result? Then try experimenting with the Auto Solve settings or use the Cipher Identifier Tool.


Grid

Enter the key and click decode or encode to show.

Features

Sample Double Columnar Transposition Cipher Text

Code-breaking is not only fun, but also a very good exercise for your brain and cognitive skills. Why don’t you try breaking this example cipher:

egmsh suneo tfote loche nwisl thlts hsini eehhs hmnth hlvou hlpub nlorn snhaw oeatn orkps otsea ciieh snhbd rirft njdvh emtco uhgot gairq cidod aedeu gaehr eeket dedtr dteiu tcuha ntnho iooii taath ssegb oyten letek eosee rtaow yeeyh iytnt nwnle lohdo ftftr anasr weuyg ubeew

See also: Code-Breaking tools | Adfgvx cipher | Adfgx cipher | Affine cipher | Atbash cipher | Baconian cipher | Beaufort cipher | Bifid cipher | Caesar cipher | Columnar transposition | Cryptogram | Enigma machine | Four-square cipher | Gronsfeld cipher | Keyed caesar cipher | One-time pad | Pigpen cipher | Playfair cipher | Rail fence cipher | Rot13 | Route transposition | Substitution cipher | Trifid cipher | Variant beaufort cipher | Vigenere cipher