Playfair Cipher
The Playfair cipher is a polygraphic substitution cipher. It replaces each plaintext letter pair by another two letters, based on the keyword table. The table is created based on a keyword (password) provided by the user.
For more detailed description of the Playfair cipher, please visit Crypto-IT webpage.
Password
Enter a secret password. It will be used for creating the table used for actual encryption/decryption. If no password is provided, the table will be sorted alphabetically.
Enter a secret password. It will be used for creating the table used for actual encryption/decryption. If no password is provided, the table will be sorted alphabetically.
Input Message
Enter a message you want to encrypt/decrypt. After that, click the correct button below.
Enter a message you want to encrypt/decrypt. After that, click the correct button below.
Formatted Input Message
Preview the message that actually will be processed. Note, that only letters that are present in the table will be encrypted/decrypted. Some additional letters might be inserted, to prevent dealing with pairs of identical letters.
Preview the message that actually will be processed. Note, that only letters that are present in the table will be encrypted/decrypted. Some additional letters might be inserted, to prevent dealing with pairs of identical letters.
Parameters:
Treat J as I
Ignore Q
Ignore X Choose how to deal with the 26th letter of the Latin alphabet.
Treat J as I
Ignore Q
Ignore X Choose how to deal with the 26th letter of the Latin alphabet.
A | B | C | D | E |
F | G | H | I | K |
L | M | N | O | P |
Q | R | S | T | U |
V | W | X | Y | Z |
The table used for encryption and decryption, created based on the provided password.
The following assumptions were made:
The following assumptions were made:
- if two letters are in the same row, the letters to the right (during encryption) or to the left (during decryption) would be taken to replace them.
- if two letters are in the same column, the letters below them (during encryption) or above them (during decryption) would be taken to replace them.
The table used for encryption and decryption, created based on the provided password.
The following assumptions were made:
The following assumptions were made:
- if two letters are in the same row, the letters to the right (during encryption) or to the left (during decryption) would be taken to replace them.
- if two letters are in the same column, the letters below them (during encryption) or above them (during decryption) would be taken to replace them.
Output Message
The result of encryption/decryption. The output text may contain some additional, rare letters, that were added in order to prevent dealing with pairs of identical letters. Note, that only letters appear in the output text, all other characters were removed.
The result of encryption/decryption. The output text may contain some additional, rare letters, that were added in order to prevent dealing with pairs of identical letters. Note, that only letters appear in the output text, all other characters were removed.