Atbash

From Wikipedia, the free encyclopedia

Atbash is a simple substitution cipher for the Hebrew alphabet. It consists of substituting aleph (the first letter) for tav (the last), beth (the second) for shin (one before last), and so on, reversing the alphabet. A couple of words in the Book of Jeremiah, Leb Kamai and Sheshakh, are Atbash for Kasdim/Kasdin (Chaldeans) and Babel respectively, probably written thus (Jer. 25:26; 51:1, 41). It has been associated with the esoteric methodologies of Jewish mysticism's interpretations of Hebrew religious texts as in the Kabbalah.

An Atbash cipher for the Roman alphabet would be as follows:

 Plain:  abcdefghijklmnopqrstuvwxyz
 Cipher: ZYXWVUTSRQPONMLKJIHGFEDCBA

Atbash can also be used to mean the same thing in any other alphabet as well. This is a very simplistic substitution cipher.

For example, in Atbash, the letters "nlmvb" indicate the word "money".

A few English words 'Atbash' into other English words. For example, "hob"="sly", "hold"="slow", "holy"="slob", "horn"="slim", "irk"="rip", "low"="old", "glow"="told", and "grog"="tilt".

It is a very weak cipher because it only has one possible key, and it is a simple monoalphabetic substitution cipher. However, this may not have been an issue in the cipher's time.

The Atbash cipher is referenced in Google's Da Vinci Code Quest, in which participants must decode a common word from Atbash.

The @ symbol is known in French, among other things, as "at" bâclé. This seems to be a deliberate pun on "atbash clé" - i.e. A secret message is set to use the Atbash cipher at this point in reading the document.

[edit] See also

[edit] External links


Classical cryptography
v d e
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex
Ciphers: ADFGVX | Affine | Alberti | Atbash | Autokey | Bifid | Book | Caesar | Four-square | Hill | Keyword | Nihilist | Permutation | Pigpen | Playfair | Polyalphabetic | Polybius | Rail Fence | Reihenschieber | Reservehandverfahren | ROT13 | Running key | Scytale | Solitaire | Straddling checkerboard | Substitution | Tap Code | Transposition | Trifid | Two-square | VIC cipher | Vigenère
Cryptanalysis: Frequency analysis | Index of coincidence
Misc: Cryptogram | Bacon | Polybius square | Scytale | Straddling checkerboard | Tabula recta
Cryptography
v d e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers