Pigpen Cipher is used extensively in Freemason documentation. There are still surviving examples of letters written using the cipher from the 16th Century. It can also be found on Masonic medals, certificates, tokens and even gravestones.
In 1934, a well-respected historian by the name of Charles Bourrel de la Roncire published a book about a cryptogram he had deciphered. It was allegedly the work of the infamous pirate, Olivier Levassuer, also known as The Hawk (La Buse).
Bourrel had identified the cipher, which was a form of pigpen, and translated that into plaintext. However, that was where his problems began, as the message seemed to simply be a recipe for a folk remedy rather than the location of a hidden treasure.
English actress and blonde bombshell, Diana Dors, was once considered a rival to Marilyn Monroe. When she passed away at the age of 52, she left behind an encoded message which only her husband had the key to. The message, it was said, led to millions of pounds which the actress had hidden.
Take a 3x3 grid and write the alphabet in it, three letters to each square. Under each letter place a dot. Now, when you want to encode a message you draw the shape of the grid around the letter just like pigpen, but you place the dot in a different place for each letter. For example:
In standard pigpen, the letters are written over two grids and two crosses. By changing the order of grids, you can make a cipher that looks like simple pigpen but will take a little longer to decrypt. For example, rather than using the standard grid, grid, X, X, you could switch to grid, X, grid, X or X, grid, X grid. For example:
There is also a variant of Pigpen which includes the numbers 0-9. This version expands the X grid to be 3 x 3. The letters take their usual places on the outside, while the digits are spread through the internal squares.
Pigpen is often used as an introduction to cryptography because it is simple, visual, and effective. Of course, that also makes it one of the least secure ciphers. Even a person who had never heard of pigpen would stand a chance at cracking the code using frequency analysis.
See also: Code-Breaking overview Adfgvx cipher Adfgx cipher Affine cipher Atbash cipher Baconian cipher Beaufort cipher Bifid cipher Caesar cipher Columnar transposition Cryptogram Double transposition Enigma machine Four-square cipher Gronsfeld cipher Keyed caesar cipher One-time pad Playfair cipher Rail fence cipher Rot13 Route transposition Trifid cipher Variant beaufort cipher Vigenere cipher
Using cipher codes is a great way to get reluctant students to write. Present one or more of these cipher codes. Build up the suspense by discussing how spies carried secret assault plans through enemy lines using various codes. Be sure to grab the printable by clicking on this link.
Morse Code was invented by Samuel Morse and Alfred Vail. It uses a series of long and short pulses. A dot equals one short pulse (x) called a dit. The dashes called dahs are equal in length to three dots (3x). The space between each letter is equal to a dash (3x). The space between words is equal to seven dots (7x).
Samuel Morse and Alfred Vail developed the code for the telegraph machine. A telegraph operator would sit at the machine and tap out long and short taps to represent the letters in the message he was sending.
The Vigenre Cipher was invented by Giovan Battista Bellaso in 1553. It uses a table consisting of 26 alphabetized letters across and 27 letters down. To use this code, you must first know the secret phrase. During the American Civil War, the secret phrases included:
The cipher uses a geometric simple substitution. First, draw two grids (tic tac toe style) and two Xs. Write each letter of the alphabet in the blank spaces as shown. Add dots to the second grid and X to distinguish the two.
Pigpen Cipher
The Pigpen Cipher is one of the oldest ciphers. It is a geometric simple substitution cipher where letters are exchanged for symbols, which are fragments of a grid.
We used a pigpen cipher for pattern Encode (P1912a).
Greek Square Cipher
A Greek Square Cipher was used by the ancient Greeks and worked well for their 25 character alphabet. In order for this cipher to work with our 26 letter alphabet, the I and J are combined.
We used the Greek Square Cipher in pattern Daisy Chain (P1906a).
Pie Cipher
This cipher uses a circle divided like a pie chart into 26 equal parts. Then we use color and pie slice placement to identify the letters.
We used this on pattern Dance (P1927a).
For more awesome codes and cipher go to my website bestcodes.weebly.com
or visit bestcodesgame.weebly.com
to practice decoding
Also visit my other instructable "Movie Codes" or see them here at
-codes.html
The Digraph Cipher is kind of like the Vigenere Cipher. When you write a sentence you would write it in pairs of twos, li ke th is, and if there is a letter left over add an x to it. The pairs of letters will be the coordinates for the two letters. An example would be "IA MT RY IN GT OE XP LA IN TH IS" = "VG ZN EI VT TN BC KR YG VT GZ VO". To decipher it the decoded letters will be the coordinates.
The Grid Transposition cipher is just another type of transposition cipher. First make a grid that can fit all of the letters, you can do that by taking the square root of the total number of letters, if it comes out as a decimals round up. If there are extra spaces add X's. Then you scatter the numbers in a random order. Then Match the coordinates onto the second grid. Best codes would come out as EDSEBSCTO. To decode it all you need to do is make another grid with the letters in the correct order. Finally Match the coordinates onto the correct grid.
Morse code was invented by Samuel Morse and was used in the early 1800's to message people in a telegram. It is a series of beeps that are short and long. For example _ is called a dash and it would be a long beep, and . would be dot and it would be a short beep.
The Phone code is really cool because not a lot of people know it. It is just the number the letter is on and then what number it is on that number. For example A is on 1st number on 2 so it would be 2 1
The Pigpen Cipher was created by the Freemasons so they could keep documents safe. It was also used by the confederate soldiers during the Civil War. It is called The Pigpen Cipher because the box's look like pigpens and the dots look like pigs. It seems complicated but it isn't really. The lines surrounding the letter and the dots within those lines are the symbols.
This is a Print out of the Rot Cipher Wheel. Cut out the 2 circles leaving the inner circle NOT HOLLOW. Then you stick a tack or a paper clip through the middle of the inner wheel. Then you can spin it around to do your cipher.
The Rout Cipher is your message in a patter kind of like a word search. You make an arrow in the direction of the first two or three letters and then leave it to the other person to do the rest. To make is easier you can make an arrow all the way through.
The Tap Code was used by Vietnam prisoners to communicate, usually by tapping on metal bars or walls. It is a combination of Morse Code and the Grid Code replacing K with a C or X. the dots (.) tell you what numbers to go to from top to side, and the dash's (/) tell you when to separate a word.
2. Write it like this (my code word will be "code") i m t r y i n g t o e x p l a i n h o w t o d o t h i s it doesn't matter if the code word cant fit evenly c o d e c o d e c o d e c o d e c o d e c o d e c o d e
3. Look at the grid and follow the row i and the column c to the intersection like in battle ship. the letter they intersect on is k. that is how you encode it. To decode it take the code letter in this case c and go until you find k. Then go up all the way so you will find i.
Before we get ahead of ourselves, we should first examine the difference between Codes and Ciphers! A CODE is a system where every word or phrase in your message is replaced by another word, phrase, or series of symbols. A CIPHER is a system where every letter of your message is replaced by another letter or symbol.
Here is an example of a code. Let's say you and your friends have a code word for the lunch room and that word is "Purple" and the code for playground is "1775." The words or numbers don't matter as long as you and your friends know the meanings!
Long before there was language as we know it, prehistoric people communicated with images. Sometimes one symbol translated into an entire sentence! So using codes, symbols etc to communicate a meaning spans the length of history.
Cyphers come in many forms like substitution ciphers, keyboard cipers, pigpen cipher, rosicrucian cipher, substitution cipher, date shift ciper, greek square ciper, rail fence ciper, okay we think you get the drift! While there are far to many to dive into, we encourage you to research these and have fun making different codes and ciphers for your friends and family to solve!
Because each pair of grids is identical in shape and form, one of each pair is distinguished by the placement of dots within each cell of that grid. This results in four differing grids with one letter in each individual cell: one tic-tac-toe grid with dots, one without, one diagonal grid with dots, and another without. Because the grids represent pigpens or tic-tac-toe grids, the cipher is more commonly and creatively referred to as the pigpen cipher, or the tic-tac-toe cipher (Butler & Keeney, 2001).
The simplicity of the pigpen cipher allows for several important strengths. Firstly, and perhaps most importantly, the cipher is considerably easy to learn. Minimal math is involved, little time is consumed, and the symbols are only as complicated as you make them out to be.
Secondly, the pigpen cipher is relatively easy to memorize. Because the code can be committed to memory, a tangible and potentially intercepted key need not exist. This is the problem with many ciphers throughout history, for their keys would be intercepted, thus making that current key useless in practice (Kahn, 1996). The cipher is also very versatile. Because the construction, order of letters and orders of the grids and cells is entirely up to the cryptographer, many variations of the cipher exist.
c01484d022