famous ciphers. Cryptography: Spy Games

The need for encryption of correspondence arose in the ancient world, and simple substitution ciphers appeared. Encrypted messages determined the fate of many battles and influenced the course of history. Over time, people invented more and more advanced encryption methods.

Code and cipher are, by the way, different concepts. The first means replacing each word in the message with a code word. The second is to encrypt each symbol of information using a specific algorithm.

After the coding of information was taken up by mathematics and the theory of cryptography was developed, scientists discovered many useful properties of this applied science. For example, decoding algorithms have helped unravel dead languages ​​such as ancient Egyptian or Latin.

Steganography

Steganography is older than coding and encryption. This art has been around for a very long time. It literally means "hidden writing" or "cipher writing". Although steganography does not quite meet the definitions of a code or cipher, it is intended to hide information from prying eyes.

Steganography is the simplest cipher. Swallowed notes covered in wax are typical examples, or a message on a shaved head that hides under grown hair. The clearest example of steganography is the method described in many English (and not only) detective books, when messages are transmitted through a newspaper, where letters are inconspicuously marked.

The main disadvantage of steganography is that an attentive stranger can notice it. Therefore, in order to prevent the secret message from being easily read, encryption and coding methods are used in conjunction with steganography.

ROT1 and Caesar cipher

The name of this cipher is ROTate 1 letter forward, and it is known to many schoolchildren. It is a simple substitution cipher. Its essence lies in the fact that each letter is encrypted by shifting alphabetically by 1 letter forward. A -\u003e B, B -\u003e C, ..., Z -\u003e A. For example, we encrypt the phrase "our Nastya cries loudly" and we get "general Obtua dspnlp rmbsheu".

The ROT1 cipher can be generalized to an arbitrary number of offsets, then it is called ROTN, where N is the number by which the letter encryption should be offset. In this form, the cipher has been known since ancient times and is called the "Caesar cipher".

The Caesar cipher is very simple and fast, but it is a simple single permutation cipher and therefore easy to break. Having a similar disadvantage, it is suitable only for children's pranks.

Transposition or permutation ciphers

These types of simple permutation ciphers are more serious and were actively used not so long ago. During the American Civil War and World War I, it was used to send messages. His algorithm consists in rearranging the letters in places - write the message in reverse order or rearrange the letters in pairs. For example, let's encrypt the phrase "Morse code is also a cipher" -> "akubza ezrom - ezhot rfish".

With a good algorithm that determined arbitrary permutations for each character or group of them, the cipher became resistant to simple breaking. But! Only in due time. Since the cipher is easily broken by simple brute force or dictionary matching, today any smartphone can handle its decryption. Therefore, with the advent of computers, this cipher also passed into the category of children's.

Morse code

The alphabet is a means of information exchange and its main task is to make messages simpler and more understandable for transmission. Although this is contrary to what encryption is intended for. Nevertheless, it works like the simplest ciphers. In the Morse system, each letter, number, and punctuation mark has its own code, made up of a group of dashes and dots. When transmitting a message using the telegraph, dashes and dots mean long and short signals.

The telegraph and the alphabet was the one who first patented "his" invention in 1840, although similar devices were invented in Russia and England before him. But who cares now ... The telegraph and Morse code had a very big influence to the world, allowing almost instantaneous transmission of messages over continental distances.

Monoalphabetic substitution

The ROTN and Morse code described above are examples of monoalphabetic replacement fonts. The prefix "mono" means that during encryption, each letter of the original message is replaced by another letter or code from a single encryption alphabet.

Simple substitution ciphers are not difficult to decipher, and this is their main drawback. They are guessed by simple enumeration or For example, it is known that the most used letters of the Russian language are “o”, “a”, “i”. Thus, it can be assumed that in the ciphertext the letters that occur most often mean either "o", or "a", or "and". Based on such considerations, the message can be decrypted even without a computer enumeration.

It is known that Mary I, Queen of Scots from 1561 to 1567, used a very complex monoalphabetic substitution cipher with several combinations. Yet her enemies were able to decipher the messages, and the information was enough to sentence the queen to death.

Gronsfeld cipher, or polyalphabetic substitution

Simple ciphers are declared useless by cryptography. Therefore, many of them have been improved. The Gronsfeld cipher is a modification of the Caesar cipher. This method is much more resistant to hacking and lies in the fact that each character of the encoded information is encrypted using one of the different alphabets, which are repeated cyclically. We can say that this is a multidimensional application of the simplest substitution cipher. In fact, the Gronsfeld cipher is very similar to the Vigenère cipher discussed below.

ADFGX encryption algorithm

This is the most famous World War I cipher used by the Germans. The cipher got its name because it led all ciphers to the alternation of these letters. The choice of the letters themselves was determined by their convenience when transmitted over telegraph lines. Each letter in the cipher is represented by two. Let's look at a more interesting version of the ADFGX square that includes numbers and is called ADFGVX.

A D F G V X
A J Q A 5 H D
D 2 E R V 9 Z
F 8 Y I N K V
G U P B F 6 O
V 4 G X S 3 T
X W L Q 7 C 0

The ADFGX squaring algorithm is as follows:

  1. We take random n letters to designate columns and rows.
  2. We build an N x N matrix.
  3. We enter into the matrix the alphabet, numbers, signs, randomly scattered over the cells.

Let's make a similar square for the Russian language. For example, let's create a square ABCD:

BUT B AT G D
BUT HER H b/b BUT I/Y
B H V/F G/K W D
AT W/W B L X I
G R M O YU P
D F T C S At

This matrix looks strange, because a row of cells contains two letters. This is acceptable, the meaning of the message is not lost. It can be easily restored. Let's encrypt the phrase "Compact cipher" using this table:

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Phrase To O M P BUT To T H S Y W And F R
Cipher bv guards gb where ag bv db ab dg hell wa hell bb ha

Thus, the final encrypted message looks like this: “bvgvgbgdagbvdbabdgvdvaadbbga”. Of course, the Germans carried out a similar line through several more ciphers. And as a result, an encrypted message that was very resistant to hacking was obtained.

Vigenère cipher

This cipher is an order of magnitude more resistant to cracking than monoalphabetic ones, although it is a simple text replacement cipher. However, due to the robust algorithm, it was long considered impossible to hack. The first mention of it dates back to the 16th century. Vigenère (a French diplomat) is erroneously credited as its inventor. To better understand what in question, consider the Vigenère table (Vigenère square, tabula recta) for the Russian language.

Let's proceed to encrypt the phrase "Kasperovich laughs." But for encryption to succeed, you need a keyword - let it be "password". Now let's start encryption. To do this, we write the key so many times that the number of letters from it corresponds to the number of letters in the encrypted phrase, by repeating the key or cutting:

Now, as in the coordinate plane, we are looking for a cell that is the intersection of pairs of letters, and we get: K + P \u003d b, A + A \u003d B, C + P \u003d C, etc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Cipher: Kommersant B AT YU With H YU G SCH F E Y X F G BUT L

We get that "Kasperovich laughs" = "bvusnyugshzh eihzhgal".

Hacking is so hard because frequency analysis needs to know the length of the keyword to work. So the hack is to throw the length of the keyword at random and try to crack the secret message.

It should also be mentioned that in addition to a completely random key, a completely different Vigenère table can be used. In this case, the Vigenère square consists of a line-by-line written Russian alphabet with a shift of one. Which refers us to the ROT1 cipher. And just like in the Caesar cipher, the offset can be anything. Moreover, the order of the letters does not have to be alphabetical. In this case, the table itself can be the key, without knowing which it will be impossible to read the message, even knowing the key.

Codes

Real codes consist of matches for each word of a separate code. To work with them, so-called code books are needed. In fact, this is the same dictionary, only containing translations of words into codes. A typical and simplified example of codes is the ASCII table - an international cipher of simple characters.

The main advantage of codes is that they are very difficult to decipher. Frequency analysis almost does not work when they are hacked. The weakness of the codes is, in fact, the books themselves. First, their preparation is a complex and expensive process. Secondly, for enemies they turn into a desired object and the interception of even a part of the book forces you to change all the codes completely.

In the 20th century, many states used codes to transfer secret data, changing the code book after a certain period. And they actively hunted for the books of neighbors and opponents.

"Enigma"

Everyone knows that the Enigma was the main cipher machine of the Nazis during World War II. Enigma's structure includes a combination of electrical and mechanical circuits. How the cipher will turn out depends on the initial configuration of Enigma. At the same time, Enigma automatically changes its configuration during operation, encrypting one message in several ways throughout its entire length.

In contrast to the simplest ciphers, Enigma gave trillions of possible combinations, which made breaking the encrypted information almost impossible. In turn, the Nazis had a certain combination prepared for each day, which they used on a particular day to transmit messages. So even if the Enigma fell into the hands of the enemy, it did nothing to decipher the messages without entering the right configuration every day.

They actively tried to crack the Enigma during the entire military campaign of Hitler. In England, in 1936, one of the first computing devices (Turing machine) was built for this, which became the prototype of computers in the future. His task was to simulate the operation of several dozen Enigmas simultaneously and run intercepted Nazi messages through them. But even Turing's machine was only occasionally able to crack the message.

Public key encryption

The most popular of the encryption algorithms, which is used everywhere in technology and computer systems. Its essence lies, as a rule, in the presence of two keys, one of which is transmitted publicly, and the second is secret (private). The public key is used to encrypt the message, and the private key is used to decrypt it.

The public key is most often a very large number, which has only two divisors, not counting the unit and the number itself. Together, these two divisors form a secret key.

Let's consider a simple example. Let the public key be 905. Its divisors are the numbers 1, 5, 181 and 905. Then the secret key will be, for example, the number 5*181. Are you saying too easy? What if the public number is a number with 60 digits? It is mathematically difficult to calculate the divisors of a large number.

As a more realistic example, imagine you are withdrawing money from an ATM. When reading the card, personal data is encrypted with a certain public key, and on the bank's side, the information is decrypted with a secret key. And this public key can be changed for each operation. And there are no ways to quickly find key divisors when it is intercepted.

Font Persistence

The cryptographic strength of an encryption algorithm is the ability to resist hacking. This parameter is the most important for any encryption. Obviously, the simple substitution cipher, which can be decrypted by any electronic device, is one of the most unstable.

To date, there are no uniform standards by which it would be possible to assess the strength of the cipher. This is a laborious and long process. However, there are a number of commissions that have produced standards in this area. For example, the minimum requirements for the Advanced Encryption Standard or AES encryption algorithm, developed by NIST USA.

For reference: the Vernam cipher is recognized as the most resistant cipher to breaking. At the same time, its advantage is that, according to its algorithm, it is the simplest cipher.

From the very time that mankind has grown to written speech, codes and ciphers have been used to protect messages. The Greeks and Egyptians used ciphers to protect personal correspondence. In fact, it is from this glorious tradition that the modern tradition of breaking codes and ciphers grows. Cryptanalysis studies codes and methods for breaking them, and this activity in modern realities can bring a lot of benefits. If you want to learn this, then you can start by studying the most common ciphers and everything connected with them. In general, read this article!

Steps

Decryption of substitution ciphers

    Start by looking for words with one letter. Most ciphers based on relatively simple substitutions are easiest to break with simple brute force substitution. Yes, you will have to tinker, but it will only get more difficult.

    • Words from one letter in Russian are pronouns and prepositions (I, v, u, o, a). To find them, you will have to carefully study the text. Guess, check, fix or try new options - there is no other way to solve the cipher.
    • You must learn to read the cipher. Breaking it is not so important. Learn to snatch the patterns and rules that underlie the cipher, and then breaking it will not be fundamentally difficult for you.
  1. Look for the most commonly used symbols and letters. For example, in English these are “e”, “t” and “a”. When working with a cipher, use your knowledge of the language and sentence structure, on the basis of which you make hypotheses and assumptions. Yes, you will rarely be 100% sure, but solving ciphers is a game where you are required to make guesses and correct your own mistakes!

    • Look for double characters and short words first of all, try to start decoding with them. It's easier, after all, to work with two letters than with 7-10.
  2. Pay attention to apostrophes and symbols around. If there are apostrophes in the text, then you are in luck! So, in case in English, the use of an apostrophe means that characters such as s, t, d, m, ll, or re are encrypted after. Accordingly, if there are two identical characters after the apostrophe, then this is probably L!

    Try to determine what type of cipher you have. If, while solving a cipher, at a certain moment you understand which of the above types it belongs to, then you have practically solved it. Of course, this will not happen so often, but the more ciphers you solve, the easier it will be for you later.

    • Digital substitution and key ciphers are the most common these days. When working on a cipher, the first thing to check is if it is of this type.

    Recognition of common ciphers

    1. substitution ciphers. Strictly speaking, substitution ciphers encode a message by replacing one letter with another, according to a predetermined algorithm. The algorithm is the key to unraveling the cipher, if you unravel it, then decoding the message will not be a problem.

      • Even if the code contains numbers, Cyrillic or Latin, hieroglyphs or unusual characters - as long as the same types of characters are used, then you are probably working with a substitution cipher. Accordingly, you need to study the alphabet used and derive substitution rules from it.
    2. Square cipher. The simplest encryption used by the ancient Greeks, based on the use of a table of numbers, each of which corresponds to a letter and from which words are subsequently composed. It's really simple code, sort of the basics. If you need to solve a cipher in the form of a long string of numbers, it is likely that square cipher methods will come in handy.

      Caesar's cipher. Caesar not only knew how to do three things at the same time, he also understood encryption. Caesar created a good, simple, understandable and, at the same time, resistant to cracking cipher, which was named after him. The Caesar Cipher is the first step towards learning complex codes and ciphers. The essence of the Caesar cipher is that all the characters of the alphabet are shifted in one direction by a certain number of characters. For example, shifting 3 characters to the left will change A to D, B to E, and so on.

      Watch out for keyboard templates. Based on the traditional QWERTY keyboard layout, various ciphers are currently being created that work on the principle of displacement and substitution. The letters are shifted left, right, up and down by a certain number of characters, which allows you to create a cipher. In the case of such ciphers, you need to know in which direction the characters were shifted.

      • So, changing the columns one position up, "wikihow" becomes "28i8y92".
      • polyalphabetic ciphers. Simple substitution ciphers rely on the cipher to create a sort of alphabet for encryption. But already in the Middle Ages it became too unreliable, too easy to crack. Then cryptography took a step forward and became more complicated, starting to use characters from several alphabets for encryption at once. Needless to say, the reliability of encryption immediately increased.

    What does it mean to be a codebreaker

      Be patient. Breaking the cipher is patience, patience and more patience. Well, perseverance, of course. It is slow, painstaking work, with a lot of frustration due to frequent mistakes and the need to constantly select symbols, words, methods, etc. A good decryptor simply has to be patient.

Falcon Travis

TRANSLATION FROM ENGLISH LAKHMAKOV V.L.

CODES AND CIPHERS

super spy

Secrets of codes and ciphers

Foreword

During World War II Falcon Travis served in the military intelligence whose task was to intercept, decode and decrypt different kind messages, determining the locations of those who sent and received such messages.
The reader is given a unique opportunity to enjoy compiling and exchanging messages with friends that no one will understand except you and your friends.
You can learn from this book all about polyalphabetic ciphers, code grids, symbols, acrostics, invisible ink and special code words "Owl" and "Hawk" ("Owl" and "Hawk")
The book gives in an entertaining way moments of organizing games and competitions using codes and ciphers, as well as special chapters that tell in a fun way how to become a codebreaker. In short, here you will learn what will help you become a super spy!
The characters and situations described in this book are only the product of the author's imagination and have nothing to do with any real person or event.
Any coincidence is the fruit of pure chance.

Translation from English
V.L. Lakhmakova

Copyright © V.L. Lakhmakov, 2013

Chapters: Pages:

Preface 1
1. About codes and ciphers 2 - 4
2. Moving ciphers 5 - 13
3 Big move 14 - 23
4. Simple substitution ciphers 23 - 34
5. Large substitution ciphers 34 - 40
6. Ciphers - characters 40 - 44
7. Hidden codes and ciphers 45 - 51
8. Attempts to break the code 51 - 55
9. Codes in games and competitions 55 - 61
10. invisible ink 62 - 69

Chapter 1
About codes and ciphers

On a cold January morning in 1975, headlines announced the death of the secret code. “Writing kills code!” one newspaper loudly declared. The story under this heading spoke of a radio and television interview with a certain person who was very informed at that time in these matters. During the interview, a long letter was read, which had previously been radioed in secret cipher to an agent in London. "A free gift to the cryptographer's listening world!" the article shouted, implying that the radio interceptors were able to intercept the message thus sent to London by radio and it was later voiced in full decrypted form during the interview. Apparently, however, in itself this message-letter was not of particular interest for its content to the interceptor decryptors, but they learned enough from it about the secret cipher with which the contents of the letter were hidden, so that using this cipher a second time would be extremely not safe. From all that was said, it followed that the letter actually "killed" the secret code. This morning's newspaper news in January highlighted the serious problem of codes and ciphers. The so-called "invisible ink" also has its own problem, if only because of the long association with spies of all stripes. And therefore they have a kind of rather serious approach and attitude towards themselves. However, the codes, ciphers and invisible ink described in our book below are not given in such a serious association, but in a lighter one - just for fun. Codes and ciphers (it must be borne in mind that a cipher is very different from a code) vary greatly in their types and degrees of secrecy, in order to be suitable for various uses - exchanging secret messages with friends, searching for and hiding treasures, in preserving one's own of one's own secrets, and in many other cases, especially in the widespread outdoor games called "wide games" by scouts, in which invisible writing can be used to heighten the sense of pleasure, excitement and mystery. Some of the codes and ciphers that we are talking about here will not be a discovery for those who already know about the science of cryptography, but some may be first encountered in this book. Here we can include invisible ink, and in particular on a non-chemical basis. Some of the ciphers (of which there are about fifty types and at least half of their variations) are so simple that they are hardly a secret at all, but they can also be very puzzling, adding an element of rally to short-term games or gaming activities, or sometimes and similar long-term activities. Invisible ink, in particular of a non-chemical kind and also developed by non-chemical methods, can serve the same purpose of entertainment. On the other hand, there are also ciphers that are so secure in their cryptography that even an experienced decipherer will need quite long time for its opening (hacking), without an encryption key.
For the purpose of explaining in detail some of the terms used in cryptography, let's follow the procedure leading up to the emergence of a letter/message like that outlined in that January note.
At first the message had to be written in common language (called "plain language" or "pure"); it is then handed over to a cryptographer who must change the "plain language" of the letter into an encrypted one, called "encryption" or "encryption" if any code is used. is a cipher alphabet, i.e. a method of manual or machine encryption of ordinary language letters. The result of encryption or encoding is called a cryptogram. After that, the radio operator radioed it in Morse code to the destination, where his cryptographer, using an identical key, decrypted, or (in the case of encoding) decoded the message into an understandable "plain language".
The word "code" is usually used to mean both a code and a cipher, but in cryptography there is a difference between the two, and a very significant one.
The cipher is based on the alphabet of the ordinary language, just like the Morse code. A message communicated in Morse code (which is not really a secret cipher) must be spelled out. The same goes for the secret cipher.
The code is more like a phrase book, where sentences, phrases, individual words, and numbers are represented by groups of letters of the same length, usually no more than 3, 4, or 5 letters per group. For example, "AMZ" can stand instead of "YES", and "QTR" instead of "10000", and "GYX" instead of "We don't have enough fuel." A code is much harder to break than a cipher because, unlike a cipher, it is not based on the alphabet of a language you know, and is much faster to operate. However, the main advantage of a cipher is that any form of expression can be encrypted. While in the code, composed words, numbers and vocabulary groups (groups of words) can be encoded, although most codes do include individual alphabets. Codes are usually compiled for the convenience of their use by any user. For example, a Navy (Navy) code would consist primarily of nautical terms and phrases, while a code used in commercial activities would primarily consist of so-called "business phrases". Commercial codes are used less to keep secrets than to save money, because. telegraph companies receive the words, but a code group consisting of a number of words often carries only one word load.
In everyday life, two main classes of ciphers are used: substitution ciphers and transposition ciphers.
In the first case, an ordinary letter is replaced by various letters or a letter, or numbers or symbols.
In the second case, the ordinary letters remain ordinary, but they are mixed in a taxonomy that obscures their original meaning.
In some mixed systems, it is necessary to add letters that do not carry a semantic load in this particular case, to complicate the completion of the message. Such letters are called "zeros" by professionals. A message closed in cipher is not interrupted by punctuation marks. Any punctuation, especially question mark, helps someone else's decryptor to easily crack your cipher. In cryptography, there are no authorities responsible for standardizing the terms used, which explains why there are so many different terms here that denote the same objects or concepts. There are also ciphers under several various titles, while there are others that do not have them at all. In this book, all the ciphers we encounter, both unnamed and named, once had their own names, sometimes even for the sake of simple reference to them.
Other terms will be explained as they appear, and some of the explanations given earlier will be repeated by us in order to develop your skill in using them.

Chapter 2
Moving ciphers

This type of cipher, and any other cipher that quite easily makes messages secret by systematically shifting or otherwise "placing in disorder (mixing) genuine letters" instead of changing them into symbols, numbers or other letters, is called a transpositional cipher. Some of them are so simple that they are hardly a secret at all, while others keep their secret even from fairly experienced decoders for months. There are also a number of transpositional ciphers - abbreviated as "transpos". If necessary, the message can be accompanied by a predetermined code word or letter (called an “indicator”) to tell your correspondent what cipher this particular message is closed with. Of course, you can agree on the exchange of messages without "indicators", just for the sake of pleasure, unravel the encryption yourself.
If, in case of use very simple ciphers in this first group, the message doesn't look secure enough, you'll probably find that a different cipher makes that particular message more secure.
When we start translating any message into "transpo", the first thing to do is write out the usual message in blocks capital letters. This will greatly facilitate the encryption process and help you keep a copy of what you actually encrypted.
Consider several ciphers of the above category:

Random Partitioning Cipher
The letters of the message remain in their original order, but are rearranged in such a way as to mask the words. Can you decipher the message below? It is the same as the message used for most of the following ciphers:
W EN OWME E TINO URS HED

CODE OF PERMUTATION OF WORDS. CIPHER "r e v"
The words of the epistle remain in their original order, but each is spelled in reverse order:
EW WON TEEM NI RUO DEHS

COMPLETE PERMUTATION CIPHER. CODE "r e v"
The whole message is written by the permutation method, word by word:
DEHS RUO NI TEEM WON EW
Random permutation code.
Like the full permutation cipher, the message is written using the full permutation method, but instead of distributing the words in the usual, normal way, you change this order in a way that will mislead anyone to whom the message is not intended to be misleading. Such a cipher is really a RANDOM PERMUTATION CIPHRE, but it is more secure:
DEHS RUO NITE EMWO NEW

CODE OF PERMUTABLE GROUPS. CIPHER "r e v"
In such ciphers, the entire message is written by the method of permutation, from the last letter to the first, then divided into groups of the same number of letters: 3,4 or 5.
In ciphers as simple as this kind, there is usually a choice of letter grouping, as one way of grouping the letters of a message can often provide a greater degree of secrecy than another.
(1.) TRIPLE TRANSFER CIPHER
First of all, write out your message and count the number of letters it contains. If this number is not divisible by 3, add "zeros" until you get such a number. These "zeroes" must be added to the end of the regular message, and then they will appear at the beginning of the encryption, where they will not interfere with your decryptor of this message. It is also necessary to provide for choosing "zeros" that cannot be perceived as part of the message. Then, write down the message using the permutation method, in 3 letter groups. Deciphering starts from the end, and is either read word by word and written down, or the whole message is written down at once, and only then is divided into words by the step-by-step recording method.
(2.) QUARTER TRANSFER CIPHER
The encryption and decryption procedures are the same as for (1), except that the number of letters in the message must be divisible by 4, with the addition of "zeros" if necessary. Then, the message is written in 4 letter groups.

(3.) FIVE TRANSFER CIPHER
The same as the above methods (1) and (2), but in this case the message is divided into 5 letter groups, with the addition, if necessary, of "zeros".
Here is the usual, simple message:
WE NOW MEET IN OUR SHED
Here is the process of encrypting it:
(1) Triple permutation cipher: DEH SRU ONI TEE MWO NEW
(6 groups)
(2) Quadruple permutation cipher: QJDE HSRU ONIT EEMW ONEW (5 groups)
(3) Five permutation cipher: YZDEH SRUON ITEEM WONEW (4 groups)

CODE OF THE UPCOMING "ZERO"
Divide your simple message into 3 letter groups. If there are not enough letters in the last group, add "zeros". Please note that such meaningless letters of the cipher would not be mistakenly perceived by the addressee as part of your message. Then add any letter of the alphabet to the beginning of each 3-letter group:
OWEN BOWM FEET LINO FURS AHED
Your decoder will simply cross out the first letter in each group and read the message. The step-by-step division of words greatly facilitates reading.
CODE OF THE SUBSEQUENT "ZERO"
The method is the same as in the Cipher of the upcoming "zero", except that a special letter is located at the end of each 3-letter group, but remember to first add "zeros" to the last group, if necessary, to get 3 letter group:
WENT OWME EETH INOS URST HEDZ
Decryption is done by crossing out the last letter in each group.
CODES "A - ZERO" and "ZERO - A"
(1) Code "A-Null": "null" is added after each letter of the message. Zeros can be any letter of the alphabet. In this cipher, the ciphered message is always twice the length of the original message, so it is more suitable for short messages.
To decrypt, you just need to cross out all the "zeros", and you will receive the message intended for you. You need to start by crossing out every second letter of the message, and then every alternating letter at the end.
(2) Null-A cipher: This cipher is used in the same way as A-Null, but in this case the "nulls" are placed before the letters of the message instead of after them.
Here is an example of a simple message: WE ARE GOING TODAY
(1) Code "A-Null": WREN AGREES GOOGISNOGY TROMDRAVYS
(2) Null-A code: AWLE FAIRIE OGNORILNIG STROPDRAKY

CODE OF ADDITIONS TO THE VOYAL. CODE "VOWEL-PLUS"
After each vowel and letter Y, add any letter except a vowel or Y. To decipher, cross out the letter following each vowel and Y, the message will be read as expected. Simple message:
I AM NOT GOING TO CAMP SO YOU MAY HAVE MY SLEEPING BAG The same message in this cipher:
IS ARM NOWT GOGIGNG TOP CASMP SON YKOLUM MAPYK HALVED MYG SLBEMPIRNGBANG

CODE "SANDWICH"
Write a simple message - a message. Count the number of letters and split the message in half using step-by-step writing. If the message has an odd number of letters, then let the first half contain an additional letter. Then, write out the first half of the message with enough space between the letters to add another letter. Now, in the first gap, enter the first letter of the second half, then in the second gap - the second letter from there and so on until the entire second half fills the “sandwich” of the first half. Encryption can be composed in one long string of letters, or divided into groups of the same or random length. Here is the encryption, where the first letter of the second part is added:
WE NOW MEET \ IN OUR SHED
WIEN O W ME E T

To decipher, read the first and each subsequent letter to the end of the line, then the second and each subsequent letter to the end of the line; or write the letters in the order given, and separate the words with a "step-by-step" bar.

JUMBLING CYFER
This cipher assumes the presence of an odd number of letters. First, write down your message, count the number of letters, and add "zero" if necessary. Start by writing the first letter in the middle of the line, the next letter to the left of the first, the next to the right of the first, and so on, substituting the letters alternately on the right and left, until your message is complete. Let's give an example with the first 9 letters of the alphabet: H,F,D,B,A,C,E,G,I and a sample message encrypted in this way: DHROIEMOEWNWETNUSEQ
Such an encryption may be sent as a whole, or in groups of letters, so far as such an order allows the preservation of the same letters. To decipher, find the middle letter and read the message, one letter at a time, alternating the order: left - right, left - right to the end.

CIPHER "ZIGZAG"
This cipher is also known as "Palisade" and is said to have been used during civil war in America.
Write a message, then count the number of letters it contains. If this number is not divisible by 4, add "zeros" as indicated in (A) (see page 10). Then write the message without spaces between the words and with each alternating letter below the line, as in (B). Now you are ready to write a message for its subsequent forwarding. On the sheet of paper chosen for the message, start writing the top line of 4 letter groups, and continue writing, combining lines, as in (B). Deciphering such a message is simple. First of all, count the number of letters in the received message, and mark half with a thick dot or a slash. Then write in one line all the letters of the first half of the message, leaving enough space between the letters to allow another letter to be inserted. In these spaces, write the letters of the second half of the message, inserting the first letter in the next gap, etc. to the end, as indicated in (D) , showing half done decryption:
(A) WE NOW MEET IN OUR SHED QZ

(B) W N W E T N U S E Q
E O M E I O R H D Z

(B) WNWE TNUS EQ.EO MEIO RHDZ

(D) WE / NOW / MEET / IN U S E Q
E O M E I O R H D Z

CODE "SOVA" ("OWL")

Write your message without leaving spaces between words, but on top, above it, repeat the word "OWL" for the entire length of the line, and only once write vertically from top to bottom on one side, as shown. The last word on the top line "OWL" must be complete and have the letters of the message underneath. This means that the message must be divisible by 3, even with "zeros" if necessary. Then each letter of the message is thrown into a row having the same letter that stands above it. This divides the message into three rows, which are then written out one after the other, forming a ciphered message.
The grouping is different. There is an element of chance here. The decoder, knowing for sure that the cipher “OWL” is used in the message, first counts the number of letters in the message, delimits it into 3 equal parts, and gives each part one letter of the keyword. Then he writes out a series of "OWL" - words sufficient to cover the entire message (1), and then under the letters "O" he enters all the letters related to the letters of the "O" group.
(1) OWLOWLOWLOWLOWLOWL (2) O W O E I U H
WENOWMEET I NOUR SHED W E W E N R E . L N M T O S D

(3) WOEI UHE WENR EN MTOSD
After that, he sequentially enters two other groups (2) and the message becomes deciphered and suitable for reading. Here his work is almost complete:
1) OWLOWLOWLOWLOWLOWL 2) O W L

WE OW EE I N U R HE WOEI UH E WENR E N MTOSD

CODE "HAWK" ("HAWK") and "RAVEN" ("RAVEN")

These ciphers are similar to the OWL cipher, but the messages are grouped into 4 5 parts respectively. They work like this:
HAWKHAWKHAWKHAWKHAWK RAVE N RAVENRAVENRAVEN
WENOWMEET I NO U RS HED QZ WENOWME ET INOURSH EDQZ
H W W T U E R W M N H
A E M I R D A E E O E
W N E N S Q V N E U D
K O E O H Z E O T R Q
N W I S Z
WWTUE EMIRD NENSQ OEOHZ
WMNH EEQE NEUD OTRQ WISZ

Decryption is carried out in the same way as in the case of the SOVA cipher.

CODE "MARG"
These lightweight ciphers are more secure than any of the above. So, write your message in capital letters and leave room at the bottom for another row of capital letters. After that, using oblique lines, divide the message into groups, according to the cipher you use (3,4,5). If the last group does not have enough letters, add "zeros".
The following examples show how to encrypt:
(a) - shows the message written and separated by oblique lines
(b) - shows encrypted individual groups, permutation methods
(c) - shows how the encrypted message is written to be sent
(d) shows another way of writing the same message.
Random grouping always makes such a cipher look more secret. It may help the decoder that you leave space below the lines of your message.
CODE "BI-MARG"
The message is divided into two-letter groups:
(a) WE \ NO \ W M \ EE \ T I \ N O \ UR \ SH \ ED \
(b) EW \ ON \ M W\ EE \ I T \ O N \ RU \ HS \ DE \

encrypted message:
(c) EW ON MW EE IT ON RU HS DE
(d) EWON MWEE ITO NR UHSDE

CODE "TRI-MARG"
The message is divided into three-letter groups:
(a) WE N/ OW M / EET / IN O / UR S / HED
(b) NE W/ MWO / TEE / ON I / SR U / DEH

encrypted message:
(c) NEW MWO TEE ONI SRU DEH
(d) NE WMW OTE EONIS RUD EH

CODE "QUAD - MARG"
The message is divided into four-letter groups:
(a) WE NO / W MEE / T IN O / UR SH / EDQZ
(b) ON EW / E EMW / O NI T / HS RU / ZODE

encrypted message:
(c) ONEW EEMW ONIT HSRU ZQDE
(d) ONE WEEM WON ITHS RUZ QDE

CODE "QUIN-MARG"
The message is divided into five-letter groups:
(a) WE NOW / MEET I / N OUR S / HEDQZ
(b) WO NEW / ITEE M/ S RUO N/ ZQDEH

encrypted message:
(c) WONEW ITEEM SRUON ZQDEH
(d) WO NEWIT EEMS RUONZ QDEH

CODE "VARI-MARG"
The message is divided into random groups:
(a) WE NO / W ME / ET / IN OU / R SHED
(b) ON EW / E MW/ TE / UO IN / D EHSR
encrypted message:
(c) ONEW EMW TE UONI DEHSR

To decrypt, simply divide the message into groups according to which the encryption is going on, and below each group write the same letters using the permutation method. In this case, the message will open itself.
CIPHER "TWISTED COMMUNICATION"
Write down your message, then rewrite it in groups of 3, 4 or 5 letters. Add "zeros" if necessary to complete the last group. Below we give some examples:
(a) WEN OWM EET INO URS HED
(b) WENO WMEE TINO URSH EDQZ
(c) WENOW MEETI NOURS HEDQZ

Then place the two end letters between the groups, as shown in the following example, and write the result as a cipher message:
(a) WEO NWE MEI TNU ORH SED
(b) WENW OMET EINU ORSE HDQZ
(c) WENOM WEETN IOURH SEDQZ
Decryption is carried out by moving the final letters between groups. "Twisted connection" (c) - perhaps the most secret to keep your particular message from prying eyes.

big move
"SCYTALE"

Scytale - a cylindrical bar, is the earliest of the mechanical means of encryption described in history - the first encryption "machine". As a scytale, you can use a pencil, or similar, but thicker and longer, but not more than 20 cm in length, or just a tube of any length, but the same diameter agreed with your addressee. Then you will need a long strip of paper no more than 2 centimeters wide. Blank margins of a newspaper sheet, or a long strip from a double page of any magazine, may work. What is the process of working with scytale ?
Start by fixing the beginning of the paper tape on the beginning of the wand, using a button or rubber band. Now wind this tape in a spiral around the “rod” so that each next turn covers almost half the width of the previous turn and fix the end of the tape with a button, rubber band or similar. The easiest way to evenly wind the tape is to secure the beginning of the tape with one hand and rotate the “rod” clockwise while allowing the paper tape to slide freely through the fingers of the other hand.
To record your message, fix the wand in a horizontal position, with a fixed beginning of the tape from left to right, holding the wand from turning, and write from left to right in block letters, placing one letter on each successive turn. When you have finished the line, turn the wand back slightly and begin the next line of your message under the previous one, and so on until you have written your entire message. Remove the finished message from the wand and roll it into a roll or fold it into a square. The decryptor, which has a "wand" like yours, winds the received tape in the same way as the cryptographer, and only in this case will it find out the information.
CODE "GEO - TRANSPO"
Ciphers of this kind were widely used by the German Wehrmacht during the 2nd World War. The full name of the cipher sounds a little heavy:
"Geometric transposition or Geometric displacement". This cipher got its name due to the fact that in the first of two stages of encryption, the letters of the message are arranged in the form / in the form of a rectangle.
The rectangle, of course, includes the square. Another name given to such ciphers is: "Columnar transposition", from English word"column" (column, column), because in the second stage of encryption, columns or rows of letters of the rectangle are separated to form an encrypted message.
The example below will show how easy it is to operate with such a cipher. First, the message is entered and the number of letters is counted:

WE NOW MEET IN OUR SHED (18)

This means that the message can be placed either in two columns of 9 letters each, or in three columns of 6 letters each, but instead we add two "zeros" and place the message in four 5-letter columns. A rectangular sheet of paper makes this step much easier.

W E N O W
M E E T I
N O U R S
H E D Q Z

After that, the columns of letters are written out in order, from left to right, and your encryption is now read like this: WMNH EEOE NEUD OTRQ WISZ
To decipher, you just need to write these groups again in columns, from left to right, and read the message "snake", i.e. top to bottom left to right. This is the simplest form of such a cipher. So simple that no professional cryptographer uses it for their encryption.
But, at the same time, such a professional can easily turn the same cipher into a pretty tough nut to crack. This works for you too. There are two known ways to turn this cipher into a complex puzzle for someone else's decoder. You can use these methods either separately or together. The first method assumes the presence of a key-digit or a key-word. The order in which letter groups are allocated depends on this. By the way, the key word is more preferable than the key number, because it is easier to remember. The key number often indicates the numerical order, and the key word indicates the alphabetic order. For example, the alphabetical order of the letters of the Key Word "BLAZE" is A, B, E, L, Z (i.e. alphabetical order), and the numerical order of the numbers in Key Number 93418 is 1,3,4, 8.9 (i.e. in order of counting from 1 to 9). The example below clearly shows how these two keys change our message:

B L A Z E 9 3 4 1 8
W E N O W W E N O W
M E E T I M E E T I
N O U R S N O U R S
H E D Z Q H E D Z Q

(a) NEUD WMNH WISQ EEOE OTRZ
A B E L Z (alphabetical order)

(b) OTRZ EEOE NEUD WISQ WMNH
1 3 4 8 9 (numerical order)
The decoder to whom the message is intended knows the Word-Key or the Number-Key. Having received the message(s), he should write down each letter of the key word under each group, in alphabetical order, then write out the key word and insert each letter group under it. The following example shows an almost finished decryption:
(a) A B E L Z
NEUD WMNH WISQ EEOE OTRZ

B L A Z E
W E N W
M E E I
N O U S
H E D Q
The second way to give more secrecy to the message, with a cipher of this kind, is the special arrangement of letters when forming a rectangle in the first stage. This first stage is called inscribing (writing in), and the second stage is transcribing (writing out). The message is first inscribed, i.e. written in the form of a rectangle, and then transcribed, i.e. written out in letter groups. On page 16, we will look at our sample message written in two different ways and transcribed with the keywords TEXAS and LAZY.
In (c), the inscribing is done in horizontal alternating rows (much like in the previous example, which was written in horizontal rows), and the writing out is done in a column key word. In (d) the inscribing is carried out by moving the clock hand from the top right corner, and the writing out is carried out by an ordinary word - a key, i.e. the keyword is on the side and so indicates rows of letters instead of column-columns. The order in which the message fits is called the route - the options are vertical alternating route, counter-clockwise route, and so on.
Decryption is carried out in the same way as described earlier, but the decryptor must also know the route by which the message should be read, i.e. rows or columns opposite the key word.
(c) T EX AS L NOURW
WENOW A I ZQSE
I T EEM Z TDEHN
NO URS Y EEMWO
QZ DEH
(c) OERE ETOZ WMSH WINQ NEUD
(d) IZQSE NOURW EEMWO TDEHN

There are a fairly large number of different inscriptional routes. Below are some. The alphabet is applied so that you can easily follow the presented route. Users of such ciphers can indicate in pre-prepared code letters which route the message was inscribed with and which key word or key number was used.
Horizontal
Formal (straight) Alternating (snake)

ABCDE - ABCDE
FGHIK-KIHGF
LMNOP - LMNOP
QRSTU-UTSRQ
VWXYZ VWXYZ

Vertical
AFLQV AKLUV
BGMRW BIMTW
CHNSX CHNSX
DIOTY DGORY
EKPUZ EFPQZ

Internal spiral

ABCDE AQPON
QRSTE BRYXM
PYZUG CSZWL
OXWVH DTUVK
NMLKI EFGHI

External spiral
clockwise counterclockwise
ZKLMN NMLKZ
YIBCO OCBIY
XHADPPDAHX
WGFEQQEFGW
VUTSR RSTUV

These 8 routes can be increased several times with different starting points. For example, "horizontal", "vertical" and "inner spiral" can start from any of the 4 corners, while "outer spiral" can start anywhere, according to the shape of the rectangle.
Most easy way working with sufficiently long messages consists in writing it in four or five rows, read from left to right (this is the so-called direct horizontal inscription) and choosing a suitable keyword.
The key word may consist of more than one word. Below is a corresponding example of a long message.
MARYLOVESFUN
WENOWMEETI NO
URSH E DEVERYS
ATURDAYMORNI
NGTOPR ACTI S E
FORTHEMATCHX

ERTGO EVMCA IRRIC WEDPH WUANE OSIEX MDARE NSUTR
TEOTT NYNSH EEYAM OHROT
Such a message is decoded according to the BLAZE pattern (see pages 15-16).
You must have noticed by now that there are three ways that these geometric transposition ciphers allow any ordinary message to be secret:
1) the method of inscribing the message in the usual manner of writing it from left to right (formal horizontal, as in the message under the key word MARZLOVESFUN) and highlighting the columns in alphabetical order, according to the key word.
2) a method of incribing the message in an unusual manner (a route such as a spiral going from the center, for example), and highlighting the columns in the usual writing order from left to right, instead of randomly arranging them with a keyword.
3) by combining the other two, as in the case of a TEXAS message.
Since misunderstandings often arise when naming these three methods, we will agree to call them: 1) column 2) route 3) route and column.

CIPHER "GRILLE" (GRILLE)
Such ciphers were in use in Italy during the time of Henry V|||, and were quite widely used during World War I. The lattice is a part of the encryption apparatus by the type of transposition.
A lattice, also called a “mask” or “trellis,” is a piece of cardboard, or similar material, in which special squares are cut out, placed in different places on the cardboard. Such a cardboard is superimposed on a sheet of paper and the letters of the message fit through them. The most common types of such a cipher are "alternating (or "rotating") lattice", "reversible lattice" and "random lattice".
CODE "ROTATING GRID"
In this case, the card has squares arranged in such a way that different places on the paper are left uncovered each time the card is rotated 90°. After the letters are inscribed in the squares in each of the four positions, they form a square block of mixed letters. For example, the message: WE NOW MEET IN OUR SHED NOT THE HUT TELL TIM should be encrypted with a 6 x 6 "rotating lattice" card using the following method.
"GRILLE" is placed on a piece of paper and the slotted squares are filled in with the first nine letters of the message. Then "GRILLE" is rotated 90° clockwise and the next nine letters are written. After making two more turns, we enter the remaining letters of the message. Since the message has two letters less than the slotted squares (letters -34, and squares at full turn -36), two "ZEROs" are added: Q and Z, to complete the filling of the last turn of the "GRILLE". After filling in all the squares, we remove the GRILLE, and write the resulting message in groups in a row or columns, or for greater secrecy, by highlighting groups using the Key Word of the column.

1 2
W E I N
NO
a) O 4 b) U R
2 W 3 S
E E M H E
T D
3 4
And then we turn also:

3 4
N T
O T E L
c) T d) L
4 H E 2 1 T I
E M
U T Q Z
1 2

The decryptor, who must have exactly the same GRILLE and know how the record was encrypted, first of all folds the groups of letters back into a square shape, and then, applying his GRILLE, works in the same order as the cipher.
A wide variety of GRILLE sizes and encryption patterns are available. Below we give samples of GRILLE 4 x 4, 5 x 5, 6 x 6 and even 10 x 10. A 5 x 5 GRILLE always has a clean central area - a square after encryption and ZERO is needed here to fill it. Groups of over
6 letters can be divided in half, but they should be placed together in this case. The numbers on the side indicate the sequence of turning the map
4 x 4
1
X
2 4
X X
X
3

5 x 5
1
X
X
2 X 4
X X
X
3
1 6x6
X X
X
2 x x 4
X
X X
X
3

10x10
1
X X X
X X
X X
X X X
2 X X X
X X
X X
X X X
X X X
X X
3

CIPHER "REVERSIBLE LATTICE
In this case, GRILLE, unlike the Rotating Grid cipher, should not be square. Its four positions are as follows: A - side, TOP -1 (very top); turn the card over so that TOP -2 takes the very top. We turn the card over to the B - side, TOP - 1 again at the very top; and we finish by turning the card so that the very top takes the TOP - 2 B - sides. Encryption and decryption are exactly the same as in the case of the "Rotating Grid". Below are examples of the "Reversible Lattice" cipher.

A BE PX - 1 A BE PX - 1
x x
x V- x V-

x x hundred x x hundred

X x rona x x ro

X x on
x x
x x
x x
x x x x
BE RH - 2 BE RH - 2

CIPHER "RANDOM GRID"
This cipher is most suitable for very short messages and for passing through a Keyword or Password. The lattice can be in this case of any shape, and open squares can be anywhere, because the lattice in this cipher does not toss and turn. The message is entered into open squares, then GRILLE is removed, and Zero - letters are entered into empty spaces. The decoder imposes an identical GRILLE lattice on the leapfrog letters during decoding. Zero - the letters are closed and the message is easy to read.
MANUFACTURING "GRILLE"
To make GRILLE of any kind, line the card into the required number of squares and leave margins on four sides. Use the cross to mark the squares to be cut. Pierce the middle of the square, make cuts at its corners, bend the formed triangles and cut them off. Add to the GRILLE any additional detail you need.

SIMPLE SUBSTITUTION CIPHER

Mary, Queen of Scots, during her stay at Chartley Hall, one of several places in England where she was imprisoned after her escape from Scotland in 1568, was involved in a conspiracy to kill Queen Elizabeth, her cousin, and elevate herself to English throne. The main first difficulty of the planned undertaking was how to receive and transmit messages from Chartley Hall, surrounded by a moated feudal castle, under the vigilant guarding eye of the head jailer, Amyas Paulet. To overcome such an obstacle, it was decided to involve a local brewer in the conspiracy. The plan itself was this: When Queen Mary needed to send a secret message, she would dictate it to one of her two secretaries, who would then encrypt it. The ciphered message will then be folded and sealed, wrapped in a piece of leather, and handed to the brewer when the latter is called to deliver the beer and remove the empty kegs from the castle. The brewer, having received a message rolled up into a tube, had to attach it to a plug prepared in advance and push it through the hole of an empty keg. From the safety of the castle, the brewer was to obtain a secret package and hand it over to Queen Mary's trusted messenger, Gilbert Gifford, for delivery to London. The secret messages from the conspirators were then carried back by Gifford to the brewer who passed them on, for clandestine delivery, using a keg stopper, to Chartley Hall. But, unfortunately for Mary, Queen of Scots, her trusted messenger was one of Queen Elizabeth's spies, and the brewer and jailer worked closely with him. When Gifford was handed a message for Mary or for a group of conspirators who supported her, he had first of all to deliver it to the headquarters of the Secret Service of Queen Elizabeth, which was headed by Sir Francis Walsingham. At Headquarters, the seal was opened and a copy of the message was made, then the seal was expertly forged and sealed again, after which Gifford set off with the original message. Meanwhile, Walsingham's best decoder, Thomas Philippes, was deciphering the message very quickly. In conclusion, it must be said, all the conspirators were captured and hanged, and on February 8, 1587, in the Great Hall of Fotheringhay Castle, Mary Stuart, Queen of Scots was beheaded.
Julius Caesar communicated secretly with his generals by means of a cipher which bears his name ever since, although it was known long before its use by the great Caesar. The essence of the cipher was as follows: Each ordinal (ordinary) letter of the message was replaced by the letter that stood behind it in third place in the alphabet. Ordinary X,Y,Z replaced by A,B,C ; thus, for example, the word LAZY was replaced by ODCB. Julius Caesar's cipher alphabet was always three letters apart from the usual one, but since letters can stand up to any number of letters FOR or BEFORE the main one, such a cipher was called " SLIDING ALPHABET CIpher".

CAESAR CYFER
It's over short name to denote the Julius Caesar Cipher or the Sliding Alphabet Cipher. Its essence is as follows:
A simple alphabet is written, and the alphabet of the cipher is written below, written in the same order as the upper one, but starting with a letter separated from the first letter of the ordinary alphabet by one or more places forward or backward, with missing letters at the beginning of the bottom line. The example below begins with "K", and therefore such a cipher can be called the Caesar Cipher "K":
Simple: A,B,C.D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y, Z
Code: K,L,M,N,O,P,Q,R,S,T,UVW,X,Y,Z,A,B,C,D,E,F,G,H, I, J
To encrypt the message, find each required letter in the normal alphabet and write out the substitution, i.e. letter in the cipher, standing strictly under the letter of the ordinary alphabet. The message can be written in normal word groups, or in groups of 3, 4 or 5 letters if greater secrecy is required. To decipher, find each required letter in the cipher alphabet and write down the corresponding letter strictly on top.

KEYWORDS CIPHRES
A mixed cipher alphabet always gives a greater degree of secrecy than a sequential alphabet. One of the simplest and effective ways alphabet mixing method based usually on one word is the use of a keyword. The key can be any word, or a group of words of the same total length as the various letters in the string.
The longer the keyword, the more secure the cipher.
The advantage of an alphabet cipher mixed with a keyword is that users of such a cipher do not need to carry a copy of the alphabet with them (which is very dangerous for a scout or spy), they only need to remember the key word.
First, write the regular alphabet, then below it write the keyword and complete this line with part of the regular alphabet, not including the letters used in the keyword. If, as often happens, some of the letters of the cipher alphabet coincide with the letters of the regular alphabet written above, you should not be upset, but a well-chosen key word (for example, including letters from the end of the alphabet) reduces their frequency of repetition to a minimum. Below we give three examples of keyword alphabets and several sentences in the form of such keys. When you write a message in a keyword cipher, remember to include some additional means (ways to recognize which key you used, such as a coded letter, somewhere on the piece of paper).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
L A Z Y B ONE S C DF G H I J K M P Q R T U V W X
P L A Y WR I GH T S B C D E F J K MN O QU V X Z
T R E N DY MUS I C A L B OX F G H J K P Q V W Z

PATHFINDER BACKGROUND BUCKINGHAM WORKINGDAY
REPUBLICAN MISFORTUNE BANKRUPTCY PREVIOUSLY
PRESUMABLY DESTROYING SUNDAY MONDAY
TUESDAY THURSDAY FRIDA

CIFRES OF THE SAME GRADE (Corresponding ciphers)
This type of cipher is also known as the cipher-box or cipher-frame, because. in this case, the usual alphabet is written, usually in the form of a rectangle; as well as a cipher in the form of baygram, because in this case, each letter of the ordinary message is replaced by two letters or numbers, or both, one at a time. The position of each letter in the frame is located in the same way as the coordinate grid on the map correlates with the location of some position on the map - so much to the east, so much to the north, or with squares going diagonally or vertically. This kind of corresponding cipher is called a grid-card cipher, since that name best describes how this kind of cipher works.

CODE "CARD - SCHEME"
In total there are 6 variants of such a cipher. Each frame has an alphabet and numbers from 0 to 9. The letters (cipher /s/ has numbers) on the outside of the frame are called "recommendations". Those at the top (code /f" / has them at the bottom) refer to the letters and numbers in the columns below them, and those located on the side refer to the letters and numbers in the adjacent rows. The two letters on the outside, determining the position of the letter or number in the frame , become a cipher "stand" ("substitute") for this letter or number, and therefore are called "BIGREMM Cipher".
For example, in cipher (a), Cipher Baygram / BIGRAM / for the letter "K", are the letters GC - the letter "G" is the letter located strictly above the "K", and the letter "C" is the letter located on row lines where "K" is located. The completed message usually has its "bygrams" grouped word by word, but other groupings can be used. Random grouping, using some groups that have extra numbers or letters, makes the cipher more secret. Decryption is the reverse process of encryption. The letter encrypted with the "bigram" is located at the intersection of two imaginary lines passing through the column from above and along the line of the row on the side of the letters included in the "bigram".
cipher (a)
The letters at the top of the frame are the same. as located on the side, it is important for the decoder to easily find the bigram letters. For example, FD is an ordinary P if the letter F from the top edge of the frame is taken first, but U if the letter F from the side row is taken first. If you use the top location as a pointer, and always encrypt and decrypt in that order (FD = P), you will avoid many of the difficulties of working with this cipher.
B C D F G H B C D F G H
B A B C D E F B A B C D E F
C G H I J K L C G H I J K L
D M N O P Q R D M N O P Q R
F S T U V W X F S T U V W X
G Y Z 1 2 3 4 G Y Z 1 2 3 4
H 5 6 7 8 9 0 H 5 6 7 8 9 0
(a) (b)
cipher (b)
The letters located on the top and side of the frame are different, so they can be used in encryption in any order. Therefore, each letter has a set of two digrams. For example, the word NOON is encrypted as
C L L D D L L C
cipher (s)
The numbers here are used for encrypted bigrams, and the cipher is made more secure by using the keyword (SYLVIA) to mix up the alphabet in a box. The encryption process can be done in the same way as Cipher (b), except for X; Z; 5; 6 , which repeat the numbers 0 located inside the frame; 1, and therefore the upper letter must enter the digram first. In order to avoid confusion, the whole encryption process can be done in the same way as in the Cipher (a) - "topside" (on top of the frame).
cipher (d)
This type of cipher also has a mixed alphabet, and can be used as in the cipher with Cipher (b) - any letter located on the outside of the frame comes first. The consonants are on the top edge of the frame, and the vowels and Y are on the side; and then the encryption resembles some foreign language and may even be spoken aloud.
cipher (e)
Messages encrypted with such a cipher, which also has a mixed alphabet, look rather strange, because consist of only one vowels and Y. Encryption is carried out using the Cipher method (a) -i.e. "top side".
B D K N P Z A E I O U Y
A J U L I A N Y A G M G O U
E B C D E F G U B H 1 7 P V
I H K M O P Q O C I 2 8 Q W
O R S T V W X I D J 3 9 R X
U Y Z 1 2 3 4 E E R 4 0 S Y
Y 5 6 7 8 9 0 A F L S N T Z
(d) (e)

cipher (f)
This kind of cipher, having two groups of opposing letters on the outer border of the frame, can be used to encrypt starting with any letter that comes first, and each ordinary letter has a set of eight different cipher bigrams. For example, "F" could then be encrypted with DJ, DX, JD, JP, PJ, PX, XD, or XP. Take the message: WE MEET TODAY

CIPHERS (a - f):
(a) GFGB BDGBGBCF CFDDFBBBBG
(b) GMGJ LBJGGJCM MCDLFJJBBN
(c)* 5937 38377339 9358275661
(d) PONE KINEENOK KONIKEPABU
(e) YOAE IYAEAEUA UAUYAIAYYE
(f)* CTCX EWJQXCLF VNAVB***TE

MORSE CIPHER
Morse code letters are made up of dots or dashes, or a combination of both. In this cipher, the letters of the alphabet, with the exception of vowels, are replaced by dots and dashes. The consonants of the first half of the alphabet, from "B" to "M", are replaced by dots; consonants of the second half of the alphabet, from "N" to "Z", are replaced by a dash. The vowels serve as separators. One vowel marks the end of a letter; two vowels indicate the end of a word. Message: A RED CAT, which is encrypted in Morse code in this way:
.- .-. . -.. -.-. .- - , can be encrypted like this
way:
DTAIL PHOFI VKMOU QLNCO BSIRO or:
CROAK WHALE SHEE PLYMA DRIVE and many other ways. When it is necessary to use additional letters to break groups into equal numbers, vowels are added.
For decoding, indicate a dot or dash under each consonant.
After that, under the dots or dashes and write down the literal equivalent.

CODE "CHANGING NUMBERS"
Here the same work takes place as when working with letters, in addition,
that the numbers from 1 to 8 represent dots and dashes, and 9 and 0 serve as separators. 1,3,5 and 7 stand instead of dots; 2,4,6 and 8 - instead of a dash. nine
is used to separate letters, and 0 separates words. If additional numbers are required to break the message into equal groups, separators are added.
Message: A RED CAT, divided into groups of 4 digits, with
two "zeros" added, reads like this: 3407 6593 9651 0678 5932 9490
. - . - . . - . . - . - . . - -
The decoder writes a dot under each odd digit and a dash under
each even, then writes the corresponding letters.

DIGITAL CODES.

Nowadays, when an enemy spy is captured, he almost always has a very small book, no larger than a postage stamp. Each page of such a book is filled with columns of numbers. It may also have pages of different colors, or a separate book with pages of different colors can be found. Such books, called one-time pads, are called so because each page contains a different cipher, and after the message is encrypted with it, the page is subject to immediate destruction in a fire. Just a light touch of the flame is enough, as the page lights up and is destroyed in a split second. Not a single spy, wherever he is, has in his activity a cipher identical to that which his colleague would have. And no decryptor or even a computer can decipher the encryption without having the key to it. There is only one key for a particular encryption, and when a spy uses this single key (eg, a color page) to decrypt an encryption he has received, he must immediately destroy it. Below we will look at some of the less complex Digital Ciphers.

This is the simplest of the digital ciphers. Its essence is that the letters of the alphabet are numbered from 1 to 26, and in the direct order of encryption numbering: 1 = A. In the reverse order: 26 = A. Of course, there are other options that we will provide with our examples.
(a) Numbering begins with 11 (or 21,31,41,51,61 or 71) so that two digits refer to a letter, thus forming different, realistically possible groups of digits. The five options we give below, in which 11 = A, will show how the phrase "WE MEET" can be placed in such groups: (b) - in one group, (c) - in a group of three numbers, (d) - in a group of four numbers, (e) - in a group of five numbers, with "zero" digits added to complete the formation of the last group; (f) - in randomly composed groups. When "zero" digits are required, to complete / complete groups of 3, 4 or 5 digits, the first two (in case the number of required "zero" digits is two or more) must form a number that cannot in any way be included in the cipher, for example a number greater than 36 in the cipher example (a). And then this number will indicate the end of the message, and eliminate possible confusion with zero digits in the message.
(a) A 11 E 15 I 19 M 23 Q 27 U 31 Y 35
B 12 F 16 J 20 N 24 R 28 V 32 Z 36
C 13 G 17 K 21 O 25 S 29 W 33
D 14 H 18 L 22 P 26 T 30 X 34
W E M E E T ) 3315 (b) 331523151530 (c) 331 523 151 530
3315 23151530 2315 (d) 3315 2315 1530
1530 (e) 33152 31515 30392 (no key included)
3,2, 9, 39, 92, 392 is "digit zero)
(f) 3 31 52 31 51 530
For decryption, the numbers are written in pairs, and below each such pair its letter equivalent is written.

CIPHER "MARABU"
A mixed cipher alphabet is compiled using the key word, after which the letters are arranged in groups, and each group is assigned its own number. Each letter is assigned its own number in the group to which it belongs, and the two digits are combined and become encrypted letter numbers, so P=23 and N=34. The keyword in the example below is CUSTARDPIE , and the message is:
WE NOW MEET IN OUR SHED.
The number indicating the group number is at the beginning. You can, of course, use the usual alphabet:
5 2 6 3 4
СUSTA RDPIE BFGHJ KLMNO Z
1 2 34 5 1 2 345 123 4 5 1 2 3 4 5 1
W=73
7325 343573 33252554 2434 355221 53642522

CIPHER "DRABAL"
This cipher is similar to the Marabu Cipher, but the digits are arranged so that two digits related to a letter of the alphabet can be written as a fraction. The alphabet may be the most common, but the one used in the example below has been mixed with the keyword WAVYTRIPE . We also take our message:

WE NOW MEET IN OUR SHED
1 2 3 4 5 6 7
WAVYTRIP EBCD FGHJ KIM NOQS U XZ
2 3 45 6 789 3 57 9 4 57 8 5 7 9 6 7 8 9 7 8 9

1 2 5 5 1 4 2 2 1 1 5 5 6 1 5 3 2 2
2 3 6 7 2 9 3 3 6 8 6 7 7 7 9 7 3 9

The upper digit (numerator) of the fraction tells the decoder about the group of letters, and the lower digit (denominator) tells the place of the letter in this group.

CIPHER "REVERSED GEMINI"
Letters of the alphabet and numbers from 0 to 9 are represented by pairs of numbers,
which can be used upside down. Hence,
each letter has two cipher equivalents, which
increase the secrecy of the cipher. Below is the alphabet mixed with
keyword PLASTICBUN , and the message: MEET US SOON AT 23 .

P 12 21 D 25 52 O 37 73 1 56 65 8 78 87
L 13 31 E 26 62 Q 38 83 2 57 75 9 79 97
A 14 41 F 27 72 R 39 93 3 58 85 0 89 98
S 15 51 G 28 82 V 45 54 4 59 95
T 16 61 H 29 92 W 46 64 5 67 76
I 17 71 J 34 43 X 47 74 6 68 86
C 18 81 K 35 53 Y 48 84 7 69 96
B 19 91 M 36 63 Z 49 94
U 23 32 N 37 73
N 24 42

63622661 2315 51377342 4116 7558
When deciphering the letters, it is easy to find if you find the smaller of the two numbers.
For example: the reciprocal of 63 is 36, i.e. the letter "M".

CIPHER "VOCABULAR"

This type of cipher is based on the alphabetical arrangement of the pages of any
dictionary. In a simple pocket dictionary, for example, words beginning with the letter "A" sometimes occupy pages from 1 to 31, B - from 33 to 67, C - from 69 to 131, etc. Pages containing two letters of the alphabet are skipped. In order to encrypt a message, you need to replace each letter of this message with any number that determines the page on which this letter is located in the dictionary. But since some letters are located on three-digit pages, it is necessary to bring all other pages to a three-digit value. Instead of hundreds, in these cases. put 0 in numbers that are less than 100, at the same time, this figure. starting with 0 is replaced in place of hundreds by any digit., thus making up a page that is not available at all in this dictionary. For example, there are only 690 pages in the dictionary, 0 standing in place of hundreds in a two-digit number. can be replaced by 7, 8 or 9:
Example: 73 - 073 - 773 - (873, 973). The word "CAB" will be encrypted as 129723046, or in a thousand other ways. Where a letter of the alphabet, such as "X", for example, appears on a page together with another letter (and it is often the only one listed in dictionaries), users of the cipher agree that the page number is reserved specifically for the letter "X".

DICTIONARY CODE
Dictionary codes have been used almost immediately since the appearance of the first dictionaries, but their use is very limited. The message consists of groups of numbers. Each group is related to a word in the dictionary by specifying the page number where it is located and its position on that page. The dictionary thus becomes a book of codes and, as with any book of codes, the messages must be composed to suit it. For example, in most pocket dictionaries you will hardly be able to find any of the exact said words in the message: WE ARE TRAILING SPIES , and only a very small number of dictionaries can carry the last two words. The message: SEND A NEW SECRET CODE AND A FURTHER SUPPLY OF INVISIBLE INK can be composed of a dictionary of any size, regardless of its size. Therefore, we see that dictionary codes can only be used if a special dictionary with a high word frequency is available. A secret encrypted with a dictionary code can be more secret than one encrypted with any other code, and depends not on the method of coding, but on keeping secret which dictionary you use. Consider a method based on a widely used pocket dictionary, say 700 pages. Let the word SEND be on line 8, in 2 of the two dictionary columns on page 494. Then the entry will go in this order: three digits of the page number (494). one digit of the column (2), and the other two are the rows of the given word (08), i.e. each word can be made up of only six digits. Therefore, if we group all the numbers in the indicated order (page + column + row), then the encoded word SEND will be represented as 494208. The word "A" or "AN" in the second line of the first column of the first page, it would seem, should be encoded as 001102 . but from such a code, it is clear to anyone that this word is at the beginning of page 1, and in the wrong hands such a code can easily become the key to the entire codegram. Therefore, a digit indicating a page number less than 100 must be masked. In fact, this is achieved by replacing the first "0" with 7.8 or 9 (in our example it is: 701102), which will not confuse the recipient during decryption, because in the used dictionary no more than 700 pages.

To be continued...

The time has come when satellites are flying above us, capable of zooming in on the image so that we can accurately determine the size female breast girl lying on a nudist beach.

Having received such superpowers, we think that humanity knows absolutely everything. Even with all our high speeds, 3D technology, projectors and touch screens, there are still ciphers and codes that world-class cryptologists continue to puzzle over. Moreover, some ciphers existed in the 18th century. Even with the advent of advanced technology, these unsolved codes prove that the smartest thing in our society right now is smartphones.

10. Dorabella Cipher

It is said that its author had an exceptional mind. The ability to take a blank page and turn it into something intriguing is an art form that evokes incredible emotions... okay, maybe not so grandiloquently, but let's face it, it takes quite a lot of creativity to make something out of nothing. At the end of the 18th century, the author of this code, Edward Elgar, sent a coded message to his young girlfriend. The problem is that he managed to encrypt it so well that even she couldn't read it. Elgar was fascinated by the idea of ​​encrypted messages. He even cracked one of the most difficult codes that was published in the famous Pall Magazine. Many have found the symbols that make up the Dorabella cipher in musical compositions Elgar and his personal notes. Many have theories, but no one has ever found a solution.

9. D'Agapeyeff cipher

A couple of decades after the appearance of the Dorabella cipher, Alexander D'Agapeyeff wrote a book on cryptography. 1939, the year the book was written, was the time of pre-computer encryption, and it is believed that the D'Agapeyeff cipher was composed entirely by hand. This amazing code is harder to crack than prehistoric codes written in lost languages. The author of this cipher himself was a genius. His most famous code was so difficult that even he often gave in to it. Cryptologists have taken its numerical code and, as usual, assigned letters to the numbers. Unfortunately, it didn't lead to anything. They got a bunch of doubled and tripled letters. And the book of this cryptographer called "Codes and Ciphers", printed by Oxford Press, did not help. For some reason later editions did not include his known cipher. People were probably tired of the fact that at the very last moment, before they thought the secret would be revealed to them, the realization came that they were still far from it.

8. Harappan letter

Between 2600 and 1800 B.C. Harappan civilization flourished in the Indus Valley. The Indus people have been described in history as the most advanced urban culture of their time. The first attempts to decipher the Harappan script were made long before civilization was rediscovered. Historians from Britain to India have tried to decipher the symbolic messages. Some believe that the writing of the Indus people became the prototype of hieroglyphic writing in ancient Egypt. Teams from Russia and Finland came to the conclusion that the writing of this people has druidic roots. No matter where it originated, the 400 pictogram alphabet has been developed by some of the world's greatest minds. It is believed that the population of the Harappan civilization was 1 million. To manage so many people, some form of language had to be invented. And at sunset, civilization decided to act quite selfishly, and did not leave a cheat sheet for future civilizations.

7. Chinese gold bar cipher

General Wang of Shanghai, received seven gold bars in 1933. But not at all the ones that are deposited in banks. The biggest difference was the mysterious images and letters found on the ingots. They consisted of cipher letters, Chinese characters and Latin cryptograms. 90 years later, they still haven't been hacked. Weighing 1.8 kilograms, the Chinese cipher is believed to describe a deal worth more than $300,000,000. The real reason why General Wang received such an elaborate gift from an unknown admirer would be much easier to determine if we knew what was written on the gold bars.

6. Killer Zodiac

This name has nothing to do with the daily horoscopes that fill our mailboxes, we are talking about one of the most terrible serial killers. Not only was he guilty of a huge number of murders and was simply a mentally unbalanced person, the Zodiac tried to become famous at their expense. In 1939, he sent letters to three California newspapers boasting about the recent murders in Vallejo. For his generosity, he demanded that a coded message be printed on the front pages of these newspapers. In the end, the police were left with no choice but to play his game. More than 37 people became victims during his activities in the 1960s and 1970s, and it is surprising that several Zodiac messages were deciphered. However, the vast majority still keep their secret. The FBI even went so far as to release the rest of his messages to the public in the hope that someone could decipher them.

5. Linear A

Historians have succeeded in making a connection between the Phaistos Disc and Linear A, but they still need to decipher the message. The Phaistos disc was found in 1908, with mysterious signs on both sides. "Experts" identified 45 characters, but they still don't know what they mean. In addition, they found many discs with two different styles of writing. One style was called "Linear A" and the other "Linear B". Linear A was much older and was created on the island of Crete. A Briton named Michael Ventris put all "experts" to shame when he cracked the Linear B cipher. The secondary form was broken, but the "experts" are still scratching their heads over Linear A.

4. Proto-Elamite

Having formed the Persian Empire, the Elamites became the very first civilization known to us. Even in 3300 BC. it was necessary to develop a written language in order to communicate with each other. In the 8th century BC. The Elamites used clay symbols to represent various goods and services. They even came up with clay wallets and IDs to understand who had money and how much. This is the earliest evidence for the creation of a number system. Around 2900 BC their language has moved to a whole new level. It is assumed that the Proto-Elamite language was some form of accounting system.

Some advances, if you can call them that, have been made by historians who have found similarities between Proto-Elamite and cuneiform writing. Unfortunately, at the beginning of the 5th century BC. Proto-Elamite began to disappear. There are only 1,600 clay discs left that no one can read.

3. Taman Shud

As the Zodiac has already proven, killers love fame. The body of an unidentified Australian was found on the shores of Adelaide Beach over 65 years ago. The media dubbed him "The Mystery Man of Somerton". Attempts to find out his identity were also unsuccessful. But today we are talking about ciphers... Evidence found in his pockets led the Australian police to railway station local message. There they found his suitcase with the usual set of things for most people. The coroner stated that the man was perfectly healthy (apart from the fact that he was dead) and may have been poisoned.

It took two whole months to discover a small pocket, which was missed at the first examination. It contained a small piece of paper with the inscription "Taman Shud". After the discovery of this find, a guy approached the police, claiming to have found a copy of the same book in his car on the same evening that the stranger was killed. Under ultraviolet radiation appeared unreadable code of five lines. For years, officials and various volunteers have been trying to break the cipher. Professor Derek Abbott and his students have been trying to decipher the message since March 2009. However, like other mystery lovers, they gave up. But their reports say the victim was a Cold War spy who was poisoned by his enemies. It is much easier to come up with something mystical than to fully taste the bitter taste of defeat.

2. McCormick cipher

The body of Ricky McCormick was found in the Missouri area on June 30, 1999. Two years after his death, two notes in his pockets were the only clues for detectives. Even the efforts of the most famous cryptologists and the American Cryptology Association have not been able to decipher them. The McCormick cipher is ranked 3rd in the list of the most difficult codes. More than 30 lines of encoded information include numbers, lines, letters and brackets. With so many characters possible options ciphers are endless. McCormick's family says he has been writing in ciphers since childhood, and none of them knew what they meant. Although he was away for only a few days, McCormick's body was quickly identified. This made the deciphering of his notes a clue to his murder. FBI agents usually crack codes in a few hours. One way or another, McCormick, who normally could only write his own name, made serious competition for the professionals.

1. Bacon's cipher

The Voynich manuscript is the largest illustrated work written in cipher. The illustration, rediscovered to the world at the Jesuit School in 1912, got its name because the authorship is attributed to the Englishman Roger Bacon. Some historians discredit Bacon's authorship due to the presence of letters of the alphabet that were not used during his lifetime. On the other hand, the illustrations confirm Bacon's participation in the creation of the work. He was known for his interest in creating the elixir of life and other mystical teachings. Similar themes have been mentioned within the Voynich Manuscript. Was Bacon really interested in the unknown? We'll leave this debate to others, but one thing that remains undisputed is that we don't know what this cipher hides. A huge number of attempts have been made to crack the code. Some have argued that it is a modified Greek shorthand, while others have suggested that the key is in the illustrations. All theories have failed. Those who are still trying to break Bacon's cipher are amazed that it has taken so long to crack.

On this day your professional holiday notes the Cryptographic Service of Russia.

"Cryptography" from ancient Greek means "secret writing".

How were the words hidden?

A peculiar method of transmitting a secret letter existed during the reign of the dynasty of the Egyptian pharaohs:

chose a slave. They shaved his head bald and applied the text of the message to it with waterproof vegetable paint. When the hair grew, it was sent to the addressee.

Cipher- this is some kind of text transformation system with a secret (key) to ensure the secrecy of the transmitted information.

AiF.ru made a selection of interesting facts from the history of encryption.

All secret writing systems have

1. Acrostic- a meaningful text (word, phrase or sentence), composed of the initial letters of each line of the poem.

Here, for example, is a riddle poem with a clue in the first letters:

D I am generally known by my own name;
R the rogue and the blameless swear by him,
At tehoy in disasters I am more than anything,
F life is sweeter with me and in the best share.
B I can serve the happiness of pure souls alone,
BUT between the villains - I will not be created.
Yuri Neledinsky-Meletsky
Sergei Yesenin, Anna Akhmatova, Valentin Zagoryansky often used acrostics.

2. Litorrhea- a kind of cipher writing used in ancient Russian handwritten literature. It is simple and wise. A simple one is called a gibberish letter, it consists in the following: putting consonants in two rows in order:

used in writing upper letters instead of the lower ones and vice versa, and the vowels remain unchanged; for example, tokepot = kitten etc.

Wise litorea implies more complex substitution rules.

3. "ROT1"- cipher for kids?

You may have used it as a child too. The key to the cipher is very simple: each letter of the alphabet is replaced by the next letter.

A becomes B, B becomes C, and so on. "ROT1" literally means "rotate 1 letter forward in the alphabet". Phrase "I love borscht" turn into a secret phrase "A yavmya vps". This cipher is meant to be fun, easy to understand and decipher, even if the key is used in reverse.

4. From the rearrangement of terms ...

During World War I, confidential messages were sent using so-called permutation fonts. In them, the letters are rearranged using some given rules or keys.

For example, words can be written backwards so that the phrase "mom washed the frame" turns into a phrase "amam alym umar". Another permutation key is to permute each pair of letters so that the previous message becomes "am um um al ar um".

It may seem that complex permutation rules can make these ciphers very difficult. However, many encrypted messages can be decrypted using anagrams or modern computer algorithms.

5. Caesar's shift cipher

It consists of 33 different ciphers, one for each letter of the alphabet (the number of ciphers varies depending on the alphabet of the language used). The person had to know which Julius Caesar cipher to use in order to decipher the message. For example, if the cipher Ё is used, then A becomes Ё, B becomes F, C becomes Z, and so on in alphabetical order. If Y is used, then A becomes Y, B becomes Z, C becomes A, and so on. This algorithm is the basis for many more complex ciphers, but by itself does not provide reliable protection of the secret of messages, since checking 33 different cipher keys will take relatively little time.

Nobody could. Try you

Encrypted public messages tease us with their intrigue. Some of them still remain unsolved. Here they are:

Cryptos. A sculpture by artist Jim Sanborn that is located in front of the Central Intelligence Agency headquarters in Langley, Virginia. The sculpture contains four ciphers; it has not been possible to open the fourth code so far. In 2010, it was revealed that the characters 64-69 NYPVTT in the fourth part stand for the word BERLIN.

Now that you have read the article, you will surely be able to solve three simple ciphers.

Leave your options in the comments to this article. The answer will appear at 13:00 on May 13, 2014.

Answer:

1) saucer

2) The baby elephant is tired of everything

3) Good weather

Have questions?

Report a typo

Text to be sent to our editors: