Classical Cipher Comparison Table

Compare 23 classical ciphers side by side. This reference table covers cipher type, key format, security level, key space size, and best use cases to help you choose the right cipher for your needs.

Full Cipher Comparison

CipherTypeKey TypeKey SpaceSecurityYear
Caesar CipherMonoalphabetic SubstitutionSingle integer (1-25)25Very Weak~58 BC
ROT13Monoalphabetic SubstitutionFixed (shift of 13)1None (obfuscation only)1982
Atbash CipherMonoalphabetic SubstitutionNone (fixed mapping)1Very Weak~500 BC
Affine CipherMonoalphabetic SubstitutionTwo integers (a, b)312Weak~1900s
Keyword CipherMonoalphabetic SubstitutionKeyword string~2×10²⁶Weak~1500s
Pigpen CipherSymbol SubstitutionNone (fixed grid)1Very Weak~1700s
Polybius SquareFractionation5×5 grid arrangement~2×10²⁶Weak~150 BC
Vigenère CipherPolyalphabetic SubstitutionKeyword string26ⁿ (n = key length)Moderate1553
Beaufort CipherPolyalphabetic SubstitutionKeyword string26ⁿ (n = key length)Moderate~1857
Autokey CipherPolyalphabetic SubstitutionKeyword + plaintext extension26ⁿ (non-repeating key)Moderate-Strong1586
Trithemius CipherPolyalphabetic SubstitutionNone (auto-incrementing shift)1Weak1508
Gronsfeld CipherPolyalphabetic SubstitutionNumeric key (digits 0-9)10ⁿ (n = key length)Weak-Moderate~1700s
Porta CipherPolyalphabetic SubstitutionKeyword string (13 alphabets)13ⁿ (n = key length)Moderate1563
Running Key CipherPolyalphabetic SubstitutionBook/text passage (same length as message)Very large (full text)Moderate-Strong~1800s
Playfair CipherDigraph Substitution5×5 keyword matrix~2×10²⁶Moderate1854
Four-Square CipherDigraph SubstitutionTwo 5×5 keyword matrices(~2×10²⁶)²Strong (for classical)1902
Hill CipherPolygraphic SubstitutionN×N invertible matrixVery large (matrix dependent)Moderate-Strong1929
Alberti Disk CipherPolyalphabetic SubstitutionDisk position + shift scheduleVariable (depends on rotation frequency)Moderate1467
Baconian CipherBinary Encoding / SteganographyNone (fixed 5-bit encoding)1Weak (steganographic only)1605
Homophonic CipherHomophonic SubstitutionMultiple symbols per letterVery large (mapping dependent)Moderate-Strong~1400s
Morse CodeEncoding (not encryption)None (standard mapping)1None (encoding, not cipher)1837
Vernam Cipher (OTP)Stream CipherRandom key (same length as message)26ⁿ (truly random)Perfect (information-theoretically secure)1917
Straddling CheckerboardFractionationLetter arrangement + row headersVery largeModerate~1940s
Quagmire CipherPolyalphabetic Substitution1-3 keyword alphabets + indicatorVery large (multiple mixed alphabets)Strong (for classical)~1900s

How do classical ciphers compare in security?

Security levels range from "None" (no secret key, just encoding) to "Perfect" (mathematically unbreakable). Most classical ciphers fall between Very Weak and Moderate by modern standards.

Security LevelCiphersMain Vulnerability
PerfectVernam (One-Time Pad)None \u2014 unbreakable if used correctly
StrongFour-Square, Quagmire, HomophonicExtensive cryptanalysis, large known-plaintext needed
ModerateVigen\u00E8re, Beaufort, Autokey, Playfair, Hill, Porta, Running KeyKasiski examination, known-plaintext attacks, frequency analysis on pairs
WeakAffine, Keyword, Gronsfeld, Trithemius, PolybiusFrequency analysis, small key space, predictable patterns
Very Weak / NoneCaesar, ROT13, Atbash, Pigpen, Morse, BaconianBrute force (seconds), no secret key, known mapping

What are the main types of classical ciphers?

Classical ciphers fall into several categories based on how they transform plaintext. Understanding these categories helps in both selecting a cipher and knowing how to break one.

Cipher TypeHow It WorksExamplesKey Weakness
Monoalphabetic SubstitutionEach letter always maps to the same ciphertext letterCaesar, Atbash, Affine, KeywordPreserves letter frequency \u2014 easy to crack with frequency analysis
Polyalphabetic SubstitutionUses multiple alphabets, cycling based on a keywordVigen\u00E8re, Beaufort, Autokey, PortaKey repetition creates detectable patterns (Kasiski)
Digraph / PolygraphicEncrypts 2+ letters at a time as a unitPlayfair, Four-Square, HillDigraph frequency analysis (676 pairs vs 26 letters)
FractionationConverts letters to numbers/coordinates, then transformsPolybius, Straddling CheckerboardFrequency analysis on coordinate pairs
Stream CipherCombines plaintext with a key stream one character at a timeVernam (One-Time Pad)Key management \u2014 key must be truly random and never reused

When were classical ciphers invented?

Classical ciphers span over 2,500 years of cryptographic history, from ancient Hebrew scholars to 20th century military intelligence.

EraPeriodCiphers IntroducedKey Advance
Ancient500 BC \u2013 100 BCAtbash, Caesar, PolybiusFirst substitution and fractionation concepts
Renaissance1400s \u2013 1600sAlberti, Vigen\u00E8re, Porta, Trithemius, Autokey, BaconianPolyalphabetic substitution invented
Industrial1700s \u2013 1800sPlayfair, Beaufort, Pigpen, MorseDigraph encryption and practical field ciphers
Modern Classical1900s \u2013 1940sFour-Square, Hill, Vernam, Straddling CheckerboardMathematical foundations and provable security

Best Use Cases by Cipher

CipherBest ForHow It Is Cracked
Caesar CipherEducation, puzzles, ROT13Brute force, frequency analysis
ROT13Spoiler hiding, casual obfuscationApply ROT13 again (self-inverse)
Atbash CipherBiblical studies, simple encodingKnown pattern, frequency analysis
Affine CipherMath education, modular arithmeticBrute force (312 keys), frequency analysis
Keyword CipherMemorable key encryptionFrequency analysis
Pigpen CipherVisual encoding, children's gamesKnown symbol grid
Polybius SquareCoordinate-based encoding, telegraphyFrequency analysis on coordinate pairs
Vigenère CipherHistorical encryption, educationKasiski examination, Friedman test
Beaufort CipherReciprocal encryption (same operation encrypts/decrypts)Same as Vigenère (Kasiski, Friedman)
Autokey CipherImproved Vigenère without repeating keyKnown-plaintext attack, statistical methods
Trithemius CipherHistorical study, progressive shift conceptKnown pattern (predictable shifts)
Gronsfeld CipherNumeric-key variant of VigenèreSame as Vigenère with smaller key space
Porta CipherSelf-reciprocal polyalphabetic cipherFrequency analysis on half-alphabets
Running Key CipherLong-key encryption using existing textStatistical analysis, known-book attack
Playfair CipherMilitary field use, digraph encryptionDigraph frequency analysis
Four-Square CipherDual-key digraph encryptionExtensive digraph frequency analysis
Hill CipherMathematical/matrix-based encryptionKnown-plaintext attack with linear algebra
Alberti Disk CipherFirst polyalphabetic cipher, historical studyPattern analysis on rotation points
Baconian CipherHidden messages in plain text, steganographyPattern recognition on binary groups
Homophonic CipherDefeating frequency analysisStatistical analysis, hill climbing
Morse CodeTelegraph communication, emergency signals (SOS)Standard reference chart
Vernam Cipher (OTP)Provably unbreakable encryption when used correctlyUnbreakable if key is truly random, used once, kept secret
Straddling CheckerboardCompact encoding for spy communicationsFrequency analysis on variable-length codes
Quagmire CipherAdvanced polyalphabetic with mixed alphabetsExtensive cryptanalysis, pattern detection

Frequently Asked Questions

What is the difference between Caesar cipher and Vigenere cipher?

The Caesar cipher uses a single fixed shift value to replace each letter (monoalphabetic substitution), making it vulnerable to frequency analysis with only 25 possible keys. The Vigenere cipher uses a keyword to apply different shift values to each letter (polyalphabetic substitution), producing 26^n possible keys where n is the keyword length. This makes Vigenere significantly harder to crack, though it can be broken with the Kasiski examination or Friedman test.

Which classical cipher is the most secure?

The Vernam cipher (one-time pad) is the only classical cipher with mathematically proven perfect security — it is information-theoretically unbreakable when the key is truly random, at least as long as the message, used only once, and kept completely secret. Among practical classical ciphers, the Four-Square and Quagmire ciphers offer the strongest security due to their large key spaces and complex substitution patterns.

What is the difference between monoalphabetic and polyalphabetic ciphers?

Monoalphabetic ciphers (Caesar, Atbash, Affine, Keyword) use a single fixed substitution alphabet — each plaintext letter always maps to the same ciphertext letter. This preserves letter frequency patterns and makes them easy to crack. Polyalphabetic ciphers (Vigenere, Beaufort, Autokey, Porta) use multiple substitution alphabets, cycling through them based on a keyword. This flattens frequency distributions and makes cryptanalysis significantly harder.

Why is ROT13 not considered encryption?

ROT13 is technically a Caesar cipher with a fixed shift of 13, but it has no secret key — everyone knows the transformation. It provides zero security since anyone can decode it instantly. ROT13 is used purely for obfuscation, such as hiding spoilers or puzzle answers online. Its unique property is that applying ROT13 twice returns the original text (self-inverse), making it convenient for casual use.

How do digraph ciphers like Playfair differ from single-letter ciphers?

Single-letter ciphers (Caesar, Vigenere) encrypt one letter at a time, while digraph ciphers (Playfair, Four-Square) encrypt two letters simultaneously as a pair. This breaks up common single-letter frequency patterns and creates 676 possible digraph substitutions instead of 26 single-letter ones. Digraph ciphers are harder to crack because frequency analysis must operate on 676 pairs rather than 26 individual letters.