Atbash Cipher
The Atbash Cipher was originally a monoalphabetic substitution cipher used for the Hebrew alphabet. It is one of the earliest known subtitution ciphers to have been used, and is very simple. However, it's simplicity is also it's biggest pitfall, as it does not use a key. Hence every piece of plaintext enciphered using the Atbash Cipher uses the same ciphertext alphabet, and so can be easily broken, since the encryption algorithm is known to all.
The Atbash Cipher simply reverses the plaintext alphabet to create the ciphertext alphabet. That is, the first letter of the alphabet is encrypted to the last letter of the alphabet, the second letter to the penultimate letter and so forth. In the original Hebrew this means that 'aleph' is encrypted to 'tav', and 'beth' to 'shin'. This is where we get the name of the cipher 'atbash'. For the Hebrew alphabet we get the following conversion table.
For the Roman alphabet of 26 letters, we have the ciphertext alphabet as given in the table below.
Encryption
As with any monoalphabetic substitution cipher, encryption using the Atbash Cipher is very simple once the ciphertext alphabet has been generated. We simply replace each occurence of each plaintext letter with the respective ciphertext letter given by the table. So, if we take the plaintext "atbash", we can see that "a" enciphers to "Z", "t" enciphers to "G" and so on. Continuing in this way, we see that the final ciphertext is "ZGYZHS".
As with any monoalphabetic substitution cipher, encryption using the Atbash Cipher is very simple once the ciphertext alphabet has been generated. We simply replace each occurence of each plaintext letter with the respective ciphertext letter given by the table. So, if we take the plaintext "atbash", we can see that "a" enciphers to "Z", "t" enciphers to "G" and so on. Continuing in this way, we see that the final ciphertext is "ZGYZHS".
Decryption
Due to the symmetric nature of this cipher, the decryption process is exactly the same as the encryption process. Thus, for the recipient to decrypt the ciphertext, the same ciphertext alphabet must be generated as was used to encrypt the message in the first place. In this case, the ciphertext alphabet relies only on the alphabet used, and hence the table above is also used to decipher the message. So, given the ciphertext "XRKSVI", and assuming that the alphabet used was the standard Roman alphabet of 26 letters, we can retrieve the plaintext "cipher".
Due to the symmetric nature of this cipher, the decryption process is exactly the same as the encryption process. Thus, for the recipient to decrypt the ciphertext, the same ciphertext alphabet must be generated as was used to encrypt the message in the first place. In this case, the ciphertext alphabet relies only on the alphabet used, and hence the table above is also used to decipher the message. So, given the ciphertext "XRKSVI", and assuming that the alphabet used was the standard Roman alphabet of 26 letters, we can retrieve the plaintext "cipher".
Discussion
The Atbash Cipher is a very weak substitution cipher, since there is no secret key behind generating the ciphertext alphabet to perform the encryption. Thus, given a piece of ciphertext, known to have been enciphered using the Atbash Cipher, anyone who intercepts the message can easily decipher it to retrieve what was meant to be concealed.
Despite this, it provides a very quick and easy way to conceal messages from an onlooker and can be used successfully to encipher messages of not great importance.
The one security measure that does exist for the Atbash Cipher is to use different plaintext alphabets. For example using a plaintext alphabet with the ten digits attached at the end (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789), or one with the most common punctuation marks in it. Both these alphabets add a bit more security to the cipher, but as we shall see, these are methods that can be used for every cipher.
The Atbash Cipher is a very weak substitution cipher, since there is no secret key behind generating the ciphertext alphabet to perform the encryption. Thus, given a piece of ciphertext, known to have been enciphered using the Atbash Cipher, anyone who intercepts the message can easily decipher it to retrieve what was meant to be concealed.
Despite this, it provides a very quick and easy way to conceal messages from an onlooker and can be used successfully to encipher messages of not great importance.
The one security measure that does exist for the Atbash Cipher is to use different plaintext alphabets. For example using a plaintext alphabet with the ten digits attached at the end (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789), or one with the most common punctuation marks in it. Both these alphabets add a bit more security to the cipher, but as we shall see, these are methods that can be used for every cipher.