Professional Documents
Culture Documents
EXAMPLES
The purpose of this handout is to demonstrate various cryptic systems for recognition purposes. These
systems are not limited to the examples shown in this handout. There are many systems in use, many of
which use a combination of the cryptic systems shown throughout this handout, and other more complex
systems. The examples are grouped by groups: ciphers, concealment and codes. If you wish additional
information on these systems, there are numerous examples on the internet.
CIPHERS
Refers to the process of replacing true characters of a readable message with different characters (i.e.
numbers, letters, symbols or a combination of these) in order to encrypt a message. The true characters are
commonly referred to as plain text and the encrypted characters are referred to as cipher text.
SUBSTITUTION CIPHERS
Simple Substitution Cipher: The following is an example of a substitution cipher system using symbols to
encrypt the message, “MEET ME AT THE MALL”. The message is enciphered by replacing each plain text
character with its respective symbol on the cipher key provided below:
Plain text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher : @ # $ % ^ & * ( ) - + = [ ] < > } { “ ~ ? / \ | ;
text
Plain text: M E E T M E A T T H E M A L L
Encryption: = % % “ = % : “ “ * % = : + +
Caesar Shift: In the Caesar shift cipher system, the plain text is shifted by one or more characters to the
right or left, and is used as the cipher text to represent the plain text letter in the alphabet above it. The
following is an example of a Caesar shift 1 cipher.
Plain text
BCD E F G H I JK L M N O P Q R S T UV W X Y Z A
Cipher text
In this example, the plain text L is enciphered with the cipher text M. The phrase 'Lucky Dog' would be
enciphered as follows:
Plain text: L U C K Y D O G
Encryption: M V D L Z E P H
Masonic-based Cipher: This system employs the use of a template pattern using tic-tac-toe and
“X” patterns. The letters of the alphabet are placed in the templates as in the order determined by the
writer. Each Plain text letter is encrypted by extracting the shape of the pattern that surrounds the
Plain text letter. The dots are placed in the template to prevent duplication of the patterns, thus
avoiding confusion. Some systems use variations of this system, such as using 3 tic-tac-toe patterns
with two dots in the third template or using another character or symbol in place of the dots.
A B C D E F
G H I J K L
M N O P Q R
T X
S U W Y
V
Z
Below is an example of the encryption for the phrase “CIPHER KEY”.
C I P H E R K E Y
CODES, CIPHERS AND CONCEALMENTS 3
Telephone Keypad:
A telephone keypad can be used to encipher a message or numbers. Using this keypad
we can encipher the phrase, “THE EAGLE HAS ARRIVED” by replacing each character
with the number on the corresponding button on the keypad:
T H E E A G L E H A S A R R I V E D
8 4 3 3 2 4 5 3 4 2 7 2 7 7 4 8 3 3
(Note: When this system is used to encrypt letters, it is more difficult to decrypt, as one number can encrypt
three letters. )
Keyword Numeric Cipher: Keyword numeric ciphers can be used to encrypt numbers, especially
telephone numbers, addresses, weights, and money amounts. Normally, these keywords are ten-letter words
with no repeat letters. The following is a key using the keyword BLACKHORSE, notice that there are no
repeats in the word.
Plain text: 1 2 3 4 5 6 7 8 9 0
Cipher text: B L A C K H O R S E
Dinomic Cipher System: In the dinomic substitution cipher system, each plain text character is replaced by
two digits (i.e. row number, column number of the cipher key).
22 23 42 21 36 43 31 34 51 11 42 64 34 31
H I T G R U M P Y A T 7 P M
CODES, CIPHERS AND CONCEALMENTS 4
TRANSPOSITION CIPHERS
Transposition is the systematic rearrangement of characters of a message in order to conceal a message.
Transposition: In the following example the message “GREEN LIGHT ON SPYDER” has been encrypted
by simply moving the first letter of each word to the end of the word.
Columnar Transposition: In the columnar transposition the message is placed in a grid with sufficient
squares to hold each letter of the message. In this case, the message has 18 characters, which requires a grid
with at least 18 squares. The message is encrypted by entering it in the grid by row and extracting the
message by column.
1 2 3 4 5
The message “GREEN LIGHT ON SPYDER,” is rendered enciphered
G R E E N once it is extracted by column:
CONCEALMENTS
Concealments seek to hide plain text and/or cipher text making use of innocuous looking text, drawings,
tattoos or other media.
Hidden Within Text: The following excerpt is an example of a concealment scheme within an innocuous
looking letter:
In the previous example a message is hidden at an interval of 5. The following shows the message in red:
1 2 3
Dearest Loved One,
4 5 1 2 3 4 5 1 2 3 4 5….
So yesterday I heard from Cousin Mike over the phone he told me that Bubbs and me have the same car. He
says your stay there tested your heart so stay positive at such times. I’m for all that clean living. heroin
heroin
was my weakness….
The same concealment method can be used to conceal individual letters of a message as opposed to words.
Invisible Ink: “Invisible ink” is another form of concealment in which a substance is used to write a secret
message which, once dry, is invisible. Some of the substances used are: urine, citrus juice, sugar water, and
others. The “invisible ink” is applied to a paper by dipping a sharp pointed object such as a toothpick or a pen
without ink, and using the substance as an “ink’. Once dried and delivered, the recipient can recover the
message by applying heat to the page containing the invisible message, and the message will turn brown.
Often times the writer will write a letter on the front of the paper to avoid detection.
Indented Writing:
Micro writing:
CODES
Double Meaning: Words or phrases given arbitrary meanings by the correspondents. These often use words
that fit in a theme such as: sports, health, and education. Due to the arbitrary nature of this type of code and
number of code words, it is common to find code word lists containing a list of code words followed by their
meanings.
Veiled Meaning Code: Words, not previously agreed upon by the correspondents, from which inferences
can be made as to the information being transmitted.