Copyright © University of Cambridge. All rights reserved.

'Substitution Transposed' printed from http://nrich.maths.org/

Show menu

This problem follows on from Substitution Cipher and Transposition Cipher


Below is a secret message. It's been double encrypted, first using a substitution cipher and then using a transposition cipher. Can you decipher it?

 

whhujnjwuzlwvvdhgdlkqwdhvdkelqhldwurlhhwklwwuhdwdgqjkhzqqbrhowkgbqkq
ywhuovwfzebzlhhzfwrlkwrhddhhhkdqsqhkkuohkrfqqdujdbjdvulhgoidpwggvhlg
vwqdhollduwzudhwqqhhrwqmguqzrzlljykrzyaprgxuidlqdwfrhhwlhfdppvhduwwv
kerukuwuhvldwqwbkgfkhgbrdkwsnpgrdkufrdrogpxllkwhhduqhhrrowohrvogrdoc
pggugouodvdghzrxvbrhlwderdhqiohddqjdqrwqkquxwggurujbwkphoxdhgluldfhi
qhfvwhdrvubpfhokrqzfqkxddqjvbornghdofkrwlseqgldvlwijgogklqvosrvffxxy
kuosozzwyvgrxrrdgehhrddddlhhduvwirovxguqvvewqsqb

 

If you want to work on a computer, you can download the ciphertext as a text file here.

You can then use our Cipher Challenge Toolkit to help you decrypt it.

 

If you are interested in code breaking you might enjoy the Secondary Cipher Challenge.