You are on page 1of 6

CODES, CIPHERS AND CONCEALMENTS

EXAMPLES
The purpose of this handout is to demonstrate various cryptic systems for recognition purposes. These
systems are not limited to the examples shown in this handout. There are many systems in use, many of
which use a combination of the cryptic systems shown throughout this handout, and other more complex
systems. The examples are grouped by groups: ciphers, concealment and codes. If you wish additional
information on these systems, there are numerous examples on the internet.

CIPHERS
Refers to the process of replacing true characters of a readable message with different characters (i.e.
numbers, letters, symbols or a combination of these) in order to encrypt a message. The true characters are
commonly referred to as plain text and the encrypted characters are referred to as cipher text.

SUBSTITUTION CIPHERS

Simple Substitution Cipher: The following is an example of a substitution cipher system using symbols to
encrypt the message, “MEET ME AT THE MALL”. The message is enciphered by replacing each plain text
character with its respective symbol on the cipher key provided below:

Plain text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher : @ # $ % ^ & * ( ) - + = [ ] < > } { “ ~ ? / \ | ;
text

Plain text: M E E T M E A T T H E M A L L
Encryption: = % % “ = % : “ “ * % = : + +

Caesar Shift: In the Caesar shift cipher system, the plain text is shifted by one or more characters to the
right or left, and is used as the cipher text to represent the plain text letter in the alphabet above it. The
following is an example of a Caesar shift 1 cipher.

Plain text

ABC DE F GH I J K L M NO P QRS T U V WXY Z

BCD E F G H I JK L M N O P Q R S T UV W X Y Z A
Cipher text

In this example, the plain text L is enciphered with the cipher text M. The phrase 'Lucky Dog' would be
enciphered as follows:

Plain text: L U C K Y D O G

Encryption: M V D L Z E P H

Law Enforcement Sensitive


CODES, CIPHERS AND CONCEALMENTS 2

Masonic-based Cipher: This system employs the use of a template pattern using tic-tac-toe and
“X” patterns. The letters of the alphabet are placed in the templates as in the order determined by the
writer. Each Plain text letter is encrypted by extracting the shape of the pattern that surrounds the
Plain text letter. The dots are placed in the template to prevent duplication of the patterns, thus
avoiding confusion. Some systems use variations of this system, such as using 3 tic-tac-toe patterns
with two dots in the third template or using another character or symbol in place of the dots.

A B C D E F
G H I J K L
M N O P Q R

T X
S U W Y
V
Z
Below is an example of the encryption for the phrase “CIPHER KEY”.

C I P H E R K E Y
CODES, CIPHERS AND CONCEALMENTS 3

Telephone Keypad:

A telephone keypad can be used to encipher a message or numbers. Using this keypad
we can encipher the phrase, “THE EAGLE HAS ARRIVED” by replacing each character
with the number on the corresponding button on the keypad:

T H E E A G L E H A S A R R I V E D
8 4 3 3 2 4 5 3 4 2 7 2 7 7 4 8 3 3

Or you can encipher a numbers, for example:


2 0 2 5 5 5 4 2 3 4
B 0 C L J K H C F G

(Note: When this system is used to encrypt letters, it is more difficult to decrypt, as one number can encrypt
three letters. )

Keyword Numeric Cipher: Keyword numeric ciphers can be used to encrypt numbers, especially
telephone numbers, addresses, weights, and money amounts. Normally, these keywords are ten-letter words
with no repeat letters. The following is a key using the keyword BLACKHORSE, notice that there are no
repeats in the word.

Plain text: 1 2 3 4 5 6 7 8 9 0

Cipher text: B L A C K H O R S E

Using the above the number 12,500 would be enciphered: BLKEE

Dinomic Cipher System: In the dinomic substitution cipher system, each plain text character is replaced by
two digits (i.e. row number, column number of the cipher key).

Example: HIT GRUMPY AT 7 PM

22 23 42 21 36 43 31 34 51 11 42 64 34 31
H I T G R U M P Y A T 7 P M
CODES, CIPHERS AND CONCEALMENTS 4

TRANSPOSITION CIPHERS
Transposition is the systematic rearrangement of characters of a message in order to conceal a message.

Transposition: In the following example the message “GREEN LIGHT ON SPYDER” has been encrypted
by simply moving the first letter of each word to the end of the word.

REENG IGHTL NO PYDERS

Columnar Transposition: In the columnar transposition the message is placed in a grid with sufficient
squares to hold each letter of the message. In this case, the message has 18 characters, which requires a grid
with at least 18 squares. The message is encrypted by entering it in the grid by row and extracting the
message by column.

1 2 3 4 5
The message “GREEN LIGHT ON SPYDER,” is rendered enciphered
G R E E N once it is extracted by column:

L I G H T GLOD RINE EGSR EHPX NTYX


O N S P Y
D E R X X

CONCEALMENTS
Concealments seek to hide plain text and/or cipher text making use of innocuous looking text, drawings,
tattoos or other media.

Hidden Within Text: The following excerpt is an example of a concealment scheme within an innocuous
looking letter:

Dearest Loved One,


So yesterday I heard from Cousin Mike over the phone he told me that Bubbs and me have the same car. He
says your stay there tested your heart so stay positive at such times. I’m for all that clean living. heroin
was my weakness….
CODES, CIPHERS AND CONCEALMENTS 5

In the previous example a message is hidden at an interval of 5. The following shows the message in red:

1 2 3
Dearest Loved One,
4 5 1 2 3 4 5 1 2 3 4 5….
So yesterday I heard from Cousin Mike over the phone he told me that Bubbs and me have the same car. He
says your stay there tested your heart so stay positive at such times. I’m for all that clean living. heroin
heroin
was my weakness….

Decrypted Message: YESTERDAY MIKE TOLD ME HE TESTED POSITIVE FOR HEROIN

Concealments can be done using numerous patterns such as:


• intervals of words throughout the document
• placement of the word in each line, for example the 3rd word of each line
• placement of the word in relation to punctuation, for example every 2nd word after each comma

The same concealment method can be used to conceal individual letters of a message as opposed to words.

Invisible Ink: “Invisible ink” is another form of concealment in which a substance is used to write a secret
message which, once dry, is invisible. Some of the substances used are: urine, citrus juice, sugar water, and
others. The “invisible ink” is applied to a paper by dipping a sharp pointed object such as a toothpick or a pen
without ink, and using the substance as an “ink’. Once dried and delivered, the recipient can recover the
message by applying heat to the page containing the invisible message, and the message will turn brown.
Often times the writer will write a letter on the front of the paper to avoid detection.

Indented Writing:

This is an example of indented writing. The indentations can


be made with an inkless pen or a ribbon-less typewriter. The
indentations may be found on an innocuous looking letter,
usually on the back side or written inside of an envelope.
Often, the writing is very small, similar in size to the following
example of micro writing.
CODES, CIPHERS AND CONCEALMENTS 6

Micro writing:

Micro writing is usually found on small pieces of paper,


often referred to as “kites,” fitting as many as 5 or 6 lines
of text between the lines of a page from a lined notepad.
The messages can be passed using drop sites, and are
sometimes transported inserted in the rectum, wrapped in
a protective covering.

CODES

Double Meaning: Words or phrases given arbitrary meanings by the correspondents. These often use words
that fit in a theme such as: sports, health, and education. Due to the arbitrary nature of this type of code and
number of code words, it is common to find code word lists containing a list of code words followed by their
meanings.

Veiled Meaning Code: Words, not previously agreed upon by the correspondents, from which inferences
can be made as to the information being transmitted.

You might also like