The foursquare cipher is a manual symmetric encryption technique. It was invented by famous French cryptographer Felix Delastelle.
The technique encrypts pairs of letters (digraphs), and thus falls into a category of ciphers known as polygraphic substitution ciphers. This adds significant strength to the encryption when compared with monographic substitution ciphers which operate on single characters. The use of digraphs makes the foursquare technique less susceptible to frequency analysis attacks, as the analysis must be done on 676 possible digraphs rather than just 26 for monographic substitution. The frequency analysis of digraphs is possible, but considerably more difficult  and it generally requires a much larger ciphertext in order to be useful.
Using foursquare[]
The foursquare cipher uses four 5 by 5 matrices arranged in a square. Each of the 5 by 5 matrices contains the letters of the alphabet (usually omitting "Q" or putting both "I" and "J" in the same location to reduce the alphabet to fit). In general, the upperleft and lowerright matrices are the "plaintext squares" and each contain a standard alphabet. The upperright and lowerleft squares are the "ciphertext squares" and contain a mixed alphabetic sequence.
To generate the ciphertext squares, one would first fill in the spaces in the matrix with the letters of a keyword or phrase (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (again omitting "Q" to reduce the alphabet to fit). The key can be written in the top rows of the table, from left to right, or in some other pattern, such as a spiral beginning in the upperlefthand corner and ending in the center. The keyword together with the conventions for filling in the 5 by 5 table constitute the cipher key. The foursquare algorithm allows for two separate keys, one for each of the two ciphertext matrices.
As an example, here are the foursquare matrices for the keywords "example" and "keyword." The plaintext matrices are in lowercase and the ciphertext matrices are in caps to make this example visually more simple:
a b c d e E X A M P f g h i j L B C D F k l m n o G H I J K p r s t u N O R S T v w x y z U V W Y Z K E Y W O a b c d e R D A B C f g h i j F G H I J k l m n o L M N P S p r s t u T U V X Z v w x y z
Algorithm[]
To encrypt a message, one would follow these steps:
 Split the payload message into digraphs. (HELLO WORLD becomes HE LL OW OR LD)
 Find the first letter in the digraph in the upperleft plaintext matrix.
a b c d e E X A M P f g h i j L B C D F k l m n o G H I J K p r s t u N O R S T v w x y z U V W Y Z K E Y W O a b c d e R D A B C f g h i j F G H I J k l m n o L M N P S p r s t u T U V X Z v w x y z
 Find the second letter in the digraph in the lowerright plaintext matrix.
a b c d e E X A M P f g h i j L B C D F k l m n o G H I J K p r s t u N O R S T v w x y z U V W Y Z K E Y W O a b c d e R D A B C f g h i j F G H I J k l m n o L M N P S p r s t u T U V X Z v w x y z
 The first letter of the encrypted digraph is in the same row as the first plaintext letter and the same column as the second plaintext letter. It is therefore in the upperright ciphertext matrix.
a b c d e E X A M P f g h i j L B C D F k l m n o G H I J K p r s t u N O R S T v w x y z U V W Y Z K E Y W O a b c d e R D A B C f g h i j F G H I J k l m n o L M N P S p r s t u T U V X Z v w x y z
 The second letter of the encrypted digraph is in the same row as the second plaintext letter and the same column as the first plaintext letter. It is therefore in the lowerleft ciphertext matrix.
a b c d e E X A M P f g h i j L B C D F k l m n o G H I J K p r s t u N O R S T v w x y z U V W Y Z K E Y W O a b c d e R D A B C f g h i j F G H I J k l m n o L M N P S p r s t u T U V X Z v w x y z
Using the foursquare example given above, we can encrypt the following plaintext:
Plaintext: he lp me ob iw an ke no bi Ciphertext: FY GM KY HO BX MF KK KI MD
Here is the foursquare written out again but blanking all of the values that aren't used for encrypting the first digraph "he" into "FY"
            h       F                                 Y       e                                        
As can be seen clearly, the method of encryption simply involves finding the other two corners of a rectangle defined by the two letters in the plaintext digraph. The encrypted digraph is simply the letters at the other two corners, with the upperright letter coming first.
Decryption works the same way, but in reverse. The ciphertext digraph is split with the first character going into the upperright matrix and the second character going into the lowerleft matrix. The other corners of the rectangle are then located. These represent the plaintext digraph with the upperleft matrix component coming first.
Foursquare cryptanalysis[]
Like most premodern era ciphers, the foursquare cipher can be easily cracked if there is enough text. Obtaining the key is relatively straightforward if both plaintext and ciphertext are known. When only the ciphertext is known, brute force cryptanalysis of the cipher involves searching through the key space for matches between the frequency of occurrence of digrams (pairs of letters) and the known frequency of occurrence of digrams in the assumed language of the original message.
Cryptanalysis of foursquare generally involves pattern matching on repeated monographs. This is only the case when the two plaintext matrices are known. A foursquare encipherment usually uses standard alphabets in these matrices but it is not a requirement. If this is the case, then certain words will always produce singleletter ciphertext repeats. For instance, the word MI LI TA RY will always produce the same ciphertext letter in the first and third positions regardless of the keywords used. Patterns like these can be cataloged and matched against singleletter repeats in the ciphertext. Candidate plaintext can then be inserted in an attempt to uncover the ciphertext matrices.
Unlike the Playfair cipher, a foursquare cipher will not show reversed ciphertext digraphs for reversed plaintext digraphs (e.g. the digraphs AB BA would encrypt to some pattern XY YX in Playfair, but not in foursquare). This, of course, is only true if the two keywords are different. Another difference between foursquare and Playfair which makes foursquare a stronger encryption is the fact that double letter digraphs will occur in foursquare ciphertext.
By all measures, foursquare is a stronger system for encrypting information than Playfair. However, it is more cumbersome because of its use of two keys and preparing the encryption/decryption sheet can be time consuming. Given that the increase in encryption strength afforded by foursquare over Playfair is marginal and that both schemes are easily defeated if sufficient ciphertext is available, Playfair has become much more common.
A good tutorial on reconstructing the key for a foursquare cipher can be found in chapter 7, "Solution to Polygraphic Substitution Systems," of Field Manual 34402, produced by the United States Army.
See also[]
 Topics in cryptography

hr:Šifra četiri kvadrata hu:Négy négyzetrejtjel zh:四方密碼