Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Difference between Substitution Cipher Technique and Transposition

Cipher Technique:
S.NO Substitution Cipher Technique Transposition Cipher Technique

In substitution Cipher Technique, plain In transposition Cipher Technique, plain


1. text characters are replaced with other text characters are rearranged with
characters, numbers and symbols. respect to the position.

Substitution Cipher’s forms are: Mono Transposition Cipher’s forms are: Key-
2. alphabetic substitution cipher and poly less transposition cipher and keyed
alphabetic substitution cipher. transposition cipher.

While in transposition Cipher


In substitution Cipher Technique,
Technique, The position of the character
3. character’s identity is changed while its
is changed but character’s identity is not
position remains unchanged.
changed.

In substitution Cipher Technique, The While in transposition Cipher


4. letter with low frequency can detect plain Technique, The Keys which are nearer
text. to correct key can disclose plain text.
S.NO Substitution Cipher Technique Transposition Cipher Technique

The example of substitution Cipher is The example of transposition Cipher is


5. Caesar Cipher, monoalphabetic cipher, Rail Fence Cipher, columnar
and polyalphabetic cipher. transposition cipher, and route cipher.

Involves replacing plaintext letters or


Involves rearranging the order of the
groups of letters with ciphertext letters or
6. plaintext letters or groups of letters
groups of letters according to a specific
according to a specific algorithm or key.
algorithm or key.

The frequency distribution of the


The frequency distribution of the
plaintext letters remains the same, but
plaintext letters is typically obscured, but
7. the order is scrambled, making it
patterns can still be detected with
difficult to detect patterns with
statistical analysis.
statistical analysis.

Vulnerable to frequency analysis attacks, Less vulnerable to frequency analysis


where the most commonly used letters or attacks, but still susceptible to attacks
8.
letter combinations in the language can such as brute force and known plaintext
be identified and used to deduce the key. attacks.

Relatively easy to understand and Can be more difficult to implement and


implement, making it suitable for simple understand, but can be more secure than
9.
applications. substitution ciphers for certain
applications.

https://www.youtube.com/watch?v=JtbKh_12ctg

https://www.youtube.com/watch?v=Ic4BzVggNY8

https://www.youtube.com/watch?v=J-utjSeUq_c

You might also like