Bifid Cipher Encoder Decoder
Encrypt plaintext into Bifid cipher text or decrypt a Bifid message back to readable text.
Use a keyworded 5x5 square and adjustable period to explore coordinate fractionation in a classical hand cipher.
The Bifid cipher is a fractionating cipher that starts with a Polybius square. Each plaintext letter becomes a row and column coordinate in a 5x5 alphabet grid.
A fractionating cipher is a cipher that splits each symbol into smaller parts before recombining those parts. In Bifid encryption, the row digits for a block are written first, the column digits are written second, and the combined digit stream is read back in pairs to create ciphertext.
The period is the number of letters processed in one block. A period of 5 means five letters are converted to coordinates, mixed, and rebuilt before the next five letters are handled. The Bifid cipher is commonly attributed to Felix Delastelle, who also designed other fractionating systems.
Plain text
DEFEND THE EAST WALL
Keyword: CIPHER | Period: 5
The plaintext is normalized to letters only, with J treated as I.
Plain text
MEET AT DAWN
Keyword: POLYBIUS | Period: 5
Changing the keyword changes the square and therefore every coordinate used by the cipher.
Bifid is part of the family of Delastelle fractionating ciphers. It is historically interesting because it combines substitution with transposition instead of replacing each plaintext letter with one fixed ciphertext letter.
Coordinate fractionation is a text transformation that hides individual letter positions by mixing row and column information across a block. That makes Bifid a useful comparison point for Playfair, Four-square, and Nihilist ciphers, which also use 5x5 squares but combine coordinates differently.
For deeper historical context, the biography of Felix Delastelle helps place the method among late nineteenth-century manual cipher systems. Today it is best used for classroom cryptography, puzzle hunts, and demonstrations of why combining simple operations does not create modern security.
Keyword Builds the Square
Repeated keyword letters are removed, then the remaining alphabet fills the grid.
Period Changes Output
Sender and receiver must use the same period or decryption will not line up.
Educational Only
Bifid is valuable for learning classical cryptography, not for protecting sensitive data.