Both Substitution cipher technique and Transposition cipher technique are the types of Traditional cipher which are used to convert the plain text into cipher text.
Substitution Cipher Technique:
In Substitution Cipher Technique plain text characters are replaced with other characters, numbers and symbols as well as in substitution Cipher Technique, character’s identity is changed while its position remains unchanged.
Transposition Cipher Technique:
Transposition Cipher Technique rearranges the position of the plain text’s characters. In transposition Cipher Technique, The position of the character is changed but character’s identity is not changed.
Difference between Substitution Cipher Technique and Transposition Cipher Technique:
|S.NO||Substitution Cipher Technique||Transposition Cipher Technique|
|1.||In substitution Cipher Technique, plain text characters are replaced with other characters, numbers and symbols.||In transposition Cipher Technique, plain text characters are rearranged with respect to the position.|
|2.||Substitution Cipher’s forms are: Mono alphabetic substitution cipher and poly alphabetic substitution cipher.||Transposition Cipher’s forms are: Key-less transposition cipher and keyed transposition cipher.|
|3.||In substitution Cipher Technique, character’s identity is changed while its position remains unchanged.||While in transposition Cipher Technique, The position of the character is changed but character’s identity is not changed.|
|4.||In substitution Cipher Technique, The letter with low frequency can detect plain text.||While in transposition Cipher Technique, The Keys which are nearer to correct key can disclose plain text.|
|5.||The example of substitution Cipher is Caesar Cipher.||The example of transposition Cipher is Reil Fence Cipher.|
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Difference between Block Cipher and Transposition Cipher
- Difference between Monoalphabetic Cipher and Polyalphabetic Cipher
- Difference between Block Cipher and Stream Cipher
- Difference between Backtracking and Branch-N-Bound technique
- LZW (Lempel–Ziv–Welch) Compression technique
- Vernam Cipher in Cryptography
- Caesar Cipher in Cryptography
- Bifid Cipher in Cryptography
- Bit Stuffing error detection technique using Java
- Voice Biometric Technique in Network Security
- Block Cipher modes of Operation
- Transforming a Plain Text message to Cipher Text
- Difference between DAS and NAS
- Difference between H.323 and SIP
- Difference between 4NF and 5NF
- Difference between T-SQL and PL-SQL
- Difference Between Gi-Fi and Li-Fi
- Difference between IoE and IoT
- What is the difference between GUI and CUI?
- Difference between PNG and GIF
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.