Frequency Analysis Tool
Inspect letter distributions, n-grams, and index of coincidence, then test substitution guesses with a live decoder preview.
Frequency analysis compares ciphertext statistics with known language patterns. In English, letters such as E, T, A, O, and N appear more often than Q, X, or Z. A monoalphabetic substitution cipher preserves that unevenness, even though the visible letters change.
This tool starts by ranking single letters, then highlights repeated bigrams and trigrams, and finally calculates the index of coincidence to estimate whether the text behaves more like ordinary language or random-looking output.
Statistical clues alone are not enough to finish every decryption, so the decoder panel lets you turn those clues into a working plaintext hypothesis by assigning manual substitutions.
- Testing whether an unknown string is likely a simple substitution cipher rather than an encoding.
- Comparing ciphertext against expected English frequency patterns before trying Caesar, Atbash, or full substitution mapping.
- Teaching classical cryptanalysis with visible statistics instead of a black-box decoder.
Frequency analysis became famous in the medieval Islamic world, especially through the work of Al-Kindi, whose writing on deciphering secret messages described how letter-counting can attack substitution systems.
For centuries, this method was one of the core reasons simple substitution ciphers stopped being trustworthy for serious secrecy. Later systems such as Vigenere gained popularity partly because they attempted to disrupt those fixed frequency patterns.
These sources explain the underlying ideas behind the tool and provide further background on classical cryptanalysis: