Beaufort Cipher

What is the Beaufort Cipher?

Choose a keyword. Write the plaintext in horizontal rows under the keyword, with each row being the same length as the keyword. Use a tableau, using the row that corresponds to the keyword letter, and the column that corresponds to the plaintext letter.

Example

Plaintext: Whoever has made a voyage up the Hudson must remember the Kaatskill mountains.

Keyword: RIPVANWINKLE

Tableau


  a b c d e f g h i j k l m n o p q r s t u v w x y z 
Z Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
Y Y X W V U T S R Q P O N M L K J I H G F E D C B A Z
X X W V U T S R Q P O N M L K J I H G F E D C B A Z Y
W W V U T S R Q P O N M L K J I H G F E D C B A Z Y X
V V U T S R Q P O N M L K J I H G F E D C B A Z Y X W
U U T S R Q P O N M L K J I H G F E D C B A Z Y X W V
T T S R Q P O N M L K J I H G F E D C B A Z Y X W V U
S S R Q P O N M L K J I H G F E D C B A Z Y X W V U T
R R Q P O N M L K J I H G F E D C B A Z Y X W V U T S
Q Q P O N M L K J I H G F E D C B A Z Y X W V U T S R
P P O N M L K J I H G F E D C B A Z Y X W V U T S R Q
O O N M L K J I H G F E D C B A Z Y X W V U T S R Q P
N N M L K J I H G F E D C B A Z Y X W V U T S R Q P O
M M L K J I H G F E D C B A Z Y X W V U T S R Q P O N
L L K J I H G F E D C B A Z Y X W V U T S R Q P O N M
K K J I H G F E D C B A Z Y X W V U T S R Q P O N M L
J J I H G F E D C B A Z Y X W V U T S R Q P O N M L K
I I H G F E D C B A Z Y X W V U T S R Q P O N M L K J
H H G F E D C B A Z Y X W V U T S R Q P O N M L K J I
G G F E D C B A Z Y X W V U T S R Q P O N M L K J I H
F F E D C B A Z Y X W V U T S R Q P O N M L K J I H G
E E D C B A Z Y X W V U T S R Q P O N M L K J I H G F
D D C B A Z Y X W V U T S R Q P O N M L K J I H G F E
C C B A Z Y X W V U T S R Q P O N M L K J I H G F E D
B B A Z Y X W V U T S R Q P O N M L K J I H G F E D C
A A Z Y X W V U T S R Q P O N M L K J I H G F E D C B

Encipher step


R I P V A N W I N K L E
W H O E V E R H A S M A
D E A V O Y A G E U P T
H E H U D S O N M U S T
R E M E M B E R T H E K
A A T S K I L L M O U N
T A I N S

Ciphertext:
VBBRF JFBNS ZEOEP AMPWC JQWLK EIBXV IVBQT LAEDR OMSRU DHURI WDQFL XBWRR YIHII

Vulnerabilities of Beaufort Cipher

Doing an analysis of Periodic ICs can help reveal potential keyword lengths, as can the Kasiski Examination.

How to Crack a Beaufort Cipher

The Kasiski Examination can be performed: look for repeated sequences in the ciphertext and factor the distance between them. This gives potential keyword lengths. Placing the ciphertext into columns with the width of those lengths allows one to perform a frequency analysis on each column to help determine which alphabet was used for that column.