- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books

### Codes and Ciphers
Codes and Ciphers
- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books

- Monoalphabetic
- Caesar Cipher
- Atbash Cipher
- Keyword Cipher
- Pigpen / Masonic Cipher
- Polybius Square
- Polyalphabetic
- Vigenère Cipher
- Beaufort Cipher
- Autokey Cipher
- Running Key Cipher
- Polygraphic
- Playfair Cipher
- Bifid Cipher
- Trifid Cipher
- Four-square cipher
- Transposition
- Rail Fence
- Route Cipher
- Columnar Transposition
- Miscellaneous
- Book Cipher
- Beale Cipher
- Morse Code
- Tap Code
- One-time Pad
- Scytale
- Semaphore
- ASCII Code
- Steganography
- Techniques
- Frequency Analysis
- Books

# Bifid Cipher

The Bifid Cipher uses a Polybius Square to encipher a message in a way that makes it fairly difficult to decipher without knowing the secret. This is because each letter in the ciphertext message is dependent upon two letters from the plaintext message. As a result, frequency analysis of letters becomes much more difficult.

The first step is to use the Polybius Square to convert the letters into numbers. We will be writing the numbers vertically below the message.

1 | 2 | 3 | 4 | 5 | |
---|---|---|---|---|---|

1 | A | B | C | D | E |

2 | F | G | H | I | K |

3 | L | M | N | O | P |

4 | Q | R | S | T | U |

5 | V | W | X | Y | Z |

411414 3144121

353254 2533125

The numbers are now read off horizontally and grouped into pairs.

41 14 14 31 44 12 13 53 25 42 53 31 25

The Polybius Square is used again to convert the numbers back into letters which gives us our ciphertext: qddltbcxkrxlk

Since the first letter in the plaintext is encoded into the first and middle letters of the ciphertext, the recipient of the message must have the entire message before they can decode it. This means that if part of the ciphertext is discovered by a third party, it is unlikely that they will be able to crack it.

To decipher a Bifid encrypted message, you first convert each letter into its corresponding number via the Polybius Square. Now, divide the long string of numbers into two equal rows. The digit in the top row and the digit in the bottom row will together reference the decoded letter in the Polybius Square.

The Bifid Cipher can be taken into three dimensions to slightly increase the security of the message. This new cipher is called the Trifid Cipher.

## Follow Braingle!