Porta Cipher Tables

Interactive visualization of all 13 Porta cipher substitution alphabets. Explore different historical variants, search for letter correspondences, and understand the mathematical principles behind reciprocal encryption.

Porta Cipher Table

The Porta cipher uses 13 reciprocal substitution alphabets. Each key letter pair (AB, CD, EF, etc.) shares the same substitution alphabet.

Key PairABCDEFGHIJKLMNOPQRSTUVWXYZ
ABNOPQRSTUVWXYZABCDEFGHIJKLM
CDOPQRSTUVWXYZNMABCDEFGHIJKL
EFPQRSTUVWXYZNOLMABCDEFGHIJK
GHQRSTUVWXYZNOPKLMABCDEFGHIJ
IJRSTUVWXYZNOPQJKLMABCDEFGHI
KLSTUVWXYZNOPQRIJKLMABCDEFGH
MNTUVWXYZNOPQRSHIJKLMABCDEFG
OPUVWXYZNOPQRSTGHIJKLMABCDEF
QRVWXYZNOPQRSTUFGHIJKLMABCDE
STWXYZNOPQRSTUVEFGHIJKLMABCD
UVXYZNOPQRSTUVWDEFGHIJKLMABC
WXYZNOPQRSTUVWXCDEFGHIJKLMAB
YZZNOPQRSTUVWXYBCDEFGHIJKLMA

How to use this table:

  1. 1. Find the row for your key letter (e.g., if key is "C", use row "CD")
  2. 2. Find your plaintext letter in the top row (e.g., "H" is column 8)
  3. 3. The intersection gives you the ciphertext letter
  4. 4. To decrypt, use the same process (the table is reciprocal)

Understanding Porta Cipher Tables

The Porta cipher, invented by Giovanni Battista della Porta in 1563, revolutionized Renaissance cryptography by introducing a polyalphabetic system that used only 13 substitution alphabets instead of the traditional 26.

The 13-Alphabet System

Unlike other polyalphabetic ciphers that require a unique alphabet for each letter of the key, the Porta cipher pairs key letters together. This pairing system (AB, CD, EF, etc.) reduces complexity while maintaining cryptographic strength through its reciprocal property.

Key-Letter Pairing System

Each pair of consecutive alphabet letters shares the same substitution alphabet:

  • A, B: Both use the first substitution alphabet
  • C, D: Both use the second substitution alphabet
  • E, F: Both use the third substitution alphabet
  • ...and so on through Y, Z

Mathematical Construction

Each substitution alphabet is created by shifting the standard alphabet by a specific number of positions. The standard Porta table uses the formula: shift = 13 + table_index, ensuring each alphabet is unique while maintaining the reciprocal property essential to the cipher's operation.

Four Standard Porta Table Variants

Over the centuries, different implementations and cryptanalysis communities have developed variations of the original Porta table, each with its own mathematical construction method.

1. Standard (Original) Version

The original implementation uses right-rotation of the alphabet with increasing shift values. This version closely follows della Porta's original design principles and maintains perfect reciprocal properties for all letter pairs.

2. ACA (American Cryptogram Association) Variant

The ACA variant employs left-rotation instead of right-rotation, creating different substitution patterns while preserving the mathematical properties. This version is commonly used in modern cryptanalysis competitions and educational settings.

3. Double Rotation Variant

This advanced variant changes both the alphabet rotation direction and shift increments, creating more complex substitution patterns. Despite increased complexity, it maintains the reciprocal property crucial to Porta cipher operation.

4. Historical Variant

Based on careful study of della Porta's original 1563 work "De Furtivis Literarum Notis," this variant attempts to recreate the exact tables as originally conceived during the Renaissance period.

How to Read and Use Porta Tables

Understanding how to read Porta cipher tables is essential for both manual encryption and appreciating the cipher's elegant mathematical structure.

Step-by-Step Table Usage

  1. Identify the Key Letter: Take the current key letter from your encryption key
  2. Find the Key Pair: Determine which pair (AB, CD, EF, etc.) contains your key letter
  3. Select the Row: Use the corresponding substitution alphabet row from the table
  4. Locate Plaintext Position: Find your plaintext letter's position in the standard alphabet
  5. Read Ciphertext: The letter at that position in the substitution row is your ciphertext

Example Encryption Process

To encrypt the letter "H" using key letter "C":

  • Key letter "C" belongs to pair "CD"
  • Use the "CD" substitution alphabet row
  • "H" is the 8th letter of the alphabet (position 7, zero-indexed)
  • The 8th letter in the "CD" row gives you the ciphertext

Reciprocal Property in Action

The beauty of the Porta cipher lies in its reciprocal nature. If "H" encrypts to "U" using key "C," then "U" will encrypt back to "H" using the same key "C." This means decryption uses exactly the same process as encryption.

Interactive Features Guide

Our interactive Porta table visualization includes several features designed to enhance understanding and practical application of the cipher system.

Search and Highlight Functionality

Use the search feature to quickly find specific letter correspondences across all tables. The system will highlight relevant rows and individual letters, making it easy to trace encryption patterns and understand substitution relationships.

Row Selection and Analysis

Click on any key pair row to select it for detailed analysis. The selected row will display additional information including:

  • Which key letters use this alphabet
  • Example letter correspondences
  • Demonstration of the reciprocal property
  • Mathematical construction details

Variant Comparison

Switch between different table variants to see how the same key pairs produce different substitution alphabets. This feature is particularly useful for understanding how historical variations affect the cipher's practical implementation while preserving its core properties.

Porta Cipher Tables - Complete Visual Guide to All Variants