671.0B+ configurations tested and eliminated

Transposition

Methods that scramble the order of letters without changing them, like writing a message into a grid and reading it back in a different order. Includes columnar, rail fence, route, and grille ciphers.

What we tested: Every standard letter-rearrangement method has been tested: columnar grids at all widths, rail fence, spiral, zigzag, route ciphers, and more — 14 different families, over 1.2 billion combinations. None produced a solution. Pure rearrangement alone is also independently impossible: the ciphertext has 2 E's but the known plaintext needs 3, so some letter-replacement must also be involved.

63 eliminations recorded.

Title Configs Best Verdict Tier
Double columnar exhaustive (w7-9) + single columnar exhaustive (w10-12) + keyword columnar (w13-15)
Dragnet v4: Double columnar exhaustive (w7-9) + single columnar exhaustive (w10-12) + keyword columnar (w13-15) — using two rounds of columnar transpo…
667,000,000,000 18/24 (0.0) NOISE Tier 2
Double columnar transposition (all keyword pairs, widths 5-15)
Double columnar transposition (all keyword pairs, widths 5-15) — using two rounds of columnar transposition applied back-to-back. Every possible combi…
1,200,000,000 15/24 (0.0) NOISE Tier 2
RS 44-style grid mask + keyed column reading (TICOM-inspired)
RS 44-style grid mask + keyed column reading (TICOM-inspired) — using a method using a physical card with holes that rotates to select letters (grille…
689,686,816 0/24 (0.0) NOISE N/A
RS 44 authentic 24-row grid on cipher panel (868 chars) and K4 alone
RS 44 authentic 24-row grid on cipher panel (868 chars) and K4 alone — using a method using a physical card with holes that rotates to select letters …
215,921,500 0/24 (0.0) NOISE N/A
K4 = Vig FIRST → ColTrans (reverse K3) OR ColTrans → Vig (K3 method)
K4 = Vig FIRST → ColTrans (reverse K3) OR ColTrans → Vig (K3 method) — using a method that reads text from a grid in various rotated arrangements. 109…
109,899,094 9/24 (0.0) NOISE N/A
Expanded keyword columnar + Myszkowski sweep (293 thematic keywords)
Expanded keyword columnar + Myszkowski sweep (293 thematic keywords) — using a method based on rearranging the order of letters. Every possible combin…
15,000,000 18/24 (0.0) NOISE: 18/24 at period 13 (expected random ~13.5 at p=13; false positive from underdetermination) Tier 2
Cryptiana Vle Columnar
Cryptiana Vle Columnar — using a method that writes text into a grid and reads columns in a keyword-determined order (columnar transposition). 10.5 mi…
10,466,820 0/24 (0.0) NOISE N/A
8-row grid transposition from Sanborn handwritten notes
8-row grid transposition from Sanborn handwritten notes — using a method that reads text from a grid in various rotated arrangements. 4.5 million key/…
4,500,000 0/24 (0.0) NOISE N/A
Triple sequential columnar transposition + substitution/running key
Triple sequential columnar transposition + substitution/running key — using a method that writes text into a grid and reads columns in a keyword-deter…
2,560,479 8/24 (0.0) NOISE N/A
AMSCO + disrupted columnar transposition (Swapped, Nihilist)
AMSCO + disrupted columnar transposition (Swapped, Nihilist) at widths 5-14 — using a columnar transposition variant that alternates between 1 and 2 c…
800,000 15/24 (0.0) NOISE: 15/24 at period 8 only; period 7 = 0/24; Bean FAIL Tier 2
Ts Counter Directional
Ts Counter Directional — using a method that writes text into a grid and reads it along a path (spiral, zigzag, etc.). 441 thousand key/parameter comb…
441,128 6/24 (0.0) NOISE N/A
Myszkowski transposition
Myszkowski transposition at all viable widths — using a columnar transposition variant where repeated keyword letters create tied columns. Every possi…
200,000 6/24 (0.0) NOISE Tier 2
Three-layer mask hypothesis: CT = Mask + Columnar(Vig(PT, key))
Three-layer mask hypothesis: CT = Mask + Columnar(Vig(PT, key)) — using a method that writes text into a grid and reads columns in a keyword-determine…
161,280 0/24 (0.0) NOISE N/A
Blitz Wildcard
Blitz Wildcard — using computer-optimized letter rearrangement using simulated annealing. 67 thousand key/parameter combinations were tested.
66,866 0/24 (0.0) NOISE N/A
Grid route cipher (spiral, diagonal, zigzag) + Caesar/KA substitution
Grid route cipher (spiral, diagonal, zigzag) + Caesar/KA substitution — using a method that writes text into a grid and reads it along a path (spiral,…
52,140 0/24 (0.0) NOISE N/A
Route transposition at Bean-surviving periods + double routes
Route transposition at Bean-surviving periods + double routes — using a method that writes text into a grid and reads it along a path (spiral, zigzag,…
52,104 19/24 (0.0) NOISE N/A
Non-columnar width-7 transpositions
Non-columnar width-7 transpositions — using a method that writes text into a grid and reads columns in a keyword-determined order (columnar transposit…
50,646 18/24 (0.0) NOISE N/A
Turning grille transposition
Turning grille transposition (Fleissner-style, all compatible grid sizes) — using a method using a physical card with holes that rotates to select let…
50,000 4/24 (0.0) NOISE Tier 2
K1-K3 plaintext/ciphertext as running key for K4
K1-K3 plaintext/ciphertext as running key for K4 — using a method using a physical card with holes that rotates to select letters (grille cipher). 48 …
48,228 0/24 (0.0) NOISE N/A
Bean's incomplete route transposition on null-extracted 73-char text
Bean's incomplete route transposition on null-extracted 73-char text — using a method that writes text into a grid and reads it along a path (spiral, …
22,632 0/24 (0.0) NOISE N/A
Cryptiana Hourglass Grille
Cryptiana Hourglass Grille — using a method using a physical card with holes that rotates to select letters (grille cipher). 3 thousand key/parameter …
3,142 0/24 (0.0) NOISE N/A
Rectangular grid route transposition (6 routes, all grids up to 20x20)
Rectangular grid route transposition (6 routes, all grids up to 20x20) — using a method that writes text into a grid and reads it along a path (spiral…
2,172 0/24 (0.0) NOISE N/A
X Delimiter Widths
X Delimiter Widths — using alternative ways of reading the carved text (backwards, alternating rows, etc.). 2 thousand key/parameter combinations were…
1,746 0/24 (0.0) NOISE N/A
K3-style rotational transposition applied to K4 (CW/CCW, pad 0-5)
K3-style rotational transposition applied to K4 — CW/CCW grid rotation, pad 0-5 — using a method that reads text from a grid in various rotated arrang…
1,016 4/24 (0.0) NOISE Tier 2
Aperture mask / Cardan grille experiments on K4 CT
Aperture mask / Cardan grille experiments on K4 CT — using a method using a physical card with holes that rotates to select letters (grille cipher). 8…
819 0/24 (0.0) NOISE Tier 4
K3-style rotation grid applied to K4
K3-style rotation grid (42x8) applied to K4 — using a method that reads text from a grid in various rotated arrangements. Every possible combination w…
500 3/24 (0.0) NOISE Tier 2
Verdigris Keyword
Verdigris Keyword — using a method using a physical card with holes that rotates to select letters (grille cipher). 174 key/parameter combinations wer…
174 0/24 (0.0) NOISE N/A
Blitz Numeric5
Blitz Numeric5 — using computer-optimized letter rearrangement using simulated annealing. 98 key/parameter combinations were tested.
98 0/24 (0.0) NOISE N/A
Autokey Permuted
Autokey Permuted — using a method using a physical card with holes that rotates to select letters (grille cipher). 96 key/parameter combinations were …
96 0/24 (0.0) NOISE N/A
Grille
Grille — using a method using a physical card with holes that rotates to select letters (grille cipher). 73 key/parameter combinations were tested.
73 0/24 (0.0) NOISE N/A
Rail fence / redefence transposition
Rail fence / redefence transposition (2-20 rails) — using a method that writes text in a zigzag pattern across rows (rail fence cipher). Every possibl…
20 3/24 (0.0) NOISE Tier 2
72+1 delimiter + Polybius fractionation + SEMAPHORE key
72+1 delimiter + Polybius fractionation + SEMAPHORE key — using alternative ways of reading the carved text (backwards, alternating rows, etc.).
N/A 0/24 (0.0) NOISE N/A
72+1 delimiter hypothesis
72+1 delimiter hypothesis — using alternative ways of reading the carved text (backwards, alternating rows, etc.).
N/A 1/24 (0.0) NOISE N/A
72+1 delimiter hypothesis v2
72+1 delimiter hypothesis v2 — using alternative ways of reading the carved text (backwards, alternating rows, etc.).
N/A 0/24 (0.0) NOISE N/A
X-delimiter extraction from K2 ciphertext
X-delimiter extraction from K2 ciphertext — using alternative ways of reading the carved text (backwards, alternating rows, etc.).
N/A 0/24 (0.0) NOISE N/A
Width-7 columnar + non-English corpus EAST scan
Width-7 columnar + non-English corpus EAST scan — using a method that writes text into a grid and reads columns in a keyword-determined order (columna…
N/A 0/24 (0.0) NOISE Tier 4
Close remaining columnar transposition width gaps (w2-4, w16-20)
Close remaining columnar transposition width gaps (w2-4, w16-20) — using a method that writes text into a grid and reads columns in a keyword-determin…
N/A 0/24 (0.0) NOISE N/A
Null palette letters {B,G,I,K,O,W,Z} as columnar transposition key
Null palette letters {B,G,I,K,O,W,Z} as columnar transposition key — using a method that writes text into a grid and reads columns in a keyword-determ…
N/A 0/24 (0.0) NOISE N/A
Semaphore Columnar
Semaphore Columnar — using a method that writes text into a grid and reads columns in a keyword-determined order (columnar transposition).
N/A 0/24 (0.0) NOISE N/A
Blitz V7
Blitz V7 — using computer-optimized letter rearrangement using simulated annealing.
N/A 0/24 (0.0) NOISE N/A
Blitz V8
Blitz V8 — using computer-optimized letter rearrangement using simulated annealing.
N/A 0/24 (0.0) NOISE N/A
S 26 Bean Manifold SA
S 26 Bean Manifold SA — using computer-optimized letter rearrangement using simulated annealing.
N/A 0/24 (0.0) NOISE N/A
CSP P23 W15 Beau
CSP P23 W15 Beau — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Comprehensive autokey cipher attack on K4
Comprehensive autokey cipher attack on K4 — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Clock Reading Order
Clock Reading Order — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Fleissner 8x9 turning grille with delimiter + null mask + periodic sub
Fleissner 8x9 turning grille with delimiter + null mask + periodic sub — using a method using a physical card with holes that rotates to select letter…
N/A 0/24 (0.0) NOISE N/A
Fleissner Exploration
Fleissner Exploration — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Fold-as-Cardan-Grille: (1) geometric overlay selects K4 chars, (2) YAR removal creates holes revealing tableau chars
Fold-as-Cardan-Grille: (1) geometric overlay selects K4 chars, (2) YAR removal creates holes revealing tableau chars — using a method using a physical…
N/A 0/24 (0.0) NOISE N/A
Grille
Grille — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Grille
Grille — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Fleissner Q2 Autokey
Fleissner Q2 Autokey — using a method using a physical card with holes that rotates to select letters (grille cipher). Best match: 13/24 known letters…
N/A 13/24 (0.0) NOISE N/A
Fleissner grille on Vigenère tableau as keystream source
Fleissner grille on Vigenère tableau as keystream source — using a method using a physical card with holes that rotates to select letters (grille ciph…
N/A 0/24 (0.0) NOISE N/A
Null Mask CSP
Null Mask CSP — using a method using a physical card with holes that rotates to select letters (grille cipher).
N/A 0/24 (0.0) NOISE N/A
Accordion fold on K1-K2 encoding chart produces K4 keystream
Accordion fold on K1-K2 encoding chart produces K4 keystream — using a method that writes text into a grid and reads it along a path (spiral, zigzag, …
N/A 6/24 (0.0) NOISE N/A
Ts Cylindrical Rotation
Ts Cylindrical Rotation — using a method that writes text into a grid and reads it along a path (spiral, zigzag, etc.).
N/A 6/24 (0.0) NOISE N/A
Ts Vertical Wordlock
Ts Vertical Wordlock — using a method that writes text into a grid and reads it along a path (spiral, zigzag, etc.).
N/A 0/24 (0.0) NOISE N/A
Grid Asymmetry Audit
Grid Asymmetry Audit — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Row/column sequence structure analysis for known keystream
Row/column sequence structure analysis for known keystream — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Width10 17 Deep Investigation
Width10 17 Deep Investigation — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Width21 Bigram 73char
Width21 Bigram 73char — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Phase 3: Stehle delta4=5 and width-21 bigram interaction analysis
Phase 3: Stehle delta4=5 and width-21 bigram interaction analysis — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Cipher attacks on top 3 CT73 candidates from width-21 mask resolution
Cipher attacks on top 3 CT73 candidates from width-21 mask resolution — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A
Phase 5: Width-21 based mask resolution — C(14,7)=3,432 candidate masks
Phase 5: Width-21 based mask resolution — C(14,7)=3,432 candidate masks — using a method that reads text from a grid in various rotated arrangements.
N/A 0/24 (0.0) NOISE N/A