Fact-checked by Grok 2 weeks ago

Tabula recta

The tabula recta (Latin for "straight table") is a cryptographic device consisting of a 26-by-26 grid of letters, where each row represents a successive shift of the , forming the basis for polyalphabetic substitution ciphers such as the . Invented by the German abbot and scholar around 1508 and first published in his 1518 treatise Polygraphia, the tabula recta provided a systematic method for generating multiple substitution alphabets without relying on mechanical aids, marking a key advancement in . In Trithemius's original progressive , encryption proceeds by selecting rows in sequence to shift plaintext letters, creating a running key that changes with each character, though this method was cumbersome for long messages due to its fixed progression. The table's design— with the standard along the top and left edges, and each subsequent row rotated left by one position—allows for efficient and decryption by intersecting a letter (row) with a key letter (column) to yield the . This structure was later adapted by Italian cryptographer in 1553, who introduced a repeating keyword to select rows non-progressively, enhancing practicality and security against . French diplomat further refined and popularized the system in his 1586 work Traicté des chiffres, crediting it as the "square table" and integrating it into what became known as the , long considered unbreakable until cryptanalysts like and Friedrich Kasiski exploited keyword repetition in the . Beyond its historical role in manual , the tabula recta influenced subsequent innovations, including and implementations, and remains a pedagogical tool for understanding techniques, though modern renders it obsolete for secure communications. Its significance lies in bridging monoalphabetic limitations—where letter frequencies are preserved—with polyalphabetic , laying groundwork for more complex systems while highlighting early efforts to balance usability and secrecy.

Definition and Construction

Overview

The tabula recta is a 26×26 table employed in for the , with rows and columns labeled A through Z, where each cell contains a letter from an alphabet shifted progressively one position to the left in a cyclic manner. This structure represents operations on letters, enabling direct substitution without converting to numbers. Its primary purpose is to facilitate polyalphabetic ciphers, where a determines the row used for each letter, generating a of distinct substitution alphabets to obscure the message and resist simple . By providing 26 unique alphabets—one for each letter position—the table enhances encryption complexity, as each character can map to multiple possible letters depending on the key-derived row. Visually, the table is symmetric across its , with each subsequent row representing a cyclic shift of the by one position, creating a for of letter values 26. For example, to encrypt the letter A against a letter B, one locates the B row and A column intersection, which yields B as the letter, allowing straightforward letter-by-letter processing.

Building the Table

The tabula recta is constructed as an n × n square table, where n is the number of letters in the alphabet, most commonly 26 for the modern English alphabet. The table consists of n rows, each representing a shifted version of the alphabet, enabling efficient lookups for polyalphabetic substitutions. To build the table step by step, begin with the top row (often labeled with the plaintext letters across the columns) filled with the standard alphabet in order: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. The second row starts with B and continues with C through Z, followed by A at the end, effectively shifting the entire alphabet one position to the left in a circular manner. Each subsequent row applies the same leftward circular shift to the previous row, incrementing the shift by one position per row until the final row returns to the original alphabet order but shifted fully (Z A B ... Y). This progressive shifting ensures no letter repeats within any row or column, resulting in a Latin square structure that guarantees unique substitutions. For alphabets smaller than 26 letters, such as versions with 23 letters (excluding J, U, W) or Trithemius's 24-letter adaptation, the table is scaled accordingly by applying the same method to the reduced set. Alternative directions (e.g., rightward) can be used, but the standard left shift maintains the property as long as shifts are uniform and wrap around without repetition. The following partial example illustrates the first three rows and columns for a 26-letter alphabet (rows labeled on the left, columns across the top):
ABCDE
AABCDE
BBCDEA
CCDEAB

Historical Origins

Trithemius's Invention

(1462–1516), a Benedictine and , served as the of the Sponheim and pursued scholarly interests spanning , chronology, and the occult sciences, including the arcane arts of secret writing and . His fascination with concealed communication reflected broader explorations of hidden knowledge, blending cryptographic techniques with mystical and esoteric traditions. In 1508, Trithemius devised the tabula recta as a foundational tool in his cryptographic innovations, aiming to transcend the vulnerabilities of earlier monoalphabetic methods such as the Caesar cipher's fixed shifts. This square table of alphabets enabled more sophisticated substitution schemes, serving as the basis for his progressive cipher system. Trithemius's primary motivation was to engineer dynamic encryption that evolved across the message's length, incorporating a running key derived from the sequential position of each letter to produce varying substitutions and thereby increase resistance to frequency analysis. By shifting the alphabet progressively—starting with minimal displacement and incrementing it for each subsequent character—his approach sought to mimic natural language variability while ensuring systematic security. The tabula recta initially emerged in unpublished manuscripts of Trithemius's Polygraphia, completed that same year, where it underpinned demonstrations of these progressive techniques before the work's a decade later.

Publication and Early Context

The Tabula recta, a key cryptographic tool, was first introduced to the public in Trithemius's Polygraphia, a comprehensive treatise on and composed around 1508 and published posthumously in 1518 in by his admirers. This work, spanning six books, systematically explored various forms of secret writing, including ciphers, and presented the tabula recta as a tabular method for generating multiple alphabets to enhance message security. Dedicated to I, the volume marked the inaugural printed book on cryptology in the , reflecting Trithemius's intent to formalize the art for practical and scholarly use. The publication occurred amid the Renaissance's burgeoning fascination with codes and ciphers, driven by humanist scholarship's emphasis on classical texts and the era's political-religious tensions. Humanists like Trithemius, who engaged in learned societies in , sought to revive ancient knowledge while navigating fears of and censorship, particularly as the Protestant loomed and sensitive diplomatic correspondences required concealment. Cryptography thus served not only military and state purposes but also as a safeguard for intellectual exchange in an age of inquisitorial scrutiny and fragmented principalities. Early reception of Polygraphia was confined largely to elite scholarly and clerical circles, owing to its composition in Latin and the esoteric nature of its content, which blended practical with allusions to hidden knowledge. While the book achieved notable circulation among European intellectuals—evidenced by its elegant format and references in subsequent cryptographic treatises—its complexity and Trithemius's controversial reputation limited broader dissemination beyond monasteries and courts. Misattributions arose from the author's association with occultism, leading some to view the work suspiciously despite its overt focus on secular ciphers, though it avoided the outright suppression faced by more arcane texts. Polygraphia complemented Trithemius's earlier Steganographia (written circa 1499–1500 but unpublished until 1606), which disguised cryptographic techniques within a framework of angelic magic and invocations, reflecting the author's dual interest in concealment and the esoteric. Unlike the more guarded Steganographia, which circulated in manuscript and was later condemned for sorcery, Polygraphia offered an explicit, non-occult exposition of similar principles, positioning the tabula recta as a foundational element in the evolution of steganographic arts.

Cryptographic Applications

Trithemius Cipher

The Trithemius cipher is a polyalphabetic that employs the tabula recta to generate a progressive keystream based on the of each letter in the message. In this , the rows of the tabula recta serve as successive alphabets, with the first row (starting with A) used for the first letter, the second row (starting with B) for the second, and so on, wrapping around after Z if the message exceeds 26 letters. This -dependent selection creates a deterministic keystream equivalent to adding an incrementing shift (0 for the first letter, 1 for the second, etc.) to each letter's in the alphabet, modulo 26. To encrypt a message, prepare the in uppercase without spaces or , then for each letter at i (starting from 1), locate the plaintext letter along the top row of the tabula recta and find the intersection with the i-th row (labeled A for i=1, B for i=2, etc.) to obtain the letter. Decryption reverses this by using the same positional rows but subtracting the shift: for each letter at i, find it in the i-th row and read the corresponding letter in the top row ( alphabet). For example, consider the "ATTACKATDAWN" (12 letters, all uppercase). The positional shifts are 0 through 11:
  • A (position 1, shift 0): remains A
  • T (2, 1): shifts to U
  • T (3, 2): shifts to V
  • A (4, 3): shifts to D
  • C (5, 4): shifts to G
  • K (6, 5): shifts to P
  • A (7, 6): shifts to G
  • T (8, 7): shifts to A
  • D (9, 8): shifts to L
  • A (10, 9): shifts to J
  • W (11, 10): shifts to G
  • N (12, 11): shifts to Y
The resulting ciphertext is "AUV DGPGALJGY" (spaces added for readability). To decrypt, apply the reverse shifts to this ciphertext using the same positions, yielding the original . The primary strength of the Trithemius cipher lies in its polyalphabetic nature, which maps the same letter to different letters depending on its position, thereby flattening letter frequencies and offering greater resistance to simple compared to monoalphabetic ciphers like the Caesar shift. However, its keystream is entirely predictable, as it relies solely on the message position without any secret key, allowing cryptanalysts to break it easily if the message length is known or guessed, by testing sequential shifts against probable words. The Vigenère cipher, first described by Italian cryptologist Giovan Battista Bellaso in his 1553 treatise La cifra del. Sig. Giovan Battista Bellaso, represents a key advancement in using the tabula recta for polyalphabetic encryption by incorporating a repeating keyword to dynamically select substitution alphabets. Unlike earlier positional methods, the keyword—such as "KEY"—repeats to match the plaintext length, with each key letter determining the row of the tabula recta. The plaintext letter is then aligned with the column headers, and the ciphertext is read from the intersection. This approach provides greater flexibility and security by avoiding fixed progressions, as the key can be any length and repeated as needed. To illustrate , consider the "HELLO" and keyword "KEY" (repeated as "KEYKE" to match length). Assuming a standard 26-letter tabula recta:
  • For 'H' () and 'K' (key): Locate row 'K' (shifted starting K, L, M, ..., J) and column 'H'; the intersection yields 'R'.
  • For 'E' and 'E': Row 'E' (E, F, G, ..., D) and column 'E' yields 'I'.
  • For 'L' and 'Y': Row 'Y' (Y, Z, A, ..., X) and column 'L' yields 'J'.
  • For 'L' and 'K': Row 'K' and column 'L' yields 'V'.
  • For 'O' and 'E': Row 'E' and column 'O' yields 'S'.
The resulting ciphertext is "RIJVS". Decryption reverses the process: using the ciphertext letter to select the row and the key letter for the column to retrieve the plaintext letter. Mathematically, this corresponds to ciphertext = (plaintext position + key position) mod 26 for encryption, and plaintext = (ciphertext position - key position) mod 26 for decryption, where A=0. Related ciphers built on this framework include the autokey variant, invented by Blaise de Vigenère in 1586 as described in his Traicté des chiffres, which extends the initial primer key using the plaintext itself to generate a non-repeating keystream, thereby enhancing security against frequency analysis while still relying on the tabula recta for lookups. Another variant is the Porta cipher, introduced by Giovanni Battista della Porta in his 1563 work De furtivis literarum notis, which employs a modified tabula recta consisting of 13 reciprocal alphabets, with each row selected by a pair of key letters (A and B for the first row, C and D for the second, and so on), allowing encryption and decryption to use the same process. Despite its name, the "Vigenère square" is a common misattribution; the tabula recta itself originated with Johannes Trithemius in 1518, while Bellaso devised the keyword mechanism, and Vigenère popularized and refined it in 1586 without claiming full invention. This cipher's adoption marked a shift toward practical, key-dependent polyalphabetics in Renaissance cryptography.

Variations and Extensions

Beaufort and Variant Tables

The Beaufort cipher, developed by British hydrographer and Rear Admiral Sir Francis Beaufort (1774–1857), represents a significant modification to the standard tabula recta for polyalphabetic substitution. Published posthumously in 1857 by his brother William in a pamphlet titled Cryptography: A System of Secret Writing, the cipher inverts the directional logic of the Vigenère square to facilitate a subtraction-based operation rather than addition. In this system, the tabula recta—known as the Beaufort square—is constructed such that the entry at the row for key letter K and column for plaintext letter P corresponds to the letter (K - P) mod 26 (with A=0, B=1, ..., Z=25), resulting in the top-left position (K=A, P=A) being "A", the next in that row (P=B) being "Z", and so on. This structure enables encryption through a modular subtraction: the ciphertext letter is derived by subtracting the numerical value of the plaintext from that of the key letter (modulo 26). To encipher a message, the plaintext letter is located in the column of the Beaufort square, the corresponding row for the current key letter is identified, and the letter at their intersection serves as the ciphertext. For example, with key letter "C" (value 2) and plaintext "A" (value 0), the result is "C" (value 2, since 2 - 0 = 2 mod 26). Decryption uses the same table and steps, but inputting the ciphertext letter into the plaintext column and the key letter into the key row, with the intersection yielding the plaintext letter—which highlights the cipher's reciprocal property, where encryption and decryption are identical operations, eliminating the need for separate tables and reducing errors in field use. This parity streamlined manual cryptographic workflows, particularly for personal and official correspondence where Beaufort applied it in his diaries and letters. Variant tables further adapt the tabula recta by altering shift directions or partial reversals. The Variant Beaufort cipher, also attributed to Beaufort's 1857 publication, reverses only the key alphabet while keeping the plaintext rows in standard order, effectively computing ciphertext as plaintext minus key (modulo 26). In practice, this uses a hybrid square where columns are shifted leftward as in the original tabula recta, but the top header runs backward from "Z" to "A," allowing for quicker alignment in subtraction without fully inverting the table. Another variant, the reverse tabula recta, shifts columns instead of rows—each column advances the alphabet rightward from the previous—producing a mirrored grid suited for certain reciprocal ciphers where addition and subtraction symmetry is preserved differently. These column-shifted implementations, sometimes called "active" tabula recta in historical texts, appear in progressive alphabet schemes that iteratively build shifts for autokey extensions, enhancing key variability without external primers. Other adaptations incorporate double-entry tables, where the tabula recta serves dual roles for and evolving keys in autokey systems, appending letters to the initial keyword for progressive . This double-entry approach, using the same square, supported grille-based methods like the Cardan grille overlaid on the to select paths, obscuring patterns in grid layouts. Historically, such variants found application in military codes during the mid-19th century, including dispatches influenced by Beaufort's naval role, where the simplified decryption aided rapid signaling without dedicated decryptor tables. The core advantage across these modifications—shared procedural parity between and decryption—proved invaluable for in constrained environments, distinguishing them from unidirectional tables like the standard Vigenère square.

Modern and Educational Uses

The tabula recta serves as a foundational tool in contemporary education, particularly for introducing students to polyalphabetic substitution ciphers. It is commonly taught in university courses on and to illustrate the shift from monoalphabetic to more complex methods, emphasizing how repeated alphabets enable key-based substitutions. For instance, in assignments for introductory courses, students implement the using the tabula recta to encrypt and decrypt messages, reinforcing concepts of and key repetition. Textbooks on classical , such as Friedrich L. Bauer's Decrypted Secrets, highlight the table's role in demonstrating the evolution of ciphers, often including exercises where learners construct and apply it manually. David Kahn's seminal further underscores its educational persistence by detailing the table's historical mechanics in accessible terms, making it a staple reference for instructors explaining early polyalphabetics. Interactive tools like , used in educational settings, incorporate the tabula recta for hands-on simulations of encryption processes, allowing users to visualize shifts and test vulnerabilities. This approach prioritizes conceptual grasp over computation, helping learners appreciate why such tables marked a cryptographic advancement despite modern obsolescence. In software implementations, the tabula recta is digitally recreated through libraries and scripts that automate operations for demonstrations and analysis. Open-source repositories provide modular code to generate the 26x26 grid and perform encryptions, often as part of broader toolkits for educational or hobbyist use. Online simulators, such as those integrated into web-based platforms, allow users to input custom keys and observe table-based substitutions in , facilitating experimentation without manual table drawing. These tools emphasize the table's utility in teaching algorithmic thinking, with implementations typically handling uppercase Latin alphabets but extensible to variants. Niche modern applications include its adaptation in puzzle-solving contexts, such as geocaching challenges where participants decode clues via Vigenère-style ciphers employing the tabula recta. Adaptations for non-Latin alphabets, like Cyrillic, involve constructing equivalent tables by shifting the script's characters, enabling cultural or linguistic cryptography exercises. While not used for secure communication due to vulnerability to frequency analysis, the table appears in lightweight, recreational encryption scenarios, such as custom puzzle games that simulate historical codes. The tabula recta's legacy endures in education through its association with breaking techniques like the , which identifies key lengths in polyalphabetics by detecting repeated ciphertext patterns aligned with table shifts. Courses in often use it to teach this method, applying the examination to Vigenère examples to reveal how shared table structures expose periodicities. This instructional focus highlights the table's role in understanding cipher weaknesses, influencing modern pedagogical approaches to secure system design.

References

  1. [1]
    Classical Ciphers
    In practice, encryption and decryption were usually done with a printed lookup table called the Vigenère square or tabula recta. It is a 26×26 grid ...
  2. [2]
    Trithemius, Bellaso, Vigenère – Origins of the Polyalphabetic Ciphers
    ### Historical Origins of Tabula Recta and Polyalphabetic Ciphers
  3. [3]
    [PPT] ppt - Rivier University
    ... cipher. It uses a Tabula recta, a cryptographic term invented by Johannes Trithemius in 1518; The Vigenère Cipher was thought for a time to be unbreakable ...
  4. [4]
  5. [5]
    [PDF] Leading-edge Cryptography
    Then, in medieval. Europe, the use of multiple substitution tables led to the development of a much stronger cipher called the tabula recta. The evolution of ...
  6. [6]
    [PDF] Traditional Cryptography
    Feb 8, 2015 · By this point, if a tabula recta were used to encode the plaintext it would have been a breeze to find the original message. This is due to the ...<|control11|><|separator|>
  7. [7]
    Tabula recta - EPFL Graph Search
    In cryptography, the tabula recta (from Latin tabula rēcta) is a square table of alphabets, each row of which is made by shifting the previous one to the ...
  8. [8]
    [PDF] TOTALLY SYMMETRIC AND MEDIAL QUASIGROUPS AND THEIR ...
    Figure 4.1: The tabula recta, a quasigroup used for encryption and decryption in the. Vigen`ere cipher concatenating k (including potentially a prefix of k ...
  9. [9]
    Vigenere Cipher Decoder (interactive tool) - Boxentriq
    The tabula recta typically contains the 26 letters of the Latin alphabet from A to Z along the top of each column, and repeated along the left side at the ...
  10. [10]
    Johannes Trithemius Issues the First Book on Cryptography
    A book on many forms of writing, but actually the first book on codes and cryptography, was posthumously published in Basel in 1518, two years after his death.
  11. [11]
    Johannes Trithemius and Witches: Between Religion and Superstition
    Oct 17, 2024 · Although the Benedictine abbot Johannes Trithemius (1462–1516)2 also contributed to the witchcraft question in 16th-century Germany, his work is ...
  12. [12]
    Vigenère cipher | EPFL Graph Search
    Later, Johannes Trithemius, in his work Polygraphiae (which was completed in manuscript form in 1508 but first published in 1518), invented the tabula recta ...
  13. [13]
    Vigenère Cipher - Crypto Museum
    Aug 14, 2010 · In 1508, Johannes Trithemius invented the so-called tabula recta (a matrix of shifted alphabets) that would later be a critical component of ...
  14. [14]
    The Polygraphia of Johannes Trithemius: reflections on the ... - SciELO
    This article discusses the role the esoteric concept of secret had in the construction of encrypted communication methods.Missing: limited circulation reception
  15. [15]
    The rise of cryptology in the European Renaissance - ResearchGate
    Aug 17, 2020 · This chapter discusses the rise of cryptology in the European renaissance. The rise of cryptology in the Europe of the Renaissance period ...
  16. [16]
    Trithemius Johannes (Encyclopedia of Renaissance Philosophy, ed ...
    During his studies in Heidelberg, he was involved in learned humanistic societies, and later he applied the ideal of humanistic eloquence in his works.
  17. [17]
    depicts the abbot presenting his Polygraphia (a work dealing with
    depicts the abbot presenting his Polygraphia (a work dealing with cryptography) to Emperor Maximilian; the wide circulation of this.
  18. [18]
    [PDF] Solved: The Ciphers In Book III Of Trithemius's Steganographia
    ' In 1500, possibly in reaction to this charge, Trithemius abandoned work on the book, but not, as the Polygraphia reveals, his interest in cryptography. An ...
  19. [19]
    [PDF] Trithemius, Bellaso, Vigenère Origins of the Polyalphabetic Ciphers
    1506 and 1508 and published in 1518, after his death. 5It may be appropriate to remark that the letter W, as a consonant variant of the Latin vowel V, ( ...Missing: Polygraphia | Show results with:Polygraphia
  20. [20]
    7.2. Trithemius Cipher — MA/CS 4200 Cryptography
    The Trithemius Cipher attempts to formalize the polyalphabetic cipher process by using very predictable keys.<|control11|><|separator|>
  21. [21]
    Trithemius Cipher - Online Decoder, Encoder, Translator - dCode
    Tool to decrypt/encrypt Trithemius. The Trithemius cipher is a polyalphabetic encryption method ... Example: To code DCODE shift D from +0 an get D , shift ...
  22. [22]
    Vigenère Cipher - Crypto Corner
    What is today known as the Vigenère Cipher was actually first described by Giovan Battista Bellaso in his 1553 book La cifra del. Sig.
  23. [23]
    Polyalphabetic Ciphers before 1600 - Cryptiana
    Aug 28, 2025 · From 1600 · Thomas Roe/Elizabeth, Queen of Bohemia (1636) · Lord Feilding (1634-1639) · Henry Cromwell (1656) · Edward Nicholas · Polyalphabetic ...
  24. [24]
    Beaufort Cipher (interactive tool) - Boxentriq
    Sir Francis Beaufort, an Irish-born admiral and hydrographer in the Royal Navy, devised the cipher that now bears his name. It was first published posthumously ...
  25. [25]
    Beaufort Cipher - Online Decoder, Encoder, Solver, Translator - dCode
    Sir Francis Beaufort , british amiral made this method published after his death by its brother in 1857. However, some writings indicate that this variant was ...
  26. [26]
    Beaufort cipher - Crypto Museum
    Feb 17, 2021 · The Beaufort Cipher is a polyalphabetic substitution cipher, created by British rear admiral Sir Francis Beaufort (1771-1857) [2]. It is based ...Missing: tabula recta
  27. [27]
    Beaufort Cipher - Practical Cryptography
    The Beaufort cipher, created by Sir Francis Beaufort, is a polyalphabetic substitution cipher that is similar to the Vigenère cipher.Missing: 1857 | Show results with:1857
  28. [28]
    Variant Beaufort Cipher - Online Decoder, Encoder, Solver - dCode
    Tool to decrypt/encrypt with Beaufort Variant automatically. Variant Beaufort Cipher is a (German) variant of the Beaufort Cipher. The variant subtract the key ...
  29. [29]
    CryptoCrack - Variant Beaufort - Google Sites
    The Beaufort cipher uses reversed alphabets for both the key and ciphertext in the table whereas the Variant Beaufort uses just a reversed key.Missing: tabula recta
  30. [30]
    [PDF] 1 A Gentle Invitation - Institute for Statistics and Mathematics
    The Vigen`ere cipher uses a table of alphabets, called tabula recta, see Table. 6. ... Bauer (2007) is an excellent introduction to cryptography and cryptanalysis ...
  31. [31]
    [PDF] CS1132 Fall 2013 Assignment 2 due 11/21 11:59pm
    1 Cryptography Fun! Just several decades ago, cryptography existed ... cipher can be implemented using what is called a tabula recta, or Vigenre square.Missing: history | Show results with:history
  32. [32]
    [PDF] Exploring Cryptography Using CrypTool - nematyc.org
    To encrypt, a table of alphabets can be used, called a tabula recta or Vigenère square, that consists of several Caesar ciphers in sequence with different shift ...
  33. [33]
    VigenerePy - A Python 3.x class to implement the Vigenere cipher
    To use the Vignere square, take the letter to be enciphered/deciphered and find the row beginning with that letter. Next, take the letter of the keyword to use ...
  34. [34]
    How to Implement the Vigenère Cipher in Python
    Step-by-step guide to implementing the Vigenère Cipher in Python. Understand its mechanism, strengths, and vulnerabilities, with practical examples for ...
  35. [35]
    Vigenère Cipher - GeeksforGeeks
    Jul 18, 2024 · Vigenere Cipher is a method of encrypting alphabetic text. It uses a simple form of polyalphabetic substitution.
  36. [36]
    [PDF] Can a Tabula Recta provide security in the XXI century? - arXiv
    To subtract leKers using Tabula Recta, he looks up the subtrahend (the cipher, in this case) at the top header, goes down that column un8l the minuend (the ...
  37. [37]
    8.3. The Kasiski Test — MA/CS 4200 Cryptography
    The Vigenère cipher remained secure for hundreds of years. It defeated the previous cryptanalysis methods of using frequency analysis to determine the key.Missing: education | Show results with:education
  38. [38]
    Kasiski's Method - Michigan Technological University
    Kasiski suggested that one may look for repeated fragments in the ciphertext and compile a list of the distances that separate the repetitions.Missing: tabula recta