The key of a monoalphabetic substition is a permutation of the alphabet, for example:
ABCDEFGHIJKLMNOPQRSTUVWXYZ UNIVERSTABCDFGHJKLMOPQWXYZFor encryption locate each letter of the plaintext in the first row of this table, and replace it by the letter below it. In our example this becomes:
ENGLI SHAST RONOM ERWIL LIAML ASSEL LDISC OVERE DTRIT ON EGSDA MTUMO LHGHF ELWAD DAUFD UMMED DVAMI HQELE VOLAO HG
For decryption we use the inverse permutation, given by the table
ABCDEFGHIJKLMNOPQRSTUVWXYZ IJKLEMNOCPQRSBTUVFGHADWXYZthat is a rearrangement of the key permutation: Exchange the two rows and sort the first row.
Historically cryptographers often used mysterious symbols for the ciphertext (look here for an example). This is an »illusory complication«, that is, it has no influence on the security of the cipher.
FAQ: Can we improve encryption by using strange symbols instead of normal letters?
A monoalphabetic cipher has as key space a selection of permutations.
The mathematical description is here.
The advantage of this rule is that the key is easily memorized. The secret agent doesn't need to carry around a suspicious sheet of paper and stomach it in case of getting caught. An example for the rule is in the introductory example using the (German) keyword »Universitaet«:
UNIVERSITAET UNIVERSTA UNIVERSTABCDFGHJKLMOPQWXYZQuestions: What is bad about this key? How to avoid this weakness?
As is shown in the mathematical part the key length of the general monoalphabetic cipher is about 88 for our 26 letter standard alphabet. Therefore exhaustion is out of the capabilities even of the best computers. In spite of this we'll see that the monoalphabetic cipher is not secure.
You may use web forms for monoalphabetic encryption and decryption.
Exercise: Encrypt and decrypt some texts of your choice with the help of this web service.
[The next page gives a description of these programs. There you can also download them for local execution.]