Skip over navigation
Cambridge University Faculty of Mathematics NRich logo
menu search
  • Teachers expand_more
    • Early years
    • Primary
    • Secondary
    • Post-16
    • Events
    • Professional development
  • Students expand_more
    • Primary
    • Secondary
    • Post-16
  • Parents expand_more
    • Early Years
    • Primary
    • Secondary
    • Post-16
  • Problem-Solving Schools
  • About NRICH expand_more
    • About us
    • Impact stories
    • Support us
    • Our funders
    • Contact us
  • search

Or search by topic

Number and algebra

  • The Number System and Place Value
  • Calculations and Numerical Methods
  • Fractions, Decimals, Percentages, Ratio and Proportion
  • Properties of Numbers
  • Patterns, Sequences and Structure
  • Algebraic expressions, equations and formulae
  • Coordinates, Functions and Graphs

Geometry and measure

  • Angles, Polygons, and Geometrical Proof
  • 3D Geometry, Shape and Space
  • Measuring and calculating with units
  • Transformations and constructions
  • Pythagoras and Trigonometry
  • Vectors and Matrices

Probability and statistics

  • Handling, Processing and Representing Data
  • Probability

Working mathematically

  • Thinking mathematically
  • Developing positive attitudes
  • Cross-curricular contexts

Advanced mathematics

  • Decision Mathematics and Combinatorics
  • Advanced Probability and Statistics
  • Mechanics
  • Calculus

For younger learners

  • Early Years Foundation Stage

Substitution Transposed

Age 11 to 16
Challenge Level Yellow starYellow starYellow star
  • Problem
  • Getting Started
  • Student Solutions
  • Teachers' Resources

This problem follows on from Substitution Cipher and Transposition Cipher


Below is a secret message. It's been double encrypted, first using a substitution cipher and then using a transposition cipher. Can you decipher it?

whhujnjwuzlwvvdhgdlkqwdhvdkelqhldwurlhhwklwwuhdwdgqjkhzqqbrhowkgbqkq
ywhuovwfzebzlhhzfwrlkwrhddhhhkdqsqhkkuohkrfqqdujdbjdvulhgoidpwggvhlg
vwqdhollduwzudhwqqhhrwqmguqzrzlljykrzyaprgxuidlqdwfrhhwlhfdppvhduwwv
kerukuwuhvldwqwbkgfkhgbrdkwsnpgrdkufrdrogpxllkwhhduqhhrrowohrvogrdoc
pggugouodvdghzrxvbrhlwderdhqiohddqjdqrwqkquxwggurujbwkphoxdhgluldfhi
qhfvwhdrvubpfhokrqzfqkxddqjvbornghdofkrwlseqgldvlwijgogklqvosrvffxxy
kuosozzwyvgrxrrdgehhrddddlhhduvwirovxguqvvewqsqb

If you want to work on a computer, you can download the ciphertext as a text file here.

You can then use our Cipher Challenge Toolkit to help you decrypt it.

If you are interested in code breaking you might enjoy the Secondary Cipher Challenge.

You may also like

The Best Card Trick?

Time for a little mathemagic! Choose any five cards from a pack and show four of them to your partner. How can they work out the fifth?

Substitution Cipher

Find the frequency distribution for ordinary English, and use it to help you crack the code.

Secret Transmissions

How can Agent X transmit data on a faulty line and be sure that her message will get through?

  • Tech help
  • Accessibility Statement
  • Sign up to our newsletter
  • Twitter X logo

The NRICH Project aims to enrich the mathematical experiences of all learners. To support this aim, members of the NRICH team work in a wide range of capacities, including providing professional development for teachers wishing to embed rich mathematical tasks into everyday classroom practice.

NRICH is part of the family of activities in the Millennium Mathematics Project.

University of Cambridge logo NRICH logo