Charlemagne Cipher

Download as pdf or txt
Download as pdf or txt
You are on page 1of 38
At a glance
Powered by AI
The document discusses various encryption techniques including substitution ciphers, transposition ciphers, and frequency analysis.

Some substitution ciphers mentioned include the Caesar cipher, reverse alphabet cipher, and Navajo code.

The Playfair cipher works by writing the alphabet in a 5x5 grid, breaking the plaintext into digraphs, and then encrypting based on whether the letters are in the same row, column, or neither.

Charlemagne Cipher:

simple Number Substitution code: This code is very easy to solve. Each number stands for a letter.

Reverse Alphabet Code: In this code, each letter in the code stands for a different real letter. A stands for Z B stands for Y C stands for X etc.

Mary Queen of Scots Code:

Playfair Cipher: First a keyword is needed, for this example CHARLES will be used. Next, before encryption, alphabet are written in a 5x5 square, beginning with the keyword and I&J in a single element. C E G O V H A R S B D I/J K M P Q T W X Y L F N U Z

Now, the message is broken up into pairs of letters, of digraphs. The two letters in any digraph should be different, achieved in the following example by inserting an extra x between same letters. Plain text: meet me at hammersmith bridge tonight plain text in digraphs: me-et-me-at-ha-mx-me-rs-mi-th-br-id-ge-to-ni-gh-tx Encryption can now begin. All digraphs fall into one of three categories - both letters in same row, or same column, or neither. -1- same row: replaced by letter immediate right of each. MI becomes NK if one letter is at the end of row, it is replaced by letter at beginning; thus NI becomes GK. -2- both letters in same column: replaced by letter immediately beneath each. GE becomes OG if one letter is at bottom of column, replace by letter at top; thus VE becomes CG. -3- letters are neither in same row or column. To encipher the first letter, look along its row until you reach the column containing the second letter; the letter at this intersection then replaces the first letter. To encipher second letter, look along its row until your reach the column containing the first letter; the letter at this intersection replaces second letter. Hence, ME becomes GD, and ET becomes DO.

Data Shift Cipher: Pick a date (month / day / year) using a 0 in front of any single digits. Write out the date, without slash marks. Write out the message and then under write the date, continuously. Now shift each letter of the plaintext by number written under it. Using the wrap around continuous letters from Z go back to A, B,C etc. Example use 110466 (my birth date). Data Shift Ci pher 1 1 0 4 6 6 11 0 4 6 6 1 1 0 D=E A=B T=T A= D Data will then be EBTD

Decoding all that is needed is the key number. Write the key number under the letters and then reversing you can decode.

Substitute code: As an example: A D H I K V X M O R S U W Y Z L N E P P T

B G J C Q

With this code A=V and V=A and so on. This code can be arranged in any way desired. Half the letters on top and half on bottom, each letter is reversed with the other. Code would be MQXU.

Navajo Code: A B C D E F G H I Ant Bear Cat Deer Elk Fox Goat Horse Ice Wol-la-chee Shush Moasi Be Dzeh Ma-e Klizzie Lin Tkin

J K L M N O P Q R S T U V W X Y Z

Jackass Kid Lamb Mouse Nut Owl Pig Quiver Rabbit Sheep Turkey Ute Victor Weasel Cross Yucca Zinc

Tkele-cho-gi Klizzie-yazzi Dibeh-yazzi Na-as-tso-si Nesh-chee Ne-ahs-jsh Bi-sodih Ca-yeilth Gah Dibeh Than-zie No-do-ih A-keh-ki-glini Gloe-ih Al-an-as-dzoh Tsah-as-zih Besh-do-gliz

Block Cipher: Write message in a rectangular block, one row at a time. Block cipher = Bloc kcip her! From here you can re-write the code from left to right and from top to bottom, per row. Bkhlceoircp!

Codeword Cipher: This code is based on a special code word. Write out the alphabet, in plain text. Now, using the code word (a word that doesnt repeat letters) place each letter under the plain text alphabet. Example code word is newsboy. A B C D E F G H I J etc. n e w s b o y a c d etc. Remember to skip the letters in you codeword when you finish the alphabet. Once

the entire alphabet is coded use the code of the plain text to leave a message. Example : = n B = e C = w etc.

Half - Reversed Alphabet: Just write out the letters from A to M, and write the letters from N to Z directly below them. A B C D E F G H I J K L M N O P Q A = N and R S T UV WX Y Z

N = A and so on.

Example: Half would be coded as : UNYS Break This Code = oernx guvf pbqr

Hiding among the Diamonds: Using a deck of cards you can leave messages. Aces = 1 Back of a card = 10 and the number cards = their number. By looking at the numerals and adding them sum will create a letter from the alphabet. Example: one back of a card = J a back and a 5 = 15 = O an Ace and back = 11 = K a 5 = E a back and an 8 = 18 = R. So that = JOKER.

Skyscraper: Using any number to equal a letter. Using three symbols to equal 1,5 and 10. Using various combinations to create a number from 1-26 will be a letter. Using a drawing of a skyscraper you can use the three symbols as a line down = 1, a color box for 5 and another color box for 10. Making them windows in the skyscraper you can create letters.

Moth Codes: Using morse code you can place them on wings of moths to send a code.

Color Dot Code: Four colors give you 24 patterns. Arranging the four colors in various orders creates letters. Using any four symbols in various orders. Colored dots: Red, Blue, Green, Yellow (or any other colors or symbols) Another example: [ ] { } in various orders. []{} = A []}{ = B ][{} = C and so on to create 24 various letters can combine I/J and Y/Z to form a full alphabetical code.

Picture / Dot Messages: Creating pictures to indicate dots and dashes to make morse code. Example is black birds. Small birds are dots and larger ones being dashes. Or use clouds or any objects. As well you can use dots on a letter or picture or these dots could be small bees or butterflys, etc. A pre constructed ruler using alphabet can indicate letter, depending on were object is located. From a computer you can use the ruler bar to indicate letter position. (Every other mark =s a letter) Just place a letter or symbol at that position, its the position not the letter that indicates letter.

Paragraph - Word - Letter: This type of code refers to a specific piece of text, i.e. a newspaper or book of some kind. Each triple set of numbers represent a paragraph, word or letter. First number is the paragraph, Second is the word and the third is the letter. This also works as far as page, paragraph and word or letter.

Classified Code: Used like (or as) a want ad in a newspaper. Create a three line ad (this is were the message is hidden). Now create a fourth line that is a Nul line. The last line is the phone number, which is the Key to the code. The area code, in parentheses, is the letters of the first line. The next three numbers decodes the second line, as does the third set of numbers and third line. The fourth line is only a mislead. Zero (0) in a telephone number signals the end of a coded message. EX. (Coded word: Classified) Cider Sale Sifted Flour I have seeds Full service old time feed store Call: 1 (876) 127-1590 To add additional letters you can us a 800 or 900. As ex. 1 800 (876) 127 - 1590

Columnar Transposition: First pick an eight (8) letter key word ( or one as long as there are rows) example will be using Diplomat Making an eight row grid 4 lines down you write message diplomat microfil mnillbea rriving b ycourier

The message : microfilm will be arriving by courier

Now, below the key word diplomat write the corresponding number as were the letter comes in the alphabet. D= 4, I= 9, P= 16, L= 12, O= 15, M= 13, A= 1, T=20 Using the order of letters A-Z write the letters from that row. Ex. A(1)= iege D(4)= mmry, etc., until the whole message is coded. Deciphering the Columnar Knowing the keyword write out the keyword and below each letter write the letters that align with them. Once you have completed the letters the message will appear. Knowing the key word you then go from A to Z in order, arranging the grouped letters in their proper places, under the key word.

Trifid Cipher: The Trifid Cipher is the Bifid Cipher taken to one more dimension. Instead of using a 5x5 Polybius Square, you use a 3x3x3 cube. Otherwise everything else remains the same. As with the Bifid Cipher, the cube can be mixed to add an extra layer of protection, but for these examples we will not be using a mixed alphabet cube. Step one is to use the cube to convert the letters into numbers. We will be writing the numbers vertically below the message in the order of Layer, Column, Row. Secret Message 311213 2133111 123322 1211112 121321 2211132 The numbers are then read off horizontally and grouped into triplets. 311 213 213 311 112 332 212 111 121 213 212 211 132

The cube is used again to convert the numbers back into letters which gives us our cihertext. Sppsdxmabpmjf To decipher a Trifid encrypted message, you first convert each letter into its corresponding number via the cube. Now divide the long string of numbers into three equal rows. Now, read off each column and use the cube to convert the three numbers into the plaintext letter.

Layer 1 1 2 3 1 2 3 a b c d e f g h i 1 2 3

Layer 2 1 2 3 j k l mn o pq r 1 2 3

Layer 3 1 2 3 s t u vw x yz

Inch Word: Lay the ruler across the paper. Print your message in capital letters, placing each letter above the inch and the half-inch marks on the ruler. (See the picture above.) Circle the last letter of your message. Then, to confuse snoopers, fill in other letters between the letters of your message so that they form other words. The words shouldn't have anything to do with the real message. To read the message, your friend places a ruler under the line of words, with the circle letter over an inch or a half-inch mark and copies off the letters at each inch and half-inch interval.

Jefferson Cipher:

Have students use the coded message at the bottom of the cipher ("The m an whose mind on virtue bent...") to try to figure out the pattern. Give students 5 to 10 minutes to try to find the pattern. W hen a student thinks he or she has figured it out, have that student use the code to write your last name. (To mak e an easy job of correcting students' work, you will have figured out in advance the coded spelling of your last name.) Then let them work at coding their own names. The code is fairly straightforward. The letters of the alphabet read down the cipher chart. Students will find the first letter of your last name in the left column and then find the corresponding code-letter in the column labeled with the num ber 1. For the sec ond letter of your last nam e, students will find that letter in the left column and write the corresponding code-letter found in the column labeled with the number 2. For the third letter of your last name, find that letter in the left column and write the corresponding code-letter found in the column labeled with the number 3and so on.

Frequency: This code is based on the frequency of each letter. E is the most common letter, so it represents A. T is the second most common, so it is B. A B C D E F G H I J E T A O N R I S H D

K L M N O P Q R S T U V W X Y Z

L F C M U G Y P W B V K X J Q Z

Witches Alphabet:

Pictswirl cipher:

A A M M Y Y

B B N N Z Z

C C O O

D D P P

E E Q Q

F F R R

G G S S

H H T T

I I U U

J J V V

KL KL WX WX

Tagalog cipher:

A B C A B C

D D

E F G H I J KL E F G H I J KL

M N O M N Y Z Y Z O

P Q R S T U P Q R S T U

V WX V WX

Navajo Code Talkers' Dictionary


REVISED A S OF 15 JUN E 1945 (DECLASSIFIED UN DER D EPART M ENT O F DEFEN SE DIRECTIVE 5200.9) ALPHABET A A A B B B C C C D D D E E E F F F NAVAJO WORD WOL-LA-CHEE BE-LA-SANA TSE-NILL NA-HASH-CHID SHUSH TOISH-JEH MOASI TLA-GIN BA-GOSHI BE CHINDI LHA-CHA-EH AH-JAH DZEH AH-NAH CHUO TSA-E-DONIN-EE MA-E LITERAL TRANSLATION ANT APPLE AXE BADGER BEAR BARREL CAT COAL COW DEER DEVIL DOG EAR ELK EYE FIR FLY FOX

G G G H H H I I I J J J K K K L L L M M M N N O O O P P P Q R R R S S T T T U U V W X Y Z

AH-TAD KLIZZIE JEHA TSE-GAH CHA LIN TKIN YEH-HES A-CHI TKELE-CHO-G AH-YA-TSINNE YIL-DOI JAD-HO-LONI BA-AH-NE-DI-TININ KLIZZIE-YAZZIE DIBEH-YAZZIE AH-JAD NASH-DOIE-TSO TSIN-TLITI BE-TAS-TNI NA-AS-TSO-SI TSAH A-CHIN A-KHA TLO-CHIN NE-AHS-JAH CLA-GI-AIH BI-SO-DIH NE-ZHONI CA-YEILTH GAH DAH-NES-TSA AH-LOSZ DIBEH KLESH D-AH A-WOH THAN-ZIE SHI-DA NO-DA-IH A-KEH-DI-GLINI GLOE-IH AL-NA-AS-DZOH TSAH-AS-ZIH BESH-DO-TLIZ

GIRL GOAT GUM HAIR HAT HORSE ICE ITCH INTESTINE JACKASS JAW JERK KETTLE KEY KID LAMB LEG LION MATCH MIRROR MOUSE NEEDLE NOSE OIL ONION OWL PANT PIG PRETTY QUIVER RABBIT RAM RICE SHEEP SNAKE TEA TOOTH TURKEY UNCLE UTE VICTOR WEASEL CROSS YUCCA ZINC

NAMES OF VARIOUS ORGANIZATIONS CORPS DIVISION REGIMENT BATTALION COMPANY PLATOON SECTION SQUAD OFFICERS COMMANDING GEN. MAJOR GEN.

NAVAJO WORD DIN-NEH-IH ASHIH-HI TABAHA TACHEENE NAKIA HAS-CLISH-NIH YO-IH DEBEH-LI-ZINI

LITERAL TRANSLATION CLAN SALT EDGE WATER RED SOIL MEXICAN MUD BEADS BLACK SHEEP

BIH-KEH-HE (G) SO-NA-KIH

WAR CHIEF TWO STAR

BRIGADIER GEN. SO-A-LA-IH COLONEL ATSAH-BESH-LE-GAI LT. COLONEL CHE-CHIL-BE-TAH-BESH-LEGAI MAJOR CHE-CHIL-BE-TAH-OLA CAPTAIN BESH-LEGAI-NAH-KIH LIEUTENANT BESH-LEGAI-A-LAH-IH COMMANDING OFFICER HASH-KAY-GI-NA-TAH EXECUTIVE OFFICER BIH-DA-HOL-NEHI NAMES OF COUNTRIES AFRICA ZHIN-NI ALASKA BEH-HGA AMERICA NE-HE-MAH AUSTRALIA CHA-YES-DESI BRITAIN TOH-TA CHINA CEH-YEHS-BESI FRANCE DA-GHA-HI GERMANY BESH-BE-CHA-HE ICELAND TKIN-KE-YAH INDIA AH-LE-GAI ITALY DOH-HA-CHI-YALI-TCHI JAPAN BEH-NA-ALI-TSOSIE PHILIPPINE KE-YAH-DA-NA-LHE RUSSIA SILA-GOL-CHI-IH SOUTH AMERICA SHA-DE-AH-NE-HI-MAH SPAIN DEBA-DE-NIH NAMES OF AIRPLANES PLANES WO-TAH-DE-NE-IH DIVE BOMBER GINI TORPEDO PLANE TAS-CHIZZIE OBS. PLAN NE-AS-JAH FIGHTER PLANE DA-HE-TIH-HI BOMBER PLANE JAY-SHO PATROL PLANE GA-GIH TRANSPORT ATSAH NAMES OF SHIPS SHIPS BATTLESHIP AIRCRAFT SUBMARINE MINE SWEEPER DESTROYER TRANSPORT CRUISER MOSQUITO BOAT NAMES OF MONTHS JANUARY FEBRUARY MARCH APRIL MAY JUNE JULY AUGUST SEPTEMBER OCTOBER NOVEMBER DECEMBER

ONE STAR SILVER EAGLE SILVER OAK LEAF GOLD OAK LEAF TWO SILVER BARS ONE SILVER BAR WAR CHIEF THOSE IN CHARGE

BLACKIES WITH WINTER OUR MOTHER ROLLED HAT BETWEEN WATERS BRAIDED HAIR BEARD IRON HAT ICE LAND WHITE CLOTHES STUTTER SLANT EYE FLOATING ISLAND RED ARMY SOUTH OUR MOTHER SHEEP PAIN

AIR FORCE CHICKEN HAWK SWALLOW OWL HUMMING BIRD BUZZARD CROW EAGLE

TOH-DINEH-IH LO-TSO TSIDI-MOFFA-YE-HI BESH-LO CHA CA-LO DINEH-NAY-YE-HI LO-TSO-YAZZIE TSE-E

SEA FORCE WHALE BIRD CARRIER IRON FISH BEAVER SHARK MAN CARRIER SMALL WHALE MOSQUITO

ATSAH-BE-YAZ WOZ-CHEIND TAH-CHILL TAH-TSO TAH-TSOSIE BE-NE-EH-EH-JAH-TSO BE-NE-TA-TSOSIE BE-NEEN-TA-TSO GHAW-JIH NIL-CHI-TSOSIE NIL-CHI-TSO YAS-NIL-TES

SMALL EAGLE SQUEEKY VOICE SMALL PLANT BIG PLANT SMALL PLANT BIG PLANTING SMALL HARVEST BIG HARVEST HALF SMALL WIND BIG WIND CRUSTED SNOW

VOCABULARY WORD NAVAJO ABANDON YE-TSAN ABOUT WOLA-CHI-A-MOFFA-GAHN ABREAST WOLA-CHEE-BE-YIED ACCOMPLISH UL-SO ACCORDING BE-KA-HO ACKNOWLEDGE HANOT-DZIED ACTION AH-HA-TINH ACTIVITY AH-HA-TINH-Y ADEQUATE BEH-GHA ADDITION IH-HE-DE-NDEL ADDRESS YI-CHIN-HA-TSE ADJACENT BE-GAHI ADJUST HAS-TAI-NEL-KAD ADVANCE NAS-SEY ADVISE NA-NETIN AERIAL BE-ZONZ AFFIRMATIVE LANH AFTER BI-KHA-DI (A) AGAINST BE-NA-GNISH AID EDA-ELE-TSOOD AIR NILCHI AIRDOME NILCHI-BEGHAN ALERT HA-IH-DES-EE ALL TA-A-TAH (A) ALLIES NIH-HI-CHO ALONG WOLACHEE-SNEZ ALSO EH-DO ALTERNATE NA-KEE-GO-NE-NAN-DEY-HE AMBUSH KHAC-DA AMMUNITION BEH-ELI-DOH-BE-CAH-ALI-TAS-AI AMPHIBIOUS CHAL AND DO ANGLE DEE-CAHN ANNEX IH-NAY-TANI ANNOUNCE BEH-HA-O-DZE ANTI WOL-LA-CHEE-TSIN ANTICIPATE NI-JOL-LIH ANY TAH-HA-DAH APPEAR YE-KA-HA-YA APPROACH BI-CHI-OL-DAH APPROXIMATE TO-KUS-DAN ARE GAH-TSO BIG AREA HAZ-A-GIH ARMOR BESH-YE-HA-DA-DI-TEH ARMY LEI-CHA-IH-YIL-KNEE-IH ARRIVE IL-DAY ARTILLERY BE-AL-DOH-TSO-LANI AS AHCE ASSAULT ALTSEH-E-JAH-HE ASSEMBLE DE-JI-KASH ASSIGN BAH-DEH-TAHN AT AH-DI ATTACK AL-TAH-JE-JAY ATTEMPT BO-O-NE-TAH (A) ATTENTION GIHA AUTHENTICATOR HANI-BA-AH-HO-ZIN AUTHORIZE BE-BO-HO-SNEE AVAILABLE TA-SHOZ-TEH-IH

LITERAL TRANSACTION RUN AWAY FROM ANT FIGHT ANT BREAST ALL DONE ACCORDING TO ACKNOWLEDGE PLACE OF ACTION ACTION ENDING IN Y ENOUGH ADDITION ADDRESS NEAR ADJUST AHEAD ADVISE STINGER AFFIRMATIVE AFTER AGAINST AID AIR AIRDOME ALERT ALL ALLIES LONG ANT ALSO SECOND POSITION AMBUSH AMMUNITION FROG AND SLANTING ADDITION ANNOUNCE ANT ICE ANTICIPATE ANY APPEAR APPROACH APPROXIMATE RABBIT AREA IRON PROTECTOR ARMY ARRIVE MANY BIG GUNS AS FIRST STRIKER BUNCH TOGETHER ASSIGN AT ATTACK TRY ATTENTION KNOW ABOUT AUTHORIZE AVAILABLE

BAGGAGE BANZAI BARGE BARRAGE BARRIER BASE BATTERY BATTLE BAY BAZOOKA BE BEACH BEEN BEFORE BEGIN BELONG BETWEEN BEYOND BIVOUAC BOMB BOOBY TRAP BORNE BOUNDARY BULL DOZER BUNKER BUT BY

KLAILH (B) NE-TAH BESH-NA-ELT BESH-BA-WA-CHIND BIH-CHAN-NI-AH BIH-TSEE-DIH BIH-BE-AL-DOH-TKA-IH DA-AH-HI-DZI-TSIO TOH-AH-HI-GHINH AH-ZHOL TSES-NAH TAH-BAHN (B) TSES-NAH-NES-CHEE BIH-TSE-DIH HA-HOL-ZIZ TSES-NAH-SNEZ BI-TAH-KIZ BILH-LA DI EHL-NAS-TEH A-YE-SHI DINEH-BA-WHOA-BLEHI YE-CHIE-TSAH KA-YAH-BI-NA-HAS-DZOH(B) DOLA-ALTH-WHOSH TSAS-KA NEH-DIH BE-GHA

BAGGAGE FOOL THEM BARGE BARRAGE IN THE WAY BASE THREE GUNS BATTLE BAY BAZOOKA BEE BEACH BEE NUT BEFORE COMMENCE FROM LONG BEE BETWEEN DOWN BELOW BRUSH SHELTER EGGS MAN TRAP BORN ELK BOUNDARY BULL SLEEP SANDY HOLLOW BUT BY WIRE ROPE MOVE AROUND TEMPORARY PLACE HID CAN BIG GUN OPERATOR CAPACITY CAPTURE CARRY CASE PUT OUT OF ACTION CAUSE ROCK CAVE SEAL AMONG DEVILS CENTER CHANGE SMALL SINGER CHARGE ALKALI CIRCLE CIRCUIT CLASS CLEAR CLIFF CLOSE SHORE RUNNER PECK TWO SPOTS COLUMN FIGHTING MIXED COME

CABLE BESH-LKOH CALIBER NAHL-KIHD CAMP TO-ALTSEH-HOGAN CAMOUFLAGE DI-NES-IH CAN YAH-DI-ZINI CANNONEER BE-AL-DOH-TSO-DEY-DIL-DON-IGI CAPACITY BE-NEL-AH CAPTURE YIS-NAH CARRY YO-LAILH CASE BIT-SAH CASUALTY BIH-DIN-NE-DEY CAUSE BI-NIH-NANI CAVE TSA-OND CEILING DA-TEL-JAY CEMETARY JISH-CHA CENTER ULH-NE-IH CHANGE THLA-GO-A-NAT-ZAH CHANNEL HA-TALHI-YAZZIE CHARGE AH-TAH-GI-JAH CHEMICAL TA-NEE CIRCLE NAS-PAS CIRCUIT AH-HEH-HA-DAILH CLASS ALTH-AH-A-TEH CLEAR YO-AH-HOL-ZHOD CLIFF TSE-YE-CHEE CLOSE UL-CHI-UH-NAL-YAH COAST GUARD TA-BAS-DSISSI CODE YIL-TAS COLON NAKI-ALH--DEH-DA-AL-ZHIN COLUMN ALTH-KAY-NE-ZIH COMBAT DA-AH-HI-JIH-GANH COMBINATION AL-TKAS-EI COME HUC-QUO

COMMA COMMERCIAL COMMIT COMMUNICATION CONCEAL CONCENTRATION CONCUSSION CONDITION CONFERENCE CONFIDENTIAL CONFIRM CONQUER CONSIDER CONSIST CONSOLIDATE CONSTRUCT CONTACT CONTINUE CONTROL CONVOY COORDINATE COUNTER ATTACK COURSE CRAFT CREEK CROSS CUB DASH DAWN DEFENSE DEGREE DELAY DELIVER DEMOLITION DENSE DEPART DEPARTMENT DESIGNATE DESPERATE DETACH DETAIL DETONATOR DIFFICULT DIG IN DIRECT DISEMBARK DISPATCH DISPLACE DISPLAY DISPOSITION DISTRIBUTE DISTRICT DO DOCUMENT DRIVE DUD DUMMY EACH ECHELON

TSA-NA-DAHL NAI-EL-NE-HI HUC-QUO-LA-JISH HA-NEH-AL-ENJI BE-KI-ASZ-JOLE TA-LA-HI-JIH WHE-HUS-DIL AH-HO-TAI BE-KE-YA-TI NA-NIL-IN TA-A-NEH A-KEH-DES-DLIN NE-TSA-CAS BILH (C) AH-HIH-HI-NIL AHL-NEH AH-HI-DI-DAIL TA-YI-TEH NAI-GHIZ TKAL-KAH-O-NEL BEH-EH-HO-ZIN-NA-AS-DZOH WOLTAH-AL-KI-GI-JEH CO-JI-GOH AH-TOH TOH-NIL-TSANH AL-N-AS-DZOH SHUSH-YAHZ US-DZOH HA-YELI-KAHN AH-KIN-CIL-TOH NAHL-KIHD BE-SITIHN BE-BIH-ZIHDE AH-DEEL-TAHI HO-DILH-CLA (D) DA-DE-YAH HOGAN YE-KHI-DEL-NEI AH-DA-AH-HO-DZAH AL-CHA-NIL BE-BEH-SHA AH-DEEL-TAHI (OR) NA-NE-KLAH LE-EH-GADE AH-JI-GO EH-HA-JAY LA-CHAI-EN-SEIS-BE-JAY HIH-DO-NAL BE-SEIS-NA-NEH A-HO-TEY NAH-NEH BE-THIN-YA-NI-CHE TSE-LE BEH-EH-HO-ZINZ AH-NOL-KAHL DI-GISS-YAHZIE DI-GISS-TSO TA-LAHI-NE-ZINI-GO (D) WHO-DZAH

TAIL DROP COMMERCIAL COME GLOVE MAKING TALK CONCEAL ONE PLACE CONCUSSION HOW IT IS TALK OVER KEPT SECRET MAKE SURE WON THINK IT OVER CONSIST PUT TOGETHER TO MAKE COME TOGETHER CONTINUE CONTROL MOVING ON WATER KNOWN LINES COUNTER ACT COURSE NEST VERY LITTLE WATER CROSS CUB DASH DAWN DEFENSE DEGREE DEER LAY DEER LIVER BLOW UP WET DEPART DEPARTMENT POINT OUT DOWN TO LAST DETACHED DEER TAIL BLOWN UP DIFFICULT DIG IN DIRECT GET OUT DOG IS PATCH MOVE DEER IS PLAY DISPOSITION DISTRIBUTE DEER ICE STRICT SMALL PUP DOCUMENT DRIVE SMALL DUMMY BIG DUMMY EACH LINE

EDGE EFFECTIVE EFFORT ELEMENT ELEVATE ELIMINATE EMBARK EMERGENCY EMPLACEMENT ENCIRCLE ENCOUNTER ENGAGE ENGINE ENGINEER ENLARGE ENLIST ENTIRE ENTRENCH ENVELOP EQUIPMENT ERECT ESCAPE ESTABLISH ESTIMATE EVACUATE EXCEPT EXCEPT EXCHANGE EXECUTE EXPLOSIVE EXPEDITE EXTEND EXTREME FAIL FAILURE FARM FEED FIELD FIERCE FILE FINAL FLAME THROWER FLANK FLARE FLIGHT FORCE FORM FORMATION FORTIFICATION FORTIFY FORWARD FRAGMENTATION FREQUENCY FRIENDLY FROM FURNISH FURTHER GARRISON GASOLINE

BE-BA-HI BE-DELH-NEED YEA-GO AH-NA-NAI ALI-KHI-HO-NE-OHA HA-BEH-TO-DZIL EH-HO-JAY HO-NEZ-CLA LA-AZ-NIL YE-NAS-TEH (E) BI-KHANH A-HA-NE-HO-TA CHIDI-BI-TSI-TSINE (E) DAY-DIL-JAH-HE NIH-TSA-GOH-AL-NEH BIH-ZIH-A-DA-YI-LAH TA-A-TAH (E) E-GAD-AH-NE-LIH A-ZAH-GI-YA YA-HA-DE-TAHI YEH-ZIHN A-ZEH-HA-GE-YAH HAS-TAY-DZAH BIH-KE-TSE-HOD-DES-KEZ HA-NA NEH-DIH (E) NA-WOL-NE ALH-NAHL-YAH A-DO-NIL AH-DEL-TAHI (E) SHIL-LOH (E) NE-TDALE AL-TSAN-AH-BAHM CHA-AL-EIND YEES-GHIN MAI-BE-HE-AHGAN DZEH-CHI-YON CLO-DIH (F) TOH-BAH-HA-ZSID BA-EH-CHEZ TAH-AH-KWO-DIH COH-AH-GHIL-TLID DAH-DI-KAD WO-CHI MA-E-AS-ZLOLI TA-NA-NE-LADI BE-CHA BE-CHA-YE-LAILH AH-NA-SOZI AH-NA-SOZI-YAZZIE TEHI BESH-YAZZIE HA-TALHI-TSO NEH-HECHO-DA-NE BI-TSAN-DEHN YEAS-NIL (F) WO-NAS-DI YAH-A-DA-HAL-YON-IH CHIDI-BI-TOH

EDGE EFFECTIVE WITH ALL YOUR MIGHT TROOP REPRESENTING OTHERS ELEVATE ELIMINATE GET ON EMERGENCY EMPLACEMENT ENCIRCLE GO AGAINST AGREED ENGINE ENGINEER MAKE BIG ENLIST ENTIRE MAKE DITCH ENVELOP EQUIPMENT STAND UP ESCAPE ESTABLISH ESTIMATE EVACUATE EXCEPT EXPECT EXCHANGE EXECUTE EXPLOSIVE SPEED UP MAKE WIDE EACH END FAIL FAILURE FOX ARM FEED FIELD AFRAID FILE THAT IS ALL FLAME THROWER FLANK LIGHT STREAK FOX LIGHT WITHOUT CARE FORM FORMATION CLIFF DWELLING SMALL FORTIFICATION LET'S GO SMALL METAL BIG SINGER FRIENDLY FROM FURNISH FURTHER TAKE CARE OF GASOLINE

GRENADE GUARD GUIDE HALL HALF TRACK HALT HANDLE HAVE HEADQUARTER HELD HIGH HIGH EXPLOSIVE HIGHWAY HOLD HOSPITAL HOSTILE HOWITZER ILLUMINATE IMMEDIATELY IMPACT IMPORTANT IMPROVE INCLUDE INCREASE INDICATE INFANTRY INFILTRATE INITIAL INSTALL INSTALLATION INSTRUCT INTELLIGENCE INTENSE INTERCEPT INTERFERE INTERPRET INVESTIGATE INVOLVE IS ISLAND ISOLATE JUNGLE KILL KILOCYCLE

NI-MA-SI NI-DIH-DA-HI NAH-E-THLAI

POTATOES GUARD GUIDE

LHI-TA-A-TA HORSE ALL ALH-NIH-JAH-A-QUHE RACE TRACK TA-AKWAI-I HALT BET-SEEN HANDLE JO HAVE NA-HA-TAH-TA-BA-HOGAN HEADQUARTER WO-TAH-TA-EH-DAHN-OH HELD (PAST TENSE) WO-TAH HIGH BE-AL-DOH-BE-CA-BIH-DZIL-IGI POWERFUL SHELL WO-TAH-HO-NE-TEH HIGH WAY WO-TKANH HOLD A-ZEY-AL-IH PLACE OF MEDICINE A-NAH-NE-DZIN NOT FRIENDLY BE-EL-DON-TS-QUODI SHORT BIG GUN WO-CHI (I) SHIL-LOH (I) A-HE-DIS-GOH BA-HAS-TEH HO-DOL-ZHOND EL-TSOD HO-NALH BA-HAL-NEH TA-NEH-NAL-DAHI YE-GHA-NE-JEH BEH-ED-DE-DLID EHD-TNAH NAS-NIL NA-NE-TGIN HO-YA (I) DZEEL YEL-NA-ME-JAH AH-NILH-KHLAI AH-TAH-HA-NE NA-ALI-KA A-TAH SEIS SEIS-KEYAH BIH-TSA-NEL-KAD WOH-DI-CHIL NAZ-TSAID NAS-TSAID-A-KHA-AH-YEHHA-DILH NA-NISH (L) KAY-YAH TKA-GHIL-ZHOD AH-NA-GHAI DE-BE-YAZIE-HA-A-AH DAH-DE-YAH NISH-CLA-JIH-GOH BI-OH (L) DIL-KONH DA-A-HE-GI-ENEH BA-HAS-AH LIGHT UP IMMEDIATELY IMPACT IMPORTANT IMPROVE INCLUDE INCREASE TELL ABOUT INFANTRY WENT THROUGH BRAND INSTALL IN PLACE TEACH SMART STRENGTH INTERCEPT INTERFERE INTERPRET TRACK INVOLVOE SEVEN SEVEN ISLAND SEPERATE JUNGLE KILL KILL OIL GO AROUND

LABOR LAND LAUNCH LEADER LEAST LEAVE LEFT LESS LEVEL LIAISON LIMIT

LABOR LAND LAUNCH LEADER LAMB FEAST HE LEFT LEFT LESS LEVEL KNOW OTHER'S ACTION LIMIT

LITTER LOCATE LOSS MACHINE GUN MAGNETIC MANAGE MANEUVER MAP MAXIMUM MECHANIC MECHANIZED MEDICAL MEGACYCLE MERCHANT SHIP MESSAGE MILITARY MILLIMETER MINE MINIMUM MINUTE MISSION MISTAKE MOPPING MORE MORTAR MOTION MOTOR NATIVE NAVY NECESSARY NEGATIVE NET NEUTRAL NORMAL NOT NOTICE NOW NUMBER OBJECTIVE OBSERVE OBSTACLE OCCUPY OF OFFENSIVE ONCE ONLY OPERATE OPPORTUNITY OPPOSITION OR ORANGE ORDER ORDNANCE ORIGINATE OTHER OUT OVERLAY

NI-DAS-TON (L) A-KWE-EH UT-DIN A-KNAH-AS-DONIH NA-E-LAHI HASTNI-BEH-NA-HAI NA-NA-O-NALTH KAH-YA-NESH-CHAI BEL-DIL-KHON CHITI-A-NAYL-INIH CHIDI-DA-AH-HE-GONI A-ZAY MIL-AH-HEH-AH-DILH NA-EL-NEHI-TSIN-NA-AILH HANE-AL-NEH SILAGO-KEH-GOH NA-AS-TSO-SI-A-YE-DO-TISH HA-GADE BE-OH (M) AH-KHAY-EL-KIT-YAZZIE AL-NESHODI O-ZHI HA-TAO-DI THLA-NA-NAH BE-AL-DOH-CID-DA-HI NA-HOT-NAH CHIDE-BE-TSE-TSEN KA-HA-TENI TAL-KAH-SILAGO YE-NA-ZEHN DO-YA-SHO-DA NA-NES-DIZI DO-NEH-LINI DOH-A-TA-H-DAH NI-DAH-THAN-ZIE NE-DA-TAZI-THIN KUT BEH-BIH-KE-AS-CHINIGH BI-NE-YEI HAL-ZID DA-HO-DESH-ZHA YEEL-TSOD TOH-NI-TKAL-LO BIN-KIE-JINH-JIH-DEZ-JAY TA-LAI-DI TA-EI-TAY-A-YAH YE-NAHL-NISH ASH-GA-ALIN NE-HE-TSAH-JIH-SHIN EH-DO-DAH-GOH TCHIL-LHE-SOI BE-EH-HO-ZINI LEI-AZ-JAH DAS-TEH-DO LA-E-CIH CLO-DIH BE-KA-HAS-TSOZ

SCATTER SPOT LOSS RAPID FIRE GUN PICK UP MAN AGE MOVING AROUND MAP FILL TO TOP AUTO REPAIRMAN FIGHTING CARS MEDICINE MILLION GO AROUND MERCHANT SHIP MESSAGE MILITARY DOUBLE MOUSE MINE MINIMUM LITTLE HOUR MISSION MISS MOPPING MORE SITTING GUN MOTION CAR HEAD NATIVE SEA SOLDIER WANT NO GOOD NET NEUTRAL NORMAL NO TURKEY NO TURKEY ICE NOW WHAT'S WRITTEN GOAL OBSERVE OBSTACLE TAKEN OCEAN FISH OFFENSIVE ONCE ONLY WORK AT OPPORTUNITY OPPOSITION EITHER ORANGE ORDER UNDER GROUND BEGIN OTHER OUT SIDE OVERLAY

PARENTHESIS PARTICULAR PARTY PAY PENALIZE PERCENT PERIOD PERIODIC PERMIT PERSONNEL PHOTOGRAPH PILL BOX PINNED DOWN PLANE PLASMA POINT PONTOON POSITION POSSIBLE POST PREPARE PRESENT PREVIOUS PRIMARY PRIORITY PROBABLE PROBLEM PROCEED PROGRESS PROTECT PROVIDE PURPLE PYROTECHNIC QUESTION QUICK RADAR RAID RAILHEAD RAILROAD RALLYING RANGE RATE RATION RAVINE REACH READY REAR RECEIPT RECOMMEND RECONNAISSANCE RECONNOITER RECORD RED REEF REEMBARK REFIRE REGULATE REINFORCE RELIEF

ATSANH A-YO-AD-DO-NEH DA-SHA-JAH NA-ELI-YA TAH-NI-DES-TANH YAL DA-AHL-ZHIN DA-AL-ZHIN-THIN-MOASI GOS-SHI-E DA-NE-LEI BEH-CHI-MA-HAD-NIL BI-SO-DIH-DOT-SAHI-BI-TSAH BIL-DAH-HAS-TANH-YA TSIDI DIL-DI-GHILI BE-SO-DE-DEZ-AHE TKOSH-JAH-DA-NA-ELT BILH-HAS-AHN TA-HA-AH-TAY SAH-DEI HASH-TAY-HO-DIT-NE KUT BIH-TSE-DIH ALTSEH-NAN-DAY-HI-GIH HANE-PESODI DA-TSI NA-NISH-TSOH NAY-NIH-JIH NAH-SAI AH-CHANH YIS-NIL DINL-CHI COH-NA-CHANH AH-JAH SHIL-LOH ESAT-TSANH (R) DEZJAY A-DE-GEH-HI KONH-NA-AL-BANSI-BI-THIN A-LAH-NA-O-GLALIH AN-ZAH GAH-EH-YAHN NA-A-JAH CHUSH-KA (R) IL-DAY (R) KUT (R) BE-KA-DENH (R) SHOZ-TEH CHE-HO-TAI-TAHN HA-A-CIDI TA-HA-NE-AL-YA GAH-AH-NAH-KLOLI LI-CHI TSA-ZHIN EH-NA-COH NA-NA-COH NA-YEL-N NAL-DZIL AGANH-TOL-JAY

RIB PARTICULAR PARTY PAY SET BACK MONEY PERIOD PERIOD ICE CAT PERMIT MEMBER PHOTOGRAPH SICK PIG BOX PINNED DOWN BIRD PLASMA PIG POINT FLOATING BARREL POSITION POSSIBLE POST PREPARE PRESENT PREVIOUS 1ST POSTION PRIORITY PROBABLE BIG JOB GO PROGRESS SELF DEFENSE PROVIDE PURPLE FANCY FIRE EAR QUICK LISTEN RAID SHIPPING POINT RAILROAD GATHERING DISTANCE RABBIT ATE RATION RAVINE REACH READY REAR RECEIPT RECOMMEND INSPECTOR MAKE SURE R-E-ROPE RED BLACK ROCK GO IN REFIRE REGULATE REINFORCE RELIEF

RELIEVE REORGANIZE REPLACEMENT REPORT REPRESENTATIVE REQUEST RESERVE RESTRICT RETIRE RETREAT RETURN REVEAL REVERT REVETMENT RIDGE RIFLEMAN RIVER ROBOT BOMB ROCKET ROLL ROUND ROUTE RUNNER SABOTAGE SABOTEUR SAILOR SALVAGE SAT SCARLET, RED SCHEDULE SCOUT SCREEN SEAMAN SECRET SECTOR SECURE SEIZE SELECT SEMI COLON SET SHACKLE SHELL SHORE SHORT SIDE SIGHT SIGNAL SIMPLEX SIT SITUATE SMOKE SNIPER SPACE SPECIAL SPEED SPORADIC SPOTTER SPRAY SQUADRON STORM

NAH-JIH-CO-NAL-YA HA-DIT-ZAH NI-NA-DO-NIL WHO-NEH TKA-NAZ-NILI JO-KAYED-GOH HESH-J-E BA-HO-CHINI AH-HOS-TEEND JI-DIN-NES-CHANH NA-DZAH WHO-NEH (L) NA-SI-YIZ BA-NAS-CLA (R) GAH-GHIL-KEID BE-AL-DO-HOSTEEN TOH-YIL-KAL A-YE-SHI-NA-TAH-IH LESZ-YIL-BESHI YEH-MAS NAZ-PAS (R) GAH-BIH-TKEEN NIH-DZID-TEIH A-TKEL-YAH A-TKEL-EL-INI CHA-LE-GAI NA-HAS-GLAH BIH-LA-SANA-CID-DA-HI LHE-CHI (S & R) BEH-EH-HO-ZINI HA-A-SID-AL-SIZI-GIH BESH-NA-NES-DIZI TKAL-KAH-DINEH-IH BAH-HAS-TKIH YOEHI (S) YE-DZHE-AL-TSISI YEEL-STOD BE-TAH-HAS-GLA DA-AHL-ZHIN-BI-TSA-NA-DAHL DZEH-CID-DA-HI DI-BAH-NESH-GOHZ BE-AL-DOH-BE-CA TAH-BAHN (S) BOSH-KEESH BOSH-KEESH YE-EL-TSANH NA-EH-EH-GISH ALAH-IH-NE-TIH TKIN-CID-DA-HI A-HO-TAY LIT OH-BEHI BE-TKAH E-YIH-SIH YO-ZONS AH-NA-HO-NEIL EEL-TSAY-I KLESH-SO-DILZIN NAH-GHIZI NE-OL

REMOVE REORGANIZE REPLACEMENT GOT WORD TRIPLE MEN ASK FOR RESERVE RESTRICT RETIRE RETREAT CAME BACK REVEAL TURN ABOUT CORNER RABBIT RIDGE RIFLEMEN MUCH WATER EGG FLY SAND BOIL ROLL ROUND RABBIT TRAIL RUNNER HINDERED TROUBLE MAKER WHITE CAPS PICK THEM UP APPLE SITTING RED SCHEDULE SHORT RACOON SCREEN SEAMAN SECRET SECTOR SMALL SECURITY SEIZE TOOK OUT DOT DROP ELK SITTING SHACKLE SHELL SHORE SHORT SIDE SEEN BY SIGNS INNER WIRE ICE SITTING (S) SITUATE SMOKE PICK 'EM OFF BETWEEN MAIN THING SWIFT MOTION NOW AND THEN SPOTTER SNAKE PRAY SQUASH STORM

STRAFF NA-WO-GHI-GOID STRAGGLER CHY-NE-DE-DAHE STRATEGY NA-HA-TAH (S) STREAM TOH-NI-LIH STRENGTH DZHEL STRETCH DESZ-TSOOD STRIKE NAY-DAL-GHAL STRIP HA-TIH-JAH STUBBORN NIL-TA SUBJECT NA-NISH-YAZZIE SUBMERGE TKAL-CLA-YI-YAH SUBMIT A-NIH-LEH SUBORDINATE AL-KHI-NAL-DZL SUCCEED YAH-TAY-GO-E-ELAH SUCCESS UT-ZAH SUCCESSFUL UT-ZAH-HA-DEZ-BIN SUCCESSIVE UT-ZAH-SID SUCH YIS-CLEH SUFFER TO-HO-NE SUMMARY SHIN-GO-BAH SUPPLEMENTARY TKA-GO-NE-NAN-DEY-HE SUPPLY NAL-YEH-HI SUPPLY SHIP NALGA-HI-TSIN-NAH-AILH SUPPORT BA-AH-HOT-GLI SURRENDER NE-NA-CHA SURROUND NAZ-PAS (S) SURVIVE YIS-DA-YA SYSTEM DI-BA-TSA-AS-ZHI-BI-TSIN TACTICAL TAKE TANK TANK DESTROYER TARGET TASK TEAM TERRACE TERRAIN TERRITORY THAT THE THEIR THEREAFTER THESE THEY THIS TOGETHER TORPEDO TOTAL TRACER TRAFFIC DIAGRAM TRAIN TRANSPORTATION TRENCH TRIPLE TROOP TRUCK TYPE UNDER UNIDENTIFIED E-CHIHN GAH-TAHN CHAY-DA-GAHI CHAY-DA-GAHI-NAIL-TSAIDI WOL-DONI TAZI-NA-EH-DIL-KID DEH-NA-AS-TSO-SI ALI-KHI-HO-NE-OHA (T) TASHI-NA-HAL-THIN KA-YAH (T) TAZI-CHA CHA-GEE BIH TA-ZI-KWA-I-BE-KA-DI CHA-GI-O-EH CHA-GEE (Y) DI TA-BILH LO-BE-CA TA-AL-SO BEH-NA-AL-KAH-HI HANE-BA-NA-AS-DZOH COH-NAI-ALI-BAHN-SI A-HAH-DA-A-CHA E-GADE TKA-IH NAL-DEH-HI CHIDO-TSO ALTH-AH-A-TEH BI-YAH DO-BAY-HOSEN-E

HOE STRAGGLER STRATEGY RUNNING WATER STRENGTH STRETCH STRIKE STRIP STUBBORN SMALL JOB WENT UNDER WATER SEND HELPING EACH OTHER MAKE GOOD IT IS DONE IT IS DONE WELL SUCCESS SCAR SOX SUFFER SUMMER MARY 3RD POSITION SUPPLY SUPPLY SHIP DEPEND SURRENDER SURROUND SURVIVE SYSTEM TACTICAL TAKE TORTOISE TORTOISE KILLER TARGET TURKEY ASK TEA MOUSE TERRACE TURKEY RAIN TERRITORY TURKEY HAT BLUE-JAY THEIR TURKEY HERE AFTER THE SEE THE Y THE TOGETHER FISH SHELL TOTAL TRACER DIAGRAM STORY LINE TRAIN TRANSPORTATION TRENCH TRIPLE TROOP BIG AUTO TYPE UNDER UNIDENTIFIED

UNIT UNSHACKLE UNTIL VICINITY VILLAGE VISIBILITY VITAL WARNING WAS WATER WAVE WEAPON WELL WHEN WHERE WHICH WILL WIRE WITH WITHIN WITHOUT WOOD WOUND YARD ZONE

DA-AZ-JAH (U) NO-DA-EH-NESH-GOHZ UH-QUO-HO NA-HOS-AH-GIH CHAH-HO-OH-LHAN-IH NAY-ES-TEE TA-EH-YE-SY BILH-HE-NEH (W) NE-TEH TKOH YILH-KOLH BEH-DAH-A-HI-JIH-GANI TO-HA-HA-DLAY GLOE-EH-NA-AH-WO-HAI GLOE-IH-QUI-AH GLOE-IH-A-HSI-TLON GLOE-IH-DOT-SAHI BESH-TSOSIE BILH (W) BILH-BIGIH TA-GAID CHIZ CAH-DA-KHI A-DEL-TAHL BIH-NA-HAS-DZOH

UNIT UNSHACKLE UNTIL THERE ABOUT MANY SHELTER VISIBILITY VITAL WARNING WAS WATER WAVE FIGHTING WEAPON WELL WEASEL HEN WEASEL HERE WEASEL TIED TOGETHER SICK WEASEL SMALL WIRE WITH WITH IN WITHOUT FIRE WOOD WOUND YARD ZONE

What are Codes?


Throughout history, world events have changed because of secret messages. Secrets that were kept and secrets that were not. In the world of diplomacy, knowing what your enemy is planning helps you to prepare. But it is also important that your enemies do not know what you have planned. It is the mission of the NATIONAL SECURITY AGENCY (NSA) and the CENTRAL SECURITY SERVICE (CSS) to learn what it can about its potential enemies and to protect America's government communications. In this section, learn about the differences between codes and ciphers, how to make secret ciphers, and what to look for when trying to break a cipher. What Are Codes? Although most people think of codes as being secret messages, codes are really any symbol or signal used to represent, or communicate, something else. Any word could be considered a codeword. The code word given to a four-legged furry creature that barks are the letters D, O, G. Because you know that those three letters represent a real dog, you understand the code!

Sometimes, however, it is important that only a few people understand the message. In the world of cryptology, codes are used to make messages secret by changing the words into something else. But, in order for your friends to understand the coded message, they need the key! If your friends have the key, and your enemies do not, your messages become secret. How well you've created your code and key will determine how long your message stays a secret from others. Creating a Dictionary Code Dictionary Codes have been used for centuries. They can be quite confusing to anyone who doesn't know the system - which makes them great for sending secret messages! DIRECTIONS: Use a dictionary or any book with a lot of different words. 1. Write down your message in English, this is called "plaintext." Example: YOU CAN CREATE YOUR OWN CODED MESSAGE. 2. Find the first word in your dictionary or book. 3. Write down the page number, column or paragraph number, and the Nth word down that column or into that paragraph. Example: YOU = Page 1454, Column 1, 24th word down. 4. Separate the numbers by a period. YOU=1454.1.24 5. Repeat Steps 2-4 for every word in your sentence. YOU = 1454.1.24 CAN = 178.1.35 CREATE = 293.1.29 YOUR = 1454.2.2 OWN = 887.1.16 CODED = 239.2.2D MESSAGE = 778.2.20 6. In some cases, you may have to add a prefix or suffix to the numbers. CODED = 239.2.2D 7. The finished cipher should look like the cipher below. 1454.1.24 178.1.35 293.1.29 1454.2.2 887.1.16 239.2.2D 778.2.20 Remember to leave a space between each group of numbers. CONGRATULATIONS! You have created your very first code!

What is a Cipher?

A cipher is a way to make a word or message secret by changing or rearranging the letters in the message. (A code affects the word, not the individual letters.) One type of cipher, called a TRANSPOSITION CIPHER, is created by simply rearranging the letters in the word itself. For example, CHYPRAGTOPRY can be unscrambled to reveal the word CRYPTOGRAPHY. Another cipher, the SUBSTITUTION CIPHER, is a bit harder. It involves changing the letters of your message into something else: other letters, numbers, or symbols. Using a substitution cipher, the word CRYPTOGRAPHY might look like this: DOHQMRZOFQYH. In this example C=D, R=O, Y=H, and so on. For your friends to understand the message, they must know your system. In our substitution cipher, your friend would need to know the KEY, or how the system is set up (a=f, etc.). If only you and your friend have the key, then it is very difficult for others to read your message.

Make A Cipher: The Key


How to Encrypt a Key Cipher Step 1 Choose a word to be your KEY word. Make sure the word you select has at least five or six letters in it and has no repeating letters. For example the word APPLE will not work with this cipher because there are two P's in the word. In our example, we will use the word MAPLE for our key. Step 2 Write the Key word on a piece of paper. Leave a little bit of space between each letter as you write down each letter of your Key. Next, draw a column under each letter of the Key word. Step 3 Fill in the columns by writing your PLAINTEXT message one letter at a time. Any empty spaces should be filled in with a NULL. A NULL is usually represented by the letter X. Step 4 Rewrite the columns so that the letters in your Key word are in alphabetical order. In our example, the word MAPLE will be rearranged to read AELMP. Step 5

To see your encrypted message, copy the letters in each column from top to bottom, but DO NOT include the letters in the Key word. CONGRATULATIONS! You have successfully created a KEY CIPHER! How to Decrypt a Key Cipher Step 1 Find out what the KEY word is from the person who sent you the message. Write the letters from the Key word in alphabetical order on a piece of paper. Draw a column under each letter of the Key word. Step 2 Starting under the letter A and writing from left to right, fill in the grid with the letters from the ciphertext. Step 3 Once the grid is filled in, rearrange the columns so the Key word is spelled out correctly. Reading from left to right, you should be able to see the plaintext message. CONGRATULATIONS! You have successfully deciphered a KEY CIPHER!

Solving Cryptograms: Approximate number of times this letter occurs in 100 letters. Since no fractions are used, several groups of frequency numbers appear to be identical. They are not. Each letter occurs less often than the letter above it. -1-2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18-19-20-21-22-23-24-25-26E T A O N R I S H D L F C M U G Y P W B V K X J Q Z 13 10 08 08 07 07 06 06 05 04 03 03 03 03 02 02 02 02 less than two, in this order

Most common letters in the English language is E. T is the 2nd most frequently used letter. The nine most frequent letters used are: E, T, A, O, N, R, I, S, H. When breaking a cryptogram count how many times each letter is used. Using a table of frequencies, you can guess many of the letters. Example: after you have used a frequency chart you have found that B is the most common letter in the cryptogram, and L is the second most common letter. You have a word LKB. Knowing that B was the most used letter B is probably E. The second most used letter is L and knowing that T is the second most used letter it is likely that L = T. Now you have a three letter word that begins with T and ends with E using the frequencies chart the word is most likely THE. Copy cipher onto another piece of paper or photo copy it. Use pen for message and pencil to decode. Make a frequency table, list all symbols or letters and keep track of amount of times tey occur in coded message.

Creative ways to help hide ciphers: Arrange words into groups, as example, of five (5). The average length of a word in the English language is 4 or 5 letters. Add Null to words, meaningless letters to pad out the 5 letter words. Nulls should not spell anything. NULLS can be used in any cipher. Dont use spaces or punctuation. Dont use an under sheet that can retain the impression of your writing. Use lined or graph paper, helps keep things straight or in a grid. Destroy waste paper carefully Combine several types of codes together to create ciphers. Hide ciphers and codes in normal seaming letters and notes.

Messages are best if they are at least 50 letters long.

Common English words in order of use: The Of And To A In That Is I It For As With Was His He Be Not By But Have You Which Are On Or Her Had At From This My They All Their An She Has Were Me Been Him One So If Will There Who Who No

Two letter combinations in order of use: TH IN ER RE AN RA RO LI RI IO

HE AR EN TI TE AT ON HA OU IT ES ST OR NT HI EA VE CO DE

LE ND MA SE AL IC FO IL NE LA TA EL ME EC IS DI SI CA

Most Frequently Used Two letter Words: Of To In It Is

Be As At So We He By Or On Do If Me My Up An

Three letter combinations in order of use: THE ING AND ION ENT FOR TIO ERE HER ATE VER TER THA ATI HAT ERS HIS RES ILL ARE CON NCE ALL EVE ITH TED AIN EST MAN RED THI IVE REA WIT ONS ESS AVE PER ECT ONE

Most Frequently used three letter words: The And For Are But Not Had Her Was One Our Out You All Any Can Day Get Has Him

Most Frequently used four letter words: That With Have This Will Your From They Know Want Been Good Much Some

Time Very When Come Here Just

Most Frequently Used First Letter: T, O, A, W, B, C, D, S, F, M, R, H, I, Y, E, G, L, N, P, U, J, K

Most frequently Used Last Letters: E, S, T, D, N, R, Y, F, L, O, G, H, A, M, P, U, W

Most Common Double Letters: SS, EE, TT, FF, LL, MM, OO

You might also like