Atbash Cipher - Ancient Encryption Tool
Free Online Tool

Porta Cipher Tool

Encode and decode classical Porta cipher text with a reciprocal keyword alphabet.

TL;DR

  • A Porta cipher is a reciprocal polyalphabetic substitution cipher.
  • One keyword selects paired alphabets such as AB, CD, EF, and onward.
  • The same tableau operation encrypts and decrypts the message.
  • This browser tool keeps your text local and stores no messages.

How to Use the Porta Cipher Tool

  1. Choose encrypt or decrypt.
  2. Enter a keyword such as PORTA or SECRET.
  3. Paste plaintext or ciphertext into the input box.
  4. Copy the result, download it, or swap it back for a reciprocal round trip.

How Porta Ciphers Work

A Porta cipher is a polyalphabetic cipher that changes substitution alphabets according to a repeated keyword. It belongs to the same broad family as Vigenere and Beaufort, but its alphabet table is designed to be reciprocal.

A reciprocal cipher is a cipher where the same operation can be used for encryption and decryption. In the Porta cipher, the keyword letters are grouped into pairs: A/B select one alphabet, C/D select the next, and so on through Y/Z.

A keyword is the shared secret text that chooses which paired alphabet applies to each letter. Non-letter characters are ignored by the key stream, while the tool can either preserve punctuation or output compact five-letter groups.

History and Use Cases

The name refers to Giovanni Battista della Porta, whose Renaissance cryptographic writing influenced later polyalphabetic systems. Merriam-Webster defines a Porta cipher as a substitution cipher that uses reciprocal alphabets.

A cipher tableau is the alphabet table used to look up each replacement letter. Classical manuals such as Helen Fouche Gaines' public-domain book on Project Gutenberg discuss hand methods for solving and comparing classical substitution systems.

Today, Porta is best for cryptography lessons, puzzle hunts, escape-room clues, and historical comparison. It should not be used to protect passwords, API keys, private messages, or sensitive files.

Worked Example

Plaintext: ATTACK AT DAWN
Keyword: PORTA
Repeated key: PORTAP OR TAPO
Ciphertext: UMLWPR UL ZNCG

Because Porta is reciprocal, entering UMLWPR UL ZNCG with the same keyword returns ATTACK AT DAWN.