Professional Documents
Culture Documents
Variants
The core elements of this system are the grid and dots. Some systems use the X's, but even
these can be
rearranged. One commonly used method orders the symbols as shown in the above image:
grid, grid, X,
X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid,
grid, grid,
with each cell having a letter of the alphabet, and the last one having an "&" character.
Letters from the first grid have no dot, letters from the second each have one dot, and letters
from the third each have two
dots. Another variation of this last one is called the Newark Cipher, which instead of dots
uses one to
three short lines which may be projecting in any length or orientation. This gives the illusion
of a larger
number of different characters than actually exist.[8]
Another system, used by the Rosicrucians, used a single grid of nine cells, and 1 to 3 dots in
each cell or
"pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then
groups of
JKL MNO PQR on the second, and STU VWX YZ on the third.[2][5] When enciphered, the
location of
the dot in each symbol (left, center, or right), would indicate which letter in that pen was
represented.[1][5] More difficult systems use a nonstandard
form of the alphabet, such as writing it
backwards in the grid, up and down in the columns,[4] or a completely randomized set of
letters.
The Templar cipher is a method claimed to have been used by the Knights Templar. It uses a
variant of a Maltese Cross.
In popular culture
The Pigpen cipher has been used in several works of popular
culture including Dan Brown's 2009 novel The Lost Symbol, both
in the book itself, and also to provide a puzzle in the artwork of
the U.S. version of the bookjacket. The Trap, a 2009 nominee for
Lancashire Children's Book of the Year, uses a variation of the
Pigpen cipher.[9]
The Pigpen Cipher is another example of a substitution cipher, but rather than replacing
each letter with another letter, the letters are replaced by symbols. The cipher has an
interesting history: although its true origins are unknown, it has been used by many groups.
Most notoriously, it was the cipher of choice for use by the Freemasons, a secret society in
the 18th Century. In fact, they used it so much, that it is often referred to as the
Freemasons Cipher. However, it was not exclusively used by them, with Union prisoners in
Confederate camps using it to communicate in the American Civil War.
Encryption
The encryption process is fairly straightforward, replacing each occurence of a letter with
the designated symbol. The symbols are assigned to the letters using the key shown below,
where the letter shown is replaced by the part of the image in which it is located.
Decryption
The decryption process is just the reverse of the encryption process. Using the same key
(the grid above), you locate the image depicted in the ciphertext, and replace it with the
letter given by that part of the grid.
Discussion
The Pigpen Cipher was used by the Freemasons in many aspects of their lives, and one of
the most common still seen today is on gravestones. Below is an image of a gravestone
which clearly contains the use of the Pigpen Cipher.