Columnar Transposition Cipher

Keyword-based transposition. Enter a key, write text, and encrypt or decrypt.

Note: This is a classic learning implementation. For real cryptography, use modern authenticated encryption.

Output

How it works

  • Write the message into rows with columns = key length.
  • Sort key letters alphabetically to determine column read order.
  • Read down each column in that order to get ciphertext.