The most complex code in the world. How to decrypt the secret code

Falcon Travis

TRANSLATION FROM ENGLISH LAKHMAKOV V.L.

CODES AND CIPHERS

super spy

Secrets of codes and ciphers

Foreword

During the Second World War, Falcon Travis served in the military intelligence unit, whose task was to intercept, decode and decrypt various kinds of messages, determine the locations of those who sent and received such messages.
The reader is given a unique opportunity to enjoy compiling and exchanging messages with friends that no one will understand except you and your friends.
You can learn from this book all about polyalphabetic ciphers, code grids, symbols, acrostics, invisible ink and special code words "Owl" and "Hawk" ("Owl" and "Hawk")
The book gives in an entertaining way moments of organizing games and competitions using codes and ciphers, as well as special chapters that tell in a fun way how to become a codebreaker. In short, here you will learn what will help you become a super spy!
The characters and situations described in this book are only the product of the author's imagination and have nothing to do with any real person or event.
Any coincidence is the fruit of pure chance.

Translation from English
V.L. Lakhmakova

Copyright © V.L. Lakhmakov, 2013

Chapters: Pages:

Preface 1
1. About codes and ciphers 2 - 4
2. Moving ciphers 5 - 13
3 Big move 14 - 23
4. Simple substitution ciphers 23 - 34
5. Large substitution ciphers 34 - 40
6. Ciphers - characters 40 - 44
7. Hidden codes and ciphers 45 - 51
8. Attempts to break the code 51 - 55
9. Codes in games and competitions 55 - 61
10. Invisible ink 62 - 69

Chapter 1
About codes and ciphers

On a cold January morning in 1975, headlines announced the death of the secret code. “Writing kills code!” one newspaper loudly declared. The story under this heading spoke of a radio and television interview with a certain person who was very informed at that time in these matters. During the interview, a long letter was read, which had previously been radioed in secret cipher to an agent in London. "A free gift to the cryptographer's listening world!" the article shouted, implying that the radio interceptors were able to intercept the message thus sent to London by radio and it was later voiced in full decrypted form during the interview. Apparently, however, in itself this message-letter was not of particular interest for its content to the interceptor decryptors, but they learned enough from it about the secret cipher with which the contents of the letter were hidden, so that using this cipher a second time would be extremely not safe. From all that was said, it followed that the letter actually "killed" the secret code. This morning's newspaper news in January highlighted the serious problem of codes and ciphers. The so-called "invisible ink" also has its own problem, if only because of the long association with spies of all stripes. And therefore they have a kind of rather serious approach and attitude towards themselves. However, the codes, ciphers and invisible ink described in our book below are not given in such a serious association, but in a lighter one - just for fun. Codes and ciphers (it must be borne in mind that a cipher is very different from a code) vary greatly in their types and degrees of secrecy, in order to be suitable for various uses - exchanging secret messages with friends, searching for and hiding treasures, in preserving one's own of one's own secrets, and in many other cases, especially in the widespread outdoor games called "wide games" by scouts, in which invisible writing can be used to heighten the sense of pleasure, excitement and mystery. Some of the codes and ciphers that we are talking about here will not be a discovery for those who already know about the science of cryptography, but some may be first encountered in this book. Here we can include invisible ink, and in particular on a non-chemical basis. Some of the ciphers (of which there are about fifty types and at least half of their variations) are so simple that they are hardly a secret at all, but they can also be very puzzling, adding an element of rally to short-term games or gaming activities, or sometimes and similar long-term activities. Invisible ink, in particular of a non-chemical kind and also developed by non-chemical methods, can serve the same purpose of entertainment. On the other hand, there are also ciphers that are so secure in their cryptography that even an experienced decryptor will take quite a long time to open (break) it, without an encryption key.
For the purpose of explaining in detail some of the terms used in cryptography, let's follow the procedure leading up to the emergence of a letter/message like that outlined in that January note.
At first the message had to be written in common language (called "plain language" or "pure"); it is then handed over to a cryptographer who must change the "plain language" of the letter into an encrypted one, called "encryption" or "encryption" if any code is used. is a cipher alphabet, i.e. a method of manual or machine encryption of ordinary language letters. The result of encryption or encoding is called a cryptogram. After that, the radio operator radioed it in Morse code to the destination, where his cryptographer, using an identical key, decrypted, or (in the case of encoding) decoded the message into an understandable "plain language".
The word "code" is usually used to mean both a code and a cipher, but in cryptography there is a difference between the two, and a very significant one.
The cipher is based on the alphabet of the ordinary language, just like the Morse code. A message communicated in Morse code (which is not really a secret cipher) must be spelled out. The same goes for the secret cipher.
The code is more like a phrase book, where sentences, phrases, individual words, and numbers are represented by groups of letters of the same length, usually no more than 3, 4, or 5 letters per group. For example, "AMZ" can stand instead of "YES", and "QTR" instead of "10000", and "GYX" instead of "We don't have enough fuel." A code is much harder to break than a cipher because, unlike a cipher, it is not based on the alphabet of a language you know, and is much faster to operate. However, the main advantage of a cipher is that any form of expression can be encrypted. While in the code, composed words, numbers and vocabulary groups (groups of words) can be encoded, although most codes do include individual alphabets. Codes are usually compiled for the convenience of their use by any user. For example, a Navy (Navy) code would consist primarily of nautical terms and phrases, while a code used in commercial activities would primarily consist of so-called "business phrases". Commercial codes are used less to keep secrets than to save money, because. telegraph companies receive the words, but a code group consisting of a number of words often carries only one word load.
In everyday life, two main classes of ciphers are used: substitution ciphers and transposition ciphers.
In the first case, an ordinary letter is replaced by various letters or a letter, or numbers or symbols.
In the second case, the ordinary letters remain ordinary, but they are mixed in a taxonomy that obscures their original meaning.
In some mixed systems, it is necessary to add letters that do not carry a semantic load in this particular case, to complicate the completion of the message. Such letters are called "zeros" by professionals. A message closed in cipher is not interrupted by punctuation marks. Any punctuation, especially a question mark, helps someone else's decoder to easily break your cipher. In cryptography, there are no authorities responsible for standardizing the terms used, which explains why there are so many different terms here that denote the same objects or concepts. There are also ciphers under several different names, while there are others that do not have them at all. In this book, all the ciphers we encounter, both unnamed and named, once had their own names, sometimes even for the sake of simple reference to them.
Other terms will be explained as they appear, and some of the explanations given earlier will be repeated by us to develop your skill in using them.

Chapter 2
Moving ciphers

This type of cipher, and any other cipher that quite easily makes messages secret by systematically shifting or otherwise "placing in disorder (mixing) genuine letters" instead of changing them into symbols, numbers or other letters, is called a transpositional cipher. Some of them are so simple that they are hardly a secret at all, while others keep their secret even from fairly experienced decoders for months. There are also a number of transpositional ciphers - abbreviated as "transpos". If necessary, the message can be accompanied by a predetermined code word or letter (called an “indicator”) to tell your correspondent what cipher this particular message is closed with. Of course, you can agree on the exchange of messages without "indicators", just for the sake of pleasure, unravel the encryption yourself.
If, in the case of using very simple ciphers in this first group, the message does not seem to be secret enough, then you will probably find that another cipher gives that particular message more security.
When we start translating any message into "transpo", the first thing to do is to write out the usual message in blocks of capital letters. This will greatly facilitate the encryption process and help you keep a copy of what you actually encrypted.
Consider several ciphers of the above category:

Random Partitioning Cipher
The letters of the message remain in their original order, but are rearranged in such a way as to mask the words. Can you decipher the message below? It is the same as the message used for most of the following ciphers:
W EN OWME E TINO URS HED

CODE OF PERMUTATION OF WORDS. CIPHER "r e v"
The words of the epistle remain in their original order, but each is spelled in reverse order:
EW WON TEEM NI RUO DEHS

COMPLETE PERMUTATION CIPHER. CODE "r e v"
The whole message is written by the permutation method, word by word:
DEHS RUO NI TEEM WON EW
Random permutation code.
Like the full permutation cipher, the message is written using the full permutation method, but instead of distributing the words in the usual, normal way, you change this order in a way that will mislead anyone to whom the message is not intended to be misleading. Such a cipher is really a RANDOM PERMUTATION CIPHRE, but it is more secure:
DEHS RUO NITE EMWO NEW

CODE OF PERMUTABLE GROUPS. CIPHER "r e v"
In such ciphers, the entire message is written by the method of permutation, from the last letter to the first, then divided into groups of the same number of letters: 3,4 or 5.
In ciphers as simple as this kind, there is usually a choice of letter grouping, as one way of grouping the letters of a message can often provide a greater degree of secrecy than another.
(1.) TRIPLE TRANSFER CIPHER
First of all, write out your message and count the number of letters it contains. If this number is not divisible by 3, add "zeros" until you get such a number. These "zeroes" must be added to the end of the regular message, and then they will appear at the beginning of the encryption, where they will not interfere with your decryptor of this message. It is also necessary to provide for choosing "zeros" that cannot be perceived as part of the message. Then, write down the message using the permutation method, in 3 letter groups. Deciphering starts from the end, and either is read word by word and written down, or the whole message is written down at once, and only then is divided into words using the step-by-step recording method.
(2.) QUARTER TRANSFER CIPHER
The encryption and decryption procedures are the same as for (1), except that the number of letters in the message must be divisible by 4, with the addition of "zeros" if necessary. Then, the message is written in 4 letter groups.

(3.) FIVE TRANSFER CIPHER
The same as the above methods (1) and (2), but in this case the message is divided into 5 letter groups, with the addition, if necessary, of "zeros".
Here is the usual, simple message:
WE NOW MEET IN OUR SHED
Here is the process of encrypting it:
(1) Triple permutation cipher: DEH SRU ONI TEE MWO NEW
(6 groups)
(2) Quadruple permutation cipher: QJDE HSRU ONIT EEMW ONEW (5 groups)
(3) Five permutation cipher: YZDEH SRUON ITEEM WONEW (4 groups)

CODE OF THE UPCOMING "ZERO"
Divide your simple message into 3 letter groups. If there are not enough letters in the last group, add "zeros". Please note that such meaningless letters of the cipher would not be mistakenly perceived by the addressee as part of your message. Then add any letter of the alphabet to the beginning of each 3-letter group:
OWEN BOWM FEET LINO FURS AHED
Your decoder will simply cross out the first letter in each group and read the message. The step-by-step division of words greatly facilitates reading.
CODE OF THE SUBSEQUENT "ZERO"
The method is the same as in the Cipher of the upcoming "zero", except that a special letter is located at the end of each 3-letter group, but remember to first add "zeros" to the last group, if necessary, to get 3 letter group:
WENT OWME EETH INOS URST HEDZ
Decryption is done by crossing out the last letter in each group.
CODES "A - ZERO" and "ZERO - A"
(1) Code "A-Null": "null" is added after each letter of the message. Zeros can be any letter of the alphabet. In this cipher, the ciphered message is always twice the length of the original message, so it is more suitable for short messages.
To decrypt, you just need to cross out all the "zeros", and you will receive the message intended for you. You need to start by crossing out every second letter of the message, and then every alternating letter at the end.
(2) Null-A cipher: This cipher is used in the same way as A-Null, but in this case the "zeroes" are placed before the letters of the message instead of after them.
Here is an example of a simple message: WE ARE GOING TODAY
(1) Code "A-Null": WREN AGREES GOOGISNOGY TROMDRAVYS
(2) Null-A code: AWLE FAIRIE OGNORILNIG STROPDRAKY

CODE OF ADDITIONS TO THE VOYAL. CODE "VOWEL-PLUS"
After each vowel and letter Y, add any letter except a vowel or Y. To decipher, cross out the letter following each vowel and Y, the message will be read as intended. Simple message:
I AM NOT GOING TO CAMP SO YOU MAY HAVE MY SLEEPING BAG The same message in this cipher:
IS ARM NOWT GOGIGNG TOP CASMP SON YKOLUM MAPYK HALVED MYG SLBEMPIRNGBANG

CODE "SANDWICH"
Write a simple message - a message. Count the number of letters and split the message in half using step-by-step writing. If the message has an odd number of letters, then let the first half contain an additional letter. Then, write out the first half of the message with enough space between the letters to add another letter. Now, in the first gap, enter the first letter of the second half, then in the second gap - the second letter from there and so on until the entire second half fills the "sandwich" of the first half. Encryption can be composed in one long string of letters, or divided into groups of the same or random length. Here is the encryption, where the first letter of the second part is added:
WE NOW MEET \ IN OUR SHED
WIEN O W ME E T

To decipher, read the first and each subsequent letter to the end of the line, then the second and each subsequent letter to the end of the line; or write the letters in the order given, and separate the words with a "step-by-step" bar.

JUMBLING CYFER
This cipher assumes the presence of an odd number of letters. First, write down your message, count the number of letters, and add "zero" if necessary. Start by writing the first letter in the middle of the line, the next letter to the left of the first, the next to the right of the first, and so on, substituting the letters alternately on the right and left, until your message is complete. Let's give an example with the first 9 letters of the alphabet: H,F,D,B,A,C,E,G,I and a sample message encrypted in this way: DHROIEMOEWNWETNUSEQ
Such an encryption may be sent as a whole, or in groups of letters, so far as such an order allows the preservation of the same letters. To decipher, find the middle letter and read the message, one letter at a time, alternating the order: left - right, left - right to the end.

CIPHER "ZIGZAG"
This cipher is also known as "Palisade" and is said to have been used during the American Civil War.
Write a message, then count the number of letters it contains. If this number is not divisible by 4, add "zeros" as indicated in (A) (see page 10). Then write the message without spaces between words and with each alternating letter below the line, as in (B). Now you are ready to write a message for its subsequent forwarding. On the sheet of paper chosen for the message, start writing the top line of 4 letter groups, and continue writing, combining lines, as in (B). Deciphering such a message is simple. First of all, count the number of letters in the received message, and mark half with a thick dot or a slash. Then write in one line all the letters of the first half of the message, leaving enough space between the letters to allow another letter to be inserted. In these spaces, write the letters of the second half of the message, inserting the first letter in the next gap, etc. to the end, as indicated in (D) , showing half done decryption:
(A) WE NOW MEET IN OUR SHED QZ

(B) W N W E T N U S E Q
E O M E I O R H D Z

(B) WNWE TNUS EQ.EO MEIO RHDZ

(D) WE / NOW / MEET / IN U S E Q
E O M E I O R H D Z

CODE "SOVA" ("OWL")

Write your message without leaving spaces between words, but on top, above it, repeat the word "OWL" for the entire length of the line, and only once write vertically from top to bottom on one side, as shown. The last word on the top line "OWL" must be complete and have the letters of the message underneath. This means that the message must be divisible by 3, even with "zeros" if necessary. Then each letter of the message is thrown into a row having the same letter that stands above it. This divides the message into three rows, which are then written out one after the other, forming a ciphered message.
The grouping is different. There is an element of chance here. The decoder, knowing for sure that the cipher “OWL” is used in the message, first counts the number of letters in the message, delimits it into 3 equal parts, and gives each part one letter of the keyword. Then he writes out a series of "OWL" - words sufficient to cover the entire message (1), and then under the letters "O" he writes all the letters related to the letters of the "O" group.
(1) OWLOWLOWLOWLOWLOWL (2) O W O E I U H
WENOWMEET I NOUR SHED W E W E N R E . L N M T O S D

(3) WOEI UHE WENR EN MTOSD
After that, he sequentially enters two other groups (2) and the message becomes deciphered and suitable for reading. Here his work is almost complete:
1) OWLOWLOWLOWLOWLOWL 2) O W L

WE OW EE I N U R HE WOEI UH E WENR E N MTOSD

CODE "HAWK" ("HAWK") and "RAVEN" ("RAVEN")

These ciphers are similar to the OWL cipher, but the messages are grouped into 4 5 parts respectively. They work like this:
HAWKHAWKHAWKHAWKHAWK RAVE N RAVENRAVENRAVEN
WENOWMEET I NO U RS HED QZ WENOWME ET INOURSH EDQZ
H W W T U E R W M N H
A E M I R D A E E O E
W N E N S Q V N E U D
K O E O H Z E O T R Q
N W I S Z
WWTUE EMIRD NENSQ OEOHZ
WMNH EEQE NEUD OTRQ WISZ

Decryption is carried out in the same way as in the case of the SOVA cipher.

CODE "MARG"
These lightweight ciphers are more secure than any of the above. So, write your message in capital letters and leave room at the bottom for another row of capital letters. After that, using oblique lines, divide the message into groups, according to the cipher you use (3,4,5). If the last group does not have enough letters, add "zeros".
The following examples show how to encrypt:
(a) - shows the message written and separated by oblique lines
(b) - shows encrypted individual groups, permutation methods
(c) - shows how the encrypted message is written to be sent
(d) shows another way of writing the same message.
Random grouping always makes such a cipher look more secret. It may help the decoder that you leave space below the lines of your message.
CODE "BI-MARG"
The message is divided into two-letter groups:
(a) WE \ NO \ W M \ EE \ T I \ N O \ UR \ SH \ ED \
(b) EW \ ON \ M W\ EE \ I T \ O N \ RU \ HS \ DE \

encrypted message:
(c) EW ON MW EE IT ON RU HS DE
(d) EWON MWEE ITO NR UHSDE

CODE "TRI-MARG"
The message is divided into three-letter groups:
(a) WE N/ OW M / EET / IN O / UR S / HED
(b) NE W/ MWO / TEE / ON I / SR U / DEH

encrypted message:
(c) NEW MWO TEE ONI SRU DEH
(d) NE WMW OTE EONIS RUD EH

CODE "QUAD - MARG"
The message is divided into four-letter groups:
(a) WE NO / W MEE / T IN O / UR SH / EDQZ
(b) ON EW / E EMW / O NI T / HS RU / ZODE

encrypted message:
(c) ONEW EEMW ONIT HSRU ZQDE
(d) ONE WEEM WON ITHS RUZ QDE

CODE "QUIN-MARG"
The message is divided into five-letter groups:
(a) WE NOW / MEET I / N OUR S / HEDQZ
(b) WO NEW / ITEE M/ S RUO N/ ZQDEH

encrypted message:
(c) WONEW ITEEM SRUON ZQDEH
(d) WO NEWIT EEMS RUONZ QDEH

CODE "VARI-MARG"
The message is divided into random groups:
(a) WE NO / W ME / ET / IN OU / R SHED
(b) ON EW / E MW/ TE / UO IN / D EHSR
encrypted message:
(c) ONEW EMW TE UONI DEHSR

To decrypt, simply divide the message into groups according to which the encryption is going on, and below each group write the same letters using the permutation method. In this case, the message will open itself.
CIPHER "TWISTED COMMUNICATION"
Write down your message, then rewrite it in groups of 3, 4 or 5 letters. Add "zeros" if necessary to complete the last group. Below we give some examples:
(a) WEN OWM EET INO URS HED
(b) WENO WMEE TINO URSH EDQZ
(c) WENOW MEETI NOURS HEDQZ

Then place the two end letters between the groups, as shown in the following example, and write the result as a cipher message:
(a) WEO NWE MEI TNU ORH SED
(b) WENW OMET EINU ORSE HDQZ
(c) WENOM WEETN IOURH SEDQZ
Decryption is carried out by moving the final letters between groups. "Twisted connection" (c) - perhaps the most secret to keep your particular message from prying eyes.

big move
"SCYTALE"

Scytale - a cylindrical bar, is the earliest of the mechanical means of encryption described in history - the first encryption "machine". As a scytale, you can use a pencil, or similar, but thicker and longer, but not more than 20 cm in length, or just a tube of any length, but the same diameter agreed with your addressee. Then you will need a long strip of paper no more than 2 centimeters wide. Blank margins of a newspaper sheet, or a long strip from a double page of any magazine, may work. What is the process of working with scytale ?
Start by fixing the beginning of the paper tape on the beginning of the wand, using a button or rubber band. Now wind this tape in a spiral around the “rod” so that each next turn covers almost half the width of the previous turn and fix the end of the tape with a button, rubber band or similar. The easiest way to evenly wind the tape is to secure the beginning of the tape with one hand and rotate the “rod” clockwise while allowing the paper tape to slide freely through the fingers of the other hand.
To record your message, fix the wand in a horizontal position, with the beginning of the tape fixed from left to right, keeping the wand from turning, and write from left to right in block letters, placing one letter on each successive turn. When you have finished the line, turn the wand back slightly and begin the next line of your message under the previous one, and so on until you have written your entire message. Remove the finished message from the wand and roll it into a roll or fold it into a square. The decryptor, which has a "wand" like yours, winds the received tape in the same way as the cryptographer, and only in this case will it find out the information.
CODE "GEO - TRANSPO"
Ciphers of this kind were widely used by the German Wehrmacht during the 2nd World War. The full name of the cipher sounds a little heavy:
"Geometric transposition or Geometric displacement". This cipher got its name due to the fact that in the first of two stages of encryption, the letters of the message are arranged in the form / in the form of a rectangle.
The rectangle, of course, includes the square. Another name given to such ciphers is: "Columnar transposition", from the English word "column" (column, column), because in the second stage of encryption, columns or rows of letters of the rectangle are separated to form a ciphered message.
The example below will show how easy it is to operate with such a cipher. First, the message is entered and the number of letters is counted:

WE NOW MEET IN OUR SHED (18)

This means that the message can be placed either in two columns of 9 letters each, or in three columns of 6 letters each, but instead we add two "zeros" and place the message in four 5-letter columns. A rectangular sheet of paper makes this step much easier.

W E N O W
M E E T I
N O U R S
H E D Q Z

After that, the columns of letters are written out in order, from left to right, and your encryption is now read like this: WMNH EEOE NEUD OTRQ WISZ
To decipher, you just need to write these groups again in columns, from left to right, and read the message "snake", i.e. top to bottom left to right. This is the simplest form of such a cipher. So simple that no professional cryptographer uses it for their encryption.
But, at the same time, such a professional can easily turn the same cipher into a pretty tough nut to crack. This works for you too. There are two known ways to turn this cipher into a complex puzzle for someone else's decoder. You can use these methods either separately or together. The first method assumes the presence of a key-digit or a key-word. The order in which letter groups are allocated depends on this. By the way, the key word is more preferable than the key number, because it is easier to remember. The key number often indicates the numerical order, and the key word indicates the alphabetic order. For example, the alphabetical order of the letters of the Key Word "BLAZE" is A, B, E, L, Z (i.e. alphabetical order), and the numerical order of the numbers in Key Number 93418 is 1,3,4, 8.9 (i.e. in order of counting from 1 to 9). The example below clearly shows how these two keys change our message:

B L A Z E 9 3 4 1 8
W E N O W W E N O W
M E E T I M E E T I
N O U R S N O U R S
H E D Z Q H E D Z Q

(a) NEUD WMNH WISQ EEOE OTRZ
A B E L Z (alphabetical order)

(b) OTRZ EEOE NEUD WISQ WMNH
1 3 4 8 9 (numerical order)
The decoder to whom the message is intended knows the Word-Key or the Number-Key. Having received the message(s), he should write down each letter of the key word under each group, in alphabetical order, then write out the key word and insert each letter group under it. The following example shows an almost finished decryption:
(a) A B E L Z
NEUD WMNH WISQ EEOE OTRZ

B L A Z E
W E N W
M E E I
N O U S
H E D Q
The second way to give more secrecy to the message, with a cipher of this kind, is the special arrangement of letters when forming a rectangle in the first stage. This first stage is called inscribing (writing in), and the second stage is transcribing (writing out). The message is first inscribed, i.e. written in the form of a rectangle, and then transcribed, i.e. written out in letter groups. On page 16, we will look at our sample message written in two different ways and transcribed with the keywords TEXAS and LAZY.
In (c), the inscribing is done in horizontal alternating rows (much like in the previous example, which was written in horizontal rows), and the writing out is done in a column key word. In (d) the inscribing is carried out by moving the clock hand from the top right corner, and the writing out is carried out by an ordinary word - a key, i.e. the keyword is on the side and so indicates rows of letters instead of column-columns. The order in which the message fits is called the route - the options are vertical alternating route, counter-clockwise route, and so on.
Decryption is carried out in the same way as described earlier, but the decryptor must also know the route by which the message should be read, i.e. rows or columns opposite the key word.
(c) T EX AS L NOURW
WENOW A I ZQSE
I T EEM Z TDEHN
NO URS Y EEMWO
QZ DEH
(c) OERE ETOZ WMSH WINQ NEUD
(d) IZQSE NOURW EEMWO TDEHN

There are a fairly large number of different inscriptional routes. Below are some. The alphabet is applied so that you can easily follow the presented route. Users of such ciphers can indicate in pre-prepared code letters which route the message was inscribed with and which key word or key number was used.
Horizontal
Formal (straight) Alternating (snake)

ABCDE - ABCDE
FGHIK-KIHGF
LMNOP - LMNOP
QRSTU-UTSRQ
VWXYZ VWXYZ

Vertical
AFLQV AKLUV
BGMRW BIMTW
CHNSX CHNSX
DIOTY DGORY
EKPUZ EFPQZ

Internal spiral

ABCDE AQPON
QRSTE BRYXM
PYZUG CSZWL
OXWVH DTUVK
NMLKI EFGHI

External spiral
clockwise counterclockwise
ZKLMN NMLKZ
YIBCO OCBIY
XHADPPDAHX
WGFEQQEFGW
VUTSR RSTUV

These 8 routes can be increased several times with different starting points. For example, "horizontal", "vertical" and "inner spiral" can start from any of the 4 corners, while "outer spiral" can start anywhere, according to the shape of the rectangle.
The easiest way to work with sufficiently long messages is to write them in four or five rows, read from left to right (this is the so-called straight horizontal inscription) and choose a suitable keyword.
The key word may consist of more than one word. Below is a corresponding example of a long message.
MARYLOVESFUN
WENOWMEETI NO
URSH E DEVERYS
ATURDAYMORNI
NGTOPR ACTI S E
FORTHEMATCHX

ERTGO EVMCA IRRIC WEDPH WUANE OSIEX MDARE NSUTR
TEOTT NYNSH EEYAM OHROT
Such a message is decoded according to the BLAZE pattern (see pages 15-16).
You must have noticed by now that there are three ways that these geometric transposition ciphers allow any ordinary message to be secret:
1) the method of inscribing the message in the usual manner of writing it from left to right (formal horizontal, as in the message under the key word MARZLOVESFUN) and highlighting the columns in alphabetical order, according to the key word.
2) a method of incribing the message in an unusual manner (a route such as a spiral going from the center, for example), and highlighting the columns in the usual writing order from left to right, instead of randomly arranging them with a keyword.
3) by combining the other two, as in the case of a TEXAS message.
Since misunderstandings often arise when naming these three methods, we will agree to call them: 1) column 2) route 3) route and column.

CIPHER "GRILLE" (GRILLE)
Such ciphers were in use in Italy during the time of Henry V|||, and were quite widely used during World War I. The lattice is a part of the encryption apparatus by the type of transposition.
A lattice, also called a “mask” or “trellis”, is a piece of cardboard or similar material in which special squares are cut out, placed in different places on the cardboard. Such a cardboard is superimposed on a sheet of paper and the letters of the message fit through them. The most common types of such a cipher are "alternating (or "rotating") lattice", "reversible lattice" and "random lattice".
CODE "ROTATING GRID"
In this case, the card has squares arranged in such a way that different places on the paper are left uncovered each time the card is rotated 90°. After the letters are inscribed in the squares in each of the four positions, they form a square block of mixed letters. For example, the message: WE NOW MEET IN OUR SHED NOT THE HUT TELL TIM should be encrypted with a 6 x 6 "rotating lattice" card using the following method.
"GRILLE" is placed on a piece of paper and the slotted squares are filled in with the first nine letters of the message. Then "GRILLE" is rotated 90° clockwise and the next nine letters are written. After making two more turns, we enter the remaining letters of the message. Since the message has two letters less than the slotted squares (letters -34, and squares at full turn -36), two "ZEROs" are added: Q and Z, to complete the filling of the last turn of the "GRILLE". After filling in all the squares, we remove the GRILLE, and write out the resulting message in groups in a row or columns, or for greater secrecy, by highlighting groups using the Key Word of the column.

1 2
W E I N
NO
a) O 4 b) U R
2 W 3 S
E E M H E
T D
3 4
And then we turn also:

3 4
N T
O T E L
c) T d) L
4 H E 2 1 T I
E M
U T Q Z
1 2

The decryptor, who must have exactly the same GRILLE and know how the record was encrypted, first of all folds the groups of letters back into a square shape, and then, applying his GRILLE, works in the same order as the cipher.
A wide variety of GRILLE sizes and encryption patterns are available. Below we give samples of GRILLE 4 x 4, 5 x 5, 6 x 6 and even 10 x 10. A 5 x 5 GRILLE always has a clean central area - a square after encryption and ZERO is needed here to fill it. Groups of over
6 letters can be divided in half, but they should be placed together in this case. The numbers on the side indicate the sequence of turning the map
4 x 4
1
X
2 4
X X
X
3

5 x 5
1
X
X
2 X 4
X X
X
3
1 6x6
X X
X
2 X X 4
X
X X
X
3

10x10
1
X X X
X X
X X
X X X
2 X X X
X X
X X
X X X
X X X
X X
3

CIPHER "REVERSIBLE LATTICE
In this case, GRILLE, unlike the Rotating Grid cipher, should not be square. Its four positions are as follows: A - side, TOP -1 (very top); turn the card over so that TOP -2 takes the very top. We turn the card over to the B - side, TOP - 1 again at the very top; and we finish by turning the card so that the very top takes the TOP - 2 B - sides. Encryption and decryption are exactly the same as in the case of the "Rotating Grid". Below are examples of the "Reversible Lattice" cipher.

A BE PX - 1 A BE PX - 1
x x
x V- x V-

x x hundred x x hundred

X x rona x x ro

X x on
x x
x x
x x
x x x x
BE RH - 2 BE RH - 2

CIPHER "RANDOM GRID"
This cipher is most suitable for very short messages and for passing through a Keyword or Password. The lattice can be in this case of any shape, and open squares can be anywhere, because the lattice in this cipher does not toss and turn. The message is entered into open squares, then GRILLE is removed, and Zero - letters are entered into empty spaces. The decoder imposes an identical GRILLE lattice on the leapfrog letters during decoding. Zero - the letters are closed and the message is easy to read.
MANUFACTURING "GRILLE"
To make GRILLE of any kind, line the card into the required number of squares and leave margins on four sides. Use the cross to mark the squares to be cut. Pierce the middle of the square, make cuts at its corners, bend the formed triangles and cut them off. Add to the GRILLE any additional detail you need.

SIMPLE SUBSTITUTION CIPHER

Mary, Queen of Scots, during her stay at Chartley Hall, one of several places in England where she was imprisoned after her escape from Scotland in 1568, was involved in a conspiracy to kill Queen Elizabeth, her cousin, and elevate herself to English throne. The main first difficulty of the planned undertaking was how to receive and transmit messages from Chartley Hall, surrounded by a moated feudal castle, under the vigilant guarding eye of the head jailer, Amyas Paulet. To overcome such an obstacle, it was decided to involve a local brewer in the conspiracy. The plan itself was this: When Queen Mary needed to send a secret message, she would dictate it to one of her two secretaries, who would then encrypt it. The ciphered message will then be folded and sealed, wrapped in a piece of leather, and handed to the brewer when the latter is called to deliver the beer and remove the empty casks from the castle. The brewer, having received a message rolled up into a tube, had to attach it to a plug prepared in advance and push it through the hole of an empty keg. From the safety of the castle, the brewer was to obtain a secret package and hand it over to Queen Mary's trusted messenger, Gilbert Gifford, for delivery to London. Secret messages from the conspirators were then carried back by Gifford to the brewer who passed them on, for clandestine delivery, using a keg stopper, to Chartley Hall. But, unfortunately for Mary, Queen of Scots, her trusted messenger was one of Queen Elizabeth's spies, and the brewer and jailer worked closely with him. When Gifford was handed a message for Mary or for a group of conspirators who supported her, he had first of all to deliver it to the headquarters of the Secret Service of Queen Elizabeth, which was headed by Sir Francis Walsingham. At the Headquarters, the seal was opened and a copy was made of the message, then the seal was masterfully forged and fastened again, after which Gifford set off with the original message. Meanwhile, Walsingham's best decoder, Thomas Philippes, was deciphering the message very quickly. In conclusion, it must be said, all the conspirators were captured and hanged, and on February 8, 1587, in the Great Hall of Fotheringhay Castle, Mary Stuart, Queen of Scots was beheaded.
Julius Caesar communicated secretly with his generals by means of a cipher which bears his name ever since, although it was known long before its use by the great Caesar. The essence of the cipher was as follows: Each ordinal (ordinary) letter of the message was replaced by the letter that stood behind it in third place in the alphabet. Ordinary X,Y,Z were replaced by A,B,C ; thus, for example, the word LAZY was replaced by ODCB. Julius Caesar's cipher alphabet was always three letters apart from the usual one, but since letters can stand up to any number of letters FOR or BEFORE the main one, such a cipher was called " SLIDING ALPHABET CIpher".

CAESAR CYFER
This is a shorter name for Julius Caesar Cipher or Sliding Alphabet Cipher. Its essence is as follows:
A simple alphabet is written, and the alphabet of the cipher is written below, written in the same order as the upper one, but starting with a letter separated from the first letter of the ordinary alphabet by one or more places forward or backward, with missing letters at the beginning of the bottom line. The example below begins with "K", and therefore such a cipher can be called the Caesar Cipher "K":
Simple: A,B,C.D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y, Z
Code: K,L,M,N,O,P,Q,R,S,T,UVW,X,Y,Z,A,B,C,D,E,F,G,H, I, J
To encrypt the message, find each required letter in the normal alphabet and write out the substitution, i.e. letter in the cipher, standing strictly under the letter of the ordinary alphabet. The message can be written in normal word groups, or in groups of 3, 4 or 5 letters if greater secrecy is required. To decipher, find each required letter in the cipher alphabet and write down the corresponding letter strictly on top.

KEYWORDS CIPHRES
A mixed cipher alphabet always gives a greater degree of secrecy than a sequential alphabet. One of the simplest and most effective ways to mix up the alphabet in a way that is usually based on a single word is to use a keyword. The key can be any word, or a group of words of the same total length as the various letters in the string.
The longer the keyword, the more secure the cipher.
The advantage of an alphabet cipher mixed with a keyword is that users of such a cipher do not need to carry a copy of the alphabet with them (which is very dangerous for a scout or spy), they only need to remember the key word.
First, write the regular alphabet, then below it write the keyword and complete this line with part of the regular alphabet, not including the letters used in the keyword. If, as often happens, some of the letters of the cipher alphabet coincide with the letters of the regular alphabet written above, you should not be upset, but a well-chosen key word (for example, including letters from the end of the alphabet) reduces their frequency of repetition to a minimum. Below we give three examples of keyword alphabets and several sentences in the form of such keys. When you write a message in a keyword cipher, remember to include some additional means (ways to recognize which key you used, such as a coded letter, somewhere on the piece of paper).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
L A Z Y B ONE S C DF G H I J K M P Q R T U V W X
P L A Y WR I GH T S B C D E F J K MN O QU V X Z
T R E N DY MUS I C A L B OX F G H J K P Q V W Z

PATHFINDER BACKGROUND BUCKINGHAM WORKINGDAY
REPUBLICAN MISFORTUNE BANKRUPTCY PREVIOUSLY
PRESUMABLY DESTROYING SUNDAY MONDAY
TUESDAY THURSDAY FRIDA

CIFRES OF THE SAME GRADE (Corresponding ciphers)
This type of cipher is also known as the cipher-box or cipher-frame, because. in this case, the usual alphabet is written, usually in the form of a rectangle; as well as a cipher in the form of baygram, because in this case, each letter of the ordinary message is replaced by two letters or numbers, or both, one at a time. The position of each letter in the frame is located in the same way as the coordinate grid on the map correlates with the location of some position on the map - so much to the east, so much to the north, or with squares going diagonally or vertically. This kind of corresponding cipher is called the grid-card cipher because that name best describes how this kind of cipher works.

CODE "CARD - SCHEME"
In total there are 6 variants of such a cipher. Each frame has an alphabet and numbers from 0 to 9. The letters (cipher /s/ has numbers) on the outside of the frame are called "recommendations". Those at the top (code /f" / has them at the bottom) refer to the letters and numbers in the columns below them, and those located on the side refer to the letters and numbers in the adjacent rows. The two letters on the outside, determining the position of the letter or number in the frame , become a cipher "stand" ("substitute") for this letter or number, and therefore are called "BIGREMM Cipher".
For example, in cipher (a), Cipher Baygram / BIGRAM/ for the letter "K", are the letters GC - the letter "G" is the letter located strictly above the "K", and the letter "C" is the letter located on row lines where "K" is located. The completed message usually has its "bygrams" grouped word by word, but other groupings can be used. Random grouping, using some groups that have extra numbers or letters, makes the cipher more secret. Decryption is the reverse process of encryption. The letter encrypted with the "bigram" is located at the intersection of two imaginary lines passing through the column from above and along the line of the row on the side of the letters included in the "bigram".
cipher (a)
The letters at the top of the frame are the same. as located on the side, it is important for the decoder to easily find the bigram letters. For example, FD is an ordinary P if the letter F from the top edge of the frame is taken first, but U if the letter F from the side row is taken first. If you use the top location as a pointer, and always encrypt and decrypt in that order (FD = P), you will avoid many of the difficulties of working with this cipher.
B C D F G H B C D F G H
B A B C D E F B A B C D E F
C G H I J K L C G H I J K L
D M N O P Q R D M N O P Q R
F S T U V W X F S T U V W X
G Y Z 1 2 3 4 G Y Z 1 2 3 4
H 5 6 7 8 9 0 H 5 6 7 8 9 0
(a) (b)
cipher (b)
The letters located on the top and side of the frame are different, so they can be used in encryption in any order. Therefore, each letter has a set of two digrams. For example, the word NOON is encrypted as
C L L D D L L C
cipher (s)
The numbers here are used for encrypted digrams, and the cipher is made more secure by using the keyword (SYLVIA) to mix up the alphabet in a box. The encryption process can be done in the same way as Cipher (b), except for X; Z; 5; 6 , which repeat the numbers 0 located inside the frame; 1, and therefore the upper letter must enter the digram first. In order to avoid confusion, the whole encryption process can be done in the same way as in the Cipher (a) - "topside" (on top of the frame).
cipher (d)
This type of cipher also has a mixed alphabet, and can be used as in the cipher with Cipher (b) - any letter located on the outside of the frame comes first. The consonants are on the top edge of the frame, and the vowels and Y are on the side; and then the encryption resembles some foreign language, and can even be spoken aloud.
cipher (e)
Messages encrypted with such a cipher, which also has a mixed alphabet, look rather strange, because consist of only one vowels and Y. Encryption is carried out using the Cipher method (a) -i.e. "top side".
B D K N P Z A E I O U Y
A J U L I A N Y A G M G O U
E B C D E F G U B H 1 7 P V
I H K M O P Q O C I 2 8 Q W
O R S T V W X I D J 3 9 R X
U Y Z 1 2 3 4 E E R 4 0 S Y
Y 5 6 7 8 9 0 A F L S N T Z
(d) (e)

cipher (f)
This kind of cipher, having two groups of opposing letters on the outer border of the frame, can be used to encrypt starting with any letter that comes first, and each ordinary letter has a set of eight different cipher bigrams. For example, "F" could then be encrypted with DJ, DX, JD, JP, PJ, PX, XD, or XP. Take the message: WE MEET TODAY

CIPHERS (a - f):
(a) GFGB BDGBGBCF CFDDFBBBBG
(b) GMGJ LBJGGJCM MCDLFJJBBN
(c)* 5937 38377339 9358275661
(d) PONE KINEENOK KONIKEPABU
(e) YOAE IYAEAEUA UAUYAIAYYE
(f)* CTCX EWJQXCLF VNAVB***TE

MORSE CIPHER
Morse code letters are made up of dots or dashes, or a combination of both. In this cipher, the letters of the alphabet, with the exception of vowels, are replaced by dots and dashes. The consonants of the first half of the alphabet, from "B" to "M", are replaced by dots; consonants of the second half of the alphabet, from "N" to "Z", are replaced by a dash. The vowels serve as separators. One vowel marks the end of a letter; two vowels indicate the end of a word. Message: A RED CAT, which is encrypted in Morse code in this way:
.- .-. . -.. -.-. .- - , can be encrypted like this
way:
DTAIL PHOFI VKMOU QLNCO BSIRO or:
CROAK WHALE SHEE PLYMA DRIVE and many other ways. When it is necessary to use additional letters to break groups into equal numbers, vowels are added.
For decoding, indicate a dot or dash under each consonant.
After that, under the dots or dashes and write down the literal equivalent.

CODE "CHANGING NUMBERS"
Here the same work takes place as when working with letters, in addition,
that the numbers from 1 to 8 represent dots and dashes, and 9 and 0 serve as separators. 1,3,5 and 7 stand instead of dots; 2,4,6 and 8 - instead of a dash. nine
is used to separate letters, and 0 separates words. If additional numbers are required to break the message into equal groups, separators are added.
Message: A RED CAT, divided into groups of 4 digits, with
two "zeros" added, reads like this: 3407 6593 9651 0678 5932 9490
. - . - . . - . . - . - . . - -
The decoder writes a dot under each odd digit and a dash under
each even, then writes the corresponding letters.

DIGITAL CODES.

Nowadays, when an enemy spy is captured, he almost always has a very small booklet, no larger than a postage stamp. Each page of such a book is filled with columns of numbers. It may also have pages of different colors, or a separate book with pages of different colors can be found. Such books, called one-time pads, are called so because each page contains a different cipher, and after the message is encrypted with it, the page is subject to immediate destruction in a fire. Just a light touch of the flame is enough, as the page lights up and is destroyed in a split second. Not a single spy, wherever he is, has in his activity a cipher that is the same as that which his colleague would have. And no decryptor or even a computer can decipher the encryption without having the key to it. There is only one key for a particular encryption, and when a spy uses this single key (eg, a color page) to decrypt an encryption he has received, he must immediately destroy it. Below we will look at some of the less complex Digital Ciphers.

This is the simplest of the digital ciphers. Its essence is that the letters of the alphabet are numbered from 1 to 26, and in the direct order of encryption numbering: 1 = A. In the reverse order: 26 = A. Of course, there are other options that we will provide with our examples.
(a) The numbering starts with 11 (or 21,31,41,51,61 or 71) so that two digits refer to a letter, thus forming different, realistically possible groups of digits. The five options we give below, in which 11 = A, will show how the phrase "WE MEET" can be placed in such groups: (b) - in one group, (c) - in a group of three numbers, (d) - in a group of four numbers, (e) - in a group of five numbers, with "zero" digits added to complete the formation of the last group; (f) - in randomly composed groups. When "zero" digits are required, to complete / complete groups of 3, 4 or 5 digits, the first two (in case the number of required "zero" digits is two or more) must form a number that cannot in any way be included in the cipher, for example a number greater than 36 in the cipher example (a). And then this number will indicate the end of the message, and eliminate possible confusion with zero digits in the message.
(a) A 11 E 15 I 19 M 23 Q 27 U 31 Y 35
B 12 F 16 J 20 N 24 R 28 V 32 Z 36
C 13 G 17 K 21 O 25 S 29 W 33
D 14 H 18 L 22 P 26 T 30 X 34
W E M E E T ) 3315 (b) 331523151530 (c) 331 523 151 530
3315 23151530 2315 (d) 3315 2315 1530
1530 (e) 33152 31515 30392 (no key included)
3,2, 9, 39, 92, 392 is "digit zero)
(f) 3 31 52 31 51 530
For decryption, the numbers are written in pairs, and below each such pair is written its letter equivalent.

CIPHER "MARABU"
A mixed cipher alphabet is compiled using the key word, after which the letters are arranged in groups, and each group is assigned its own number. Each letter is assigned its own number in the group to which it belongs, and the two digits are combined and become encrypted letter numbers, so P=23 and N=34. The keyword in the example below is CUSTARDPIE , and the message is:
WE NOW MEET IN OUR SHED.
The number indicating the group number is at the beginning. You can, of course, use the usual alphabet:
5 2 6 3 4
СUSTA RDPIE BFGHJ KLMNO Z
1 2 34 5 1 2 345 123 4 5 1 2 3 4 5 1
W=73
7325 343573 33252554 2434 355221 53642522

CIPHER "DRABAL"
This cipher is similar to the Marabou cipher, but the numbers are arranged so that the two digits associated with a letter of the alphabet can be written as a fraction. The alphabet may be the most common, but the one used in the example below has been mixed with the keyword WAVYTRIPE . We also take our message:

WE NOW MEET IN OUR SHED
1 2 3 4 5 6 7
WAVYTRIP EBCD FGHJ KIM NOQS U XZ
2 3 45 6 789 3 57 9 4 57 8 5 7 9 6 7 8 9 7 8 9

1 2 5 5 1 4 2 2 1 1 5 5 6 1 5 3 2 2
2 3 6 7 2 9 3 3 6 8 6 7 7 7 9 7 3 9

The upper digit (numerator) of the fraction tells the decoder about the group of letters, and the lower digit (denominator) tells the place of the letter in this group.

CIPHER "REVERSED GEMINI"
Letters of the alphabet and numbers from 0 to 9 are represented by pairs of numbers,
which can be used upside down. Hence,
each letter has two cipher equivalents, which
increase the secrecy of the cipher. Below is the alphabet mixed with
keyword PLASTICBUN , and the message: MEET US SOON AT 23 .

P 12 21 D 25 52 O 37 73 1 56 65 8 78 87
L 13 31 E 26 62 Q 38 83 2 57 75 9 79 97
A 14 41 F 27 72 R 39 93 3 58 85 0 89 98
S 15 51 G 28 82 V 45 54 4 59 95
T 16 61 H 29 92 W 46 64 5 67 76
I 17 71 J 34 43 X 47 74 6 68 86
C 18 81 K 35 53 Y 48 84 7 69 96
B 19 91 M 36 63 Z 49 94
U 23 32 N 37 73
N 24 42

63622661 2315 51377342 4116 7558
When deciphering the letters, it is easy to find if you find the smaller of the two numbers.
For example: the reciprocal of 63 is 36, i.e. the letter "M".

CIPHER "VOCABULAR"

This type of cipher is based on the alphabetical arrangement of the pages of any
dictionary. In a simple pocket dictionary, for example, words beginning with the letter "A" sometimes occupy pages from 1 to 31, B - from 33 to 67, C - from 69 to 131, etc. Pages containing two letters of the alphabet are skipped. In order to encrypt a message, you need to replace each letter of this message with any number that determines the page on which this letter is located in the dictionary. But since some letters are located on three-digit pages, it is necessary to bring all other pages to a three-digit value. Instead of hundreds, in these cases. put 0 in numbers that are less than 100, at the same time, this figure. starting with 0 is replaced in place of hundreds by any digit., thus making up a page that is not available at all in this dictionary. For example, there are only 690 pages in the dictionary, 0 standing in place of hundreds in a two-digit number. can be replaced by 7, 8 or 9:
Example: 73 - 073 - 773 - (873, 973). The word "CAB" will be encrypted as 129723046, or in a thousand other ways. Where a letter of the alphabet, such as "X", for example, appears on a page together with another letter (and it is often the only one listed in dictionaries), users of the cipher agree that the page number is reserved specifically for the letter "X".

DICTIONARY CODE
Dictionary codes have been used almost immediately since the appearance of the first dictionaries, but their use is very limited. The message consists of groups of numbers. Each group is related to a word in the dictionary by specifying the page number where it is located and its position on that page. The dictionary thus becomes a book of codes and, as with any book of codes, the messages must be composed to suit it. For example, in most pocket dictionaries, you can hardly find any of the exact words in the message: WE ARE TRAILING SPIES , and only a very small number of dictionaries can carry the last two words. The message: SEND A NEW SECRET CODE AND A FURTHER SUPPLY OF INVISIBLE INK can be composed of a dictionary of any size, regardless of its size. Therefore, we see that dictionary codes can only be used if a special dictionary with a high word frequency is available. A secret encrypted with a dictionary code can be more secret than one encrypted with any other code, and depends not on the method of coding, but on keeping secret which dictionary you use. Consider a method based on a widely used pocket dictionary, say 700 pages. Let the word SEND be on line 8, in 2 of the two dictionary columns on page 494. Then the entry will go in this order: three digits of the page number (494). one digit of the column (2), and the other two are the rows of the given word (08), i.e. each word can be made up of only six digits. Therefore, if we group all the numbers in the indicated order (page + column + row), then the encoded word SEND will be represented as 494208. The word "A" or "AN" in the second line of the first column of the first page, it would seem, should be encoded as 001102 . but from such a code, it is clear to anyone that this word is at the beginning of page 1, and in the wrong hands such a code can easily become the key to the entire codegram. Therefore, a digit indicating a page number less than 100 must be masked. In fact, this is achieved by replacing the first "0" with 7.8 or 9 (in our example it is: 701102), which will not confuse the recipient during decryption, because in the used dictionary no more than 700 pages.

To be continued...

The time has come when satellites are flying above us, capable of zooming in on the image so much that we can accurately determine the size of the female breast of a girl lying on a nudist beach.

Having received such superpowers, we think that humanity knows absolutely everything. Even with all our high speeds, 3D technology, projectors and touch screens, there are still ciphers and codes that world-class cryptologists continue to puzzle over. Moreover, some ciphers existed in the 18th century. Even with the advent of advanced technology, these unsolved codes prove that the smartest thing in our society right now is smartphones.

10. Dorabella Cipher

It is said that its author had an exceptional mind. The ability to take a blank page and turn it into something intriguing is an art form that evokes incredible emotions... okay, maybe not so grandiloquently, but let's face it, it takes quite a lot of creativity to make something out of nothing. At the end of the 18th century, the author of this code, Edward Elgar, sent a coded message to his young girlfriend. The problem is that he managed to encrypt it so well that even she couldn't read it. Elgar was fascinated by the idea of ​​encrypted messages. He even cracked one of the most difficult codes that was published in the famous Pall Magazine. Many have found the symbols that make up the Dorabella cipher in Elgar's musical compositions and his personal notes. Many have theories, but no one has ever found a solution.

9. D'Agapeyeff cipher

A couple of decades after the appearance of the Dorabella cipher, Alexander D'Agapeyeff wrote a book on cryptography. 1939, the year the book was written, was the time of pre-computer encryption, and it is believed that the D'Agapeyeff cipher was composed entirely by hand. This amazing code is harder to crack than prehistoric codes written in lost languages. The author of this cipher himself was a genius. His most famous code was so difficult that even he often gave in to it. Cryptologists have taken its numerical code and, as usual, assigned letters to the numbers. Unfortunately, it didn't lead to anything. They got a bunch of doubled and tripled letters. And the book of this cryptographer called "Codes and Ciphers", printed by Oxford Press, did not help. For some reason later editions did not include his known cipher. People were probably tired of the fact that at the very last moment, before they thought the secret would be revealed to them, the realization came that they were still far from it.

8. Harappan letter

Between 2600 and 1800 B.C. Harappan civilization flourished in the Indus Valley. The Indus people have been described in history as the most advanced urban culture of their time. The first attempts to decipher the Harappan script were made long before civilization was rediscovered. Historians from Britain to India have tried to decipher the symbolic messages. Some believe that the writing of the Indus people became the prototype of hieroglyphic writing in ancient Egypt. Teams from Russia and Finland came to the conclusion that the writing of this people has druidic roots. No matter where it originated, the 400 pictogram alphabet has been developed by some of the world's greatest minds. It is believed that the population of the Harappan civilization was 1 million. To manage so many people, some form of language had to be invented. And at sunset, civilization decided to act quite selfishly, and did not leave a cheat sheet for future civilizations.

7. Chinese gold bar cipher

General Wang of Shanghai, received seven gold bars in 1933. But not at all the ones that are deposited in banks. The biggest difference was the mysterious images and letters found on the ingots. They consisted of cipher letters, Chinese characters and Latin cryptograms. 90 years later, they still haven't been hacked. Weighing 1.8 kilograms, the Chinese cipher is believed to describe a deal worth more than $300,000,000. The real reason why General Wang received such an elaborate gift from an unknown admirer would be much easier to determine if we knew what was written on the gold bars.

6. Killer Zodiac

This name has nothing to do with the daily horoscopes that fill our mailboxes, we are talking about one of the most terrible serial killers. Not only was he guilty of a huge number of murders and was simply a mentally unbalanced person, the Zodiac tried to become famous at their expense. In 1939, he sent letters to three California newspapers boasting about the recent murders in Vallejo. For his generosity, he demanded that a coded message be printed on the front pages of these newspapers. In the end, the police were left with no choice but to play his game. More than 37 people became victims during his activities in the 1960s and 1970s, and it is surprising that several Zodiac messages were deciphered. However, the vast majority still keep their secret. The FBI even went so far as to release the rest of his messages to the public in the hope that someone could decipher them.

5. Linear A

Historians have succeeded in making a connection between the Phaistos Disc and Linear A, but they still need to decipher the message. The Phaistos disc was found in 1908, with mysterious signs on both sides. "Experts" identified 45 characters, but they still don't know what they mean. In addition, they found many discs with two different styles of writing. One style was called "Linear A" and the other "Linear B". Linear A was much older and was created on the island of Crete. A Briton named Michael Ventris put all "experts" to shame when he cracked the Linear B cipher. The secondary form was broken, but the "experts" are still scratching their heads over Linear A.

4. Proto-Elamite

Having formed the Persian Empire, the Elamites became the very first civilization known to us. Even in 3300 BC. it was necessary to develop a written language in order to communicate with each other. In the 8th century BC. The Elamites used clay symbols to represent various goods and services. They even came up with clay wallets and IDs to understand who had money and how much. This is the earliest evidence for the creation of a number system. Around 2900 BC their language has moved to a whole new level. It is assumed that the Proto-Elamite language was some form of accounting system.

Some advances, if you can call them that, have been made by historians who have found similarities between Proto-Elamite and cuneiform writing. Unfortunately, at the beginning of the 5th century BC. Proto-Elamite began to disappear. There are only 1,600 clay discs left that no one can read.

3. Taman Shud

As the Zodiac has already proven, killers love fame. The body of an unidentified Australian was found on the shores of Adelaide Beach over 65 years ago. The media dubbed him "The Mystery Man of Somerton". Attempts to find out his identity were also unsuccessful. But today we're talking about ciphers... The evidence found in his pockets led the Australian police to the local railway station. There they found his suitcase with the usual set of things for most people. The coroner stated that the man was perfectly healthy (apart from the fact that he was dead) and may have been poisoned.

It took two whole months to discover a small pocket, which was missed at the first examination. It contained a small piece of paper with the inscription "Taman Shud". After the discovery of this find, a guy approached the police, claiming to have found a copy of the same book in his car on the same evening that the stranger was killed. Under ultraviolet radiation, an unreadable code of five lines appeared. For years, officials and various volunteers have been trying to break the cipher. Professor Derek Abbott and his students have been trying to decipher the message since March 2009. However, like other mystery lovers, they gave up. But their reports say the victim was a Cold War spy who was poisoned by his enemies. It is much easier to come up with something mystical than to fully taste the bitter taste of defeat.

2. McCormick cipher

The body of Ricky McCormick was found in the Missouri area on June 30, 1999. Two years after his death, two notes in his pockets were the only clues for detectives. Even the efforts of the most famous cryptologists and the American Cryptology Association could not decipher them. The McCormick cipher is ranked 3rd in the list of the most difficult codes. More than 30 lines of encoded information include numbers, lines, letters and brackets. With so many characters, the possible ciphers are endless. McCormick's family says he has been writing in ciphers since childhood, and none of them knew what they meant. Although he was away for only a few days, McCormick's body was quickly identified. This made the deciphering of his notes a clue to his murder. FBI agents usually crack codes in a few hours. One way or another, McCormick, who normally could only write his own name, made serious competition for the professionals.

1. Bacon's cipher

The Voynich manuscript is the largest illustrated work written in cipher. The illustration, rediscovered to the world at the Jesuit School in 1912, got its name because the authorship is attributed to the Englishman Roger Bacon. Some historians discredit Bacon's authorship due to the presence of letters of the alphabet that were not used during his lifetime. On the other hand, the illustrations confirm Bacon's participation in the creation of the work. He was known for his interest in creating the elixir of life and other mystical teachings. Similar themes have been mentioned within the Voynich Manuscript. Was Bacon really interested in the unknown? We'll leave this debate to others, but one thing that remains undisputed is that we don't know what this cipher hides. A huge number of attempts have been made to crack the code. Some argued that it was a modified Greek shorthand, while others believed that the key was in the illustrations. All theories have failed. Those who are still trying to break Bacon's cipher are amazed that it has taken so long to crack.

Pavlova Diana

Ciphers, codes, cryptography in mathematics.

Download:

Preview:

Open humanitarian scientific and practical conference

Research papers "Search and creativity"

Research:

"Ciphers and codes".

Performed:

Pavlova Diana Borisovna

student of 9 "B" class

MOU secondary school №106

Supervisor:

Lipina Svetlana Vladimirovna

Mathematic teacher

Volgograd 2013

Introduction …………………………………………………………………… .3

Chapter 1. Ciphers ……………………………………………………………….4

Chapter 2. Cryptography ……………………………………………………. 5

Chapter 3. Encryption Methods ……………………………………………….6

3.1. Replacement ciphers ……………………………………………………………6

3.2. Permutation ciphers ………………………………………………….6

Chapter 4

4.1. Cipher according to Plutarch's description ………………………………………...7

4.2. "Polybius Square" …………………………………………………….7

4.3. Caesar's cipher ……………………………….………………………….8

4.4 Gronfeld cipher ……………………………………………………………8

4.5 Vigenere cipher …………………………………………………………..8

4.6 Matrix coding method …………………………………………………………9-10

4.7 The code "Turning grille"……………………………………………….10

4.8 Gamming……………………………………………………………………………………10

4.9 Cryptography of the Second World War ……..……………………………11-12

4.10 The role of cryptography in the global industry .............................................................. ....12

Conclusion ……………………………………………………………………..13

Applications ………………………………………………………………….14-15

Literature used ……………………………………………………………………………………………………16

Introduction.

Target: study the application of basic mathematics to compose ciphers

Tasks:

find out what the concept of "cryptology" includes;

find out what encryption methods are known;

explore the uses of ciphers.

Relevance of the topic: tit is hard to find a person who has not watched the series: "The Adventures of Sherlock Holmes and Dr. Watson", "Seventeen Moments of Spring", where encrypted secret messages were used. With the help of codes and ciphers, you can send various messages and be sure that only the person who knows the key to it can read them. Is it currently possible to use the knowledge of encryption? This work will help answer this and other questions.

Problem: insufficient comprehensive study of ciphers.

Object of study: ciphers.

Subject of study:thematic tasks.

Research methods:comparative characteristics, problem solving.

Novelty and practical value: dThis work will help to learn many interesting facts about ciphers. It is designed for people of different age groups: children, teenagers, boys, girls, etc. Students will get acquainted with materials that go beyond the scope of the school curriculum, and will be able to apply the studied material in mathematics in a non-standard situation.

Chapter 1. Ciphers.

Cipher (from Arab.صِفْر ‎‎, ṣifr « zero", where fr. chiffre "number"; related to the wordnumber) - some kind of text transformation system with a secret (key) to ensure the secrecy of the transmitted information. The cipher can be a combination of conventional characters (a conventional alphabet of numbers or letters) or an algorithm for converting ordinary numbers and letters. The process of encrypting a message with a cipher is calledencryption. The science of creating and using ciphers is calledcryptography. Cryptanalysis- the science of methods for obtaining the original value of encrypted information.

Types of ciphers.

Ciphers can use one key for encryption and decryption, or two different keys. On this basis, they distinguish:

  • symmetric uses the same key for encryption and decryption.
  • uses the same key for encryption and decryption.
  • Asymmetric cipheruses two different keys.

Ciphers can be designed to either encrypt the entire text at once, or encrypt it as it arrives. Therefore, there are:

  • Block cipherencrypts a whole block of text at once, issuing a ciphertext after receiving all the information.
  • Stream cipherencrypts the information and produces the ciphertext as it arrives. Thus being able to process text of unlimited size using a fixed amount of memory.

Chapter 2. Cryptography.

As soon as people learned to write, they immediately had a desire to make what was written understandable not to everyone, but only to a narrow circle. Even in the most ancient monuments of writing, scientists find signs of deliberate distortion of texts: changing signs, violating the order of writing, etc. Changing the text in order to make it understandable only to the elite gave rise to the science of cryptography (Greek “secret writing”). The process of converting text written in a common language into text that only the addressee can understand is called encryption, and the method of such conversion is called a cipher. But if there are those who want to hide the meaning of the text, then there will be those who want to read it. Methods for reading such texts are studied by the science of cryptanalysis. Although the methods of cryptography and cryptanalysis were not very closely related to mathematics until recently, at all times many famous mathematicians participated in the deciphering of important messages.And often it was they who achieved noticeable success, because mathematicians in their work constantly deal with diverse and complex problems, andeach cipher is a serious logical task. Gradually, the role of mathematical methods in cryptography began to increase, and over the past century they have significantly changed this ancient science.

One of the mathematical methods of cryptanalysis is frequency analysis. Today, information security is one of the most technologically advanced and classified areas of modern science. Therefore, the topic "Mathematics and Ciphers" is modern and relevant. The term "cryptography" has gone far from its original meaning - "cryptography", "secret writing". Today, this discipline combines methods for protecting information interactions of a completely different nature, based on the transformation of data according to secret algorithms, including algorithms that use secret parameters. Dutch cryptographer Mouritz Fries wrote about the theory of encryption: "In general, cryptographic transformations are purely mathematical in nature."

A simple example of such mathematical transformations used for encryption is the equality:

y \u003d ax + b, where x - message letter,

y - letter the cipher of the text obtained as a result of the encryption operation,

a and b are constants defining this transformation.

Chapter 3. Encryption methods.

3.1. replacement ciphers.

Since ancient times, the main task of encryption has been associated with the preservation of the secrecy of correspondence. A message that fell into the hands of an outsiderto a human, it should have been incomprehensible to him, and an initiated person could easily decipher the message. There are a lot of secret writing techniques. It is impossible to describe all known ciphers. The simplest of cryptographic ciphers are substitution or substitution ciphers, when some characters of the message are replaced by other characters, according to some rule. The substitution ciphers also include one of the first known codes in the history of mankind - caesar code used in ancient Rome. The essence of this code was that a letter of the alphabet was replaced by another by means of a shift along the alphabet by the same number of positions.

3.2 Permutation ciphers.

The cipher called the Cardano lattice also belongs to the “permutation” class. This is a rectangular card with holes, most often square, which, when applied to a sheet of paper, leaves only some of its parts open. The number of rows and columns in the card is even. The card is made in such a way that when it is used sequentially (turned), each cell of the sheet lying under it will be occupied. The card is first rotated along the vertical axis of symmetry by 180°, and then along the horizontal axis also by 180°. And the same procedure is repeated again: 90°.

Chapter 4 ciphers.

4.1. Cipher according to Plutarch's description.

The need to encrypt messages arose a long time ago.In the V - VI centuries. BC e. The Greeks used a special encryption device. According to Plutarch's description, it consisted of two sticks of the same length and thickness. One was left for oneself, and the other was given to the departing. These sticks were called wanderers. If the rulers needed to tell some important secret, they cut out a long and narrow strip of papyrus, like a belt, wound it around their wanderer, leaving no gap on it, so that the entire surface of the stick was covered by the strip. Then, leaving the papyrus on the wanderer as it is, they wrote everything they needed on it, and after writing, they removed the strip and sent it to the addressee without a stick. Since the letters on it are scattered in disorder, he could read what was written only by taking his wanderer and winding this strip around it without gaps.

Aristotle owns a way to decrypt this cipher. It is necessary to make a long cone and, starting from the base, wrap it with a tape with an encrypted message, moving it to the top. At some point, pieces of the message will begin to be viewed. So you can determine the diameter of the wandering.

When the complex cipher is finally solved, it may contain the secrets of world leaders, secret societies and ancient civilizations. Before you - a dozen of the most mysterious ciphers in the history of mankind, which have not yet been solved.

Post sponsor: chandeliers and lamps

Notes by Ricky McCormick

In June 1999, 72 hours after one person was reported missing, a body was found in a Missouri cornfield. Strangely, the corpse decomposed more than it should have in such a time. At the time of his death, 41-year-old Ricky McCormick had two encrypted notes in his pockets. He was unemployed with incomplete schooling, living on welfare, and he didn't have a car. McCormick also served time in prison for the rape of a minor. He was last seen alive five days before his body was found, when he came for a routine checkup at Forest Park Hospital in St. Louis.

Neither the FBI's cryptanalysis unit nor the American Cryptoanalytic Association was able to decipher the notes and made them public 12 years after the assassination. Investigators believe the mysterious notes were written about three days before the murder. McCormick's relatives claim that the murdered man used this technique of coding messages from childhood, but, unfortunately, none of them knows the key to this cipher.

Cryptos

This is a sculpture by American artist Jim Sanborn, which is installed in front of the entrance to the headquarters of the CIA in Langley, Virginia. It contains four complex encrypted messages, three of which have been decrypted. Until now, 97 characters of the last part, known as K4, remain undeciphered.

In the 1990s, CIA deputy head Bill Studman tasked the NSA with deciphering the inscriptions. A dedicated team was formed that was able to decipher three of the four messages in 1992, but did not make them public until 2000. Also three parts were solved in the 1990s by CIA analyst David Stein, who used paper and pencil, and computer scientist Jim Gillogly, who used a computer.

The decoded messages are reminiscent of CIA correspondence, and the sculpture is shaped like paper coming out of a printer during printing.

Voynich manuscript

The Voynich manuscript, created in the 15th century, is one of the most famous mysteries of the Renaissance. The book bears the name of the antiquary Wilfried Voynich, who bought it in 1912. It contains 240 pages and some pages are missing. The manuscript is full of biological, astronomical, cosmological and pharmaceutical illustrations. There is even a mysterious folding astronomical table. In total, the manuscript contains more than 170 thousand characters that do not comply with any rules. There is no punctuation or breaks in the writing of cipher characters, which is not typical for handwritten cipher text. Who created this manuscript? Researcher? Herbalist? Alchemist? The book once allegedly belonged to the Holy Roman Emperor Rudolf II, who was fond of astrology and alchemy.

Leon Battista Alberti, an Italian writer, artist, architect, poet, priest, linguist and philosopher, could not choose any one occupation. Today he is known as the father of Western cryptography, and he lived during the same years that the manuscript was created. He created the first polyalphabetic cipher and the first mechanical cipher machine. Maybe the Voynich manuscript is one of the first experiments in cryptography? If the code for the Voynich manuscript is deciphered, it could change our knowledge of the history of science and astronomy.

Shagborough lettering

Shepherd's Monument is located in picturesque Staffordshire in England. It was erected in the 18th century and is a sculptural interpretation of Nicolas Poussin's painting The Arcadian Shepherds, but some details have been changed. Below the picture is a text of 10 letters: the sequence O U O S V A V V between the letters D and M. Above the picture there are two stone heads: a smiling bald man and a man with goat horns and pointed ears. According to one version, the man who paid for the monument, George Anson, wrote an abbreviation of the Latin saying "Optimae Uxoris Optimae Sororis Viduus Amantissimus Vovit Virtutibus", which means "To the best of wives, best of sisters, devoted widower dedicates this to your virtues."

Former CIA linguist Keith Massey linked these letters to John 14:6. Other researchers believe that the cipher is associated with Freemasonry. Former Bletchley Park analyst Oliver Lawn has suggested that the code may be a reference to Jesus' family tree, which is unlikely. Richard Kemp, head of the Shugborough estate, initiated an advertising campaign in 2004 that linked the inscription to the location of the Holy Grail.

Linear A

Linear A is a variation of the Cretan script containing hundreds of characters and has not yet been deciphered. It was used by several ancient Greek civilizations between 1850 and 1400 BC. After the Achaean invasion of Crete, it was replaced by Linear B, which was deciphered in the 1950s and turned out to be one of the earliest forms of the Greek language. Linear A has never been deciphered, and the codes for Linear B are not suitable for it. The reading of most of the signs is known, but the language remains incomprehensible. Mostly its traces were found in Crete, but there were written monuments in this language in mainland Greece, Israel, Turkey, and even in Bulgaria.

Linear A, which is said to be the forerunner of the Cretan-Minoan script, is believed to be exactly what can be seen on the Phaistos Disc, one of the most famous archaeological mysteries. It is a baked clay disk approximately 16 cm in diameter, dating from the second millennium BC. and found in the Phaistos Palace in Crete. It is covered in symbols of unknown origin and meaning.

1000 years after Crete-Minoan, Eteocretan appeared, which is not classified and may be somehow related to Linear A. It is written in the Greek alphabet, but it is definitely not Greek.

Dorabella cipher

The English composer Edward Elgar was also very interested in cryptology. In memory of him, the first cipher machines of the early 20th century were named after his work Enigma Variations. Enigma machines were able to encrypt and decrypt messages. Elgar sent his girlfriend Dora Penny "a note to Dorabella" - that's what he called a girlfriend who was twenty years his junior. He was already happily married to another woman. Maybe he had an affair with Penny? She never deciphered the code he sent her, and no one else has ever been able to.

Bale cryptograms

The Virginia man who creates ciphers for the secrets of hidden treasures is Dan Brown's stuff, not the real world. In 1865, a pamphlet was published describing a huge treasure that would be worth over $60 million today. It has allegedly been buried in Bedford County for 50 years. Perhaps the person who did this, Thomas J. Bale, never existed. But the pamphlet indicated that Bale gave the box of three encrypted messages to the hotel owner, who did nothing with them for decades. Bale was never heard from again.

Bale's only report that has been deciphered states that the author left a huge amount of gold, silver, and jewels in a stone cellar six feet deep. It also says that another cipher describes the exact location of the cellar, so there should be no difficulty in finding it. Some skeptics believe that Bale's treasure is a duck that was successfully used to sell pamphlets at 50 cents, which would be $13 in today's money.

Zodiac Killer Mysteries

A notorious California serial killer known as the Zodiac taunted the San Francisco police with several ciphers, claiming that some of them would reveal the location of bombs planted throughout the city. He signed letters with a circle and a cross - a symbol denoting the Zodiac, the celestial belt of thirteen constellations.

The Zodiac also sent three letters to three different newspapers, each containing a third of the 408-character cipher. A schoolteacher from Salinas saw the symbols in the local newspaper and deciphered the cipher. The message said, "I like killing people because it's so much fun. It's more fun than killing wild animals in the forest because man is the most dangerous animal of all. Killing gives me the most thrill. It's even better than sex. The best is waiting for me to die. I will be born again in paradise, and all those I have killed will become my slaves. I won't tell you my name because you'll want to slow down or stop the recruitment of slaves for my afterlife."

The zodiac claimed responsibility for killing 37 people and was never found. He has imitators all over the world.

Taman Shud

In December 1948, a man's body was found on Somerton Beach in Australia. The identity of the deceased could not be established, and the case is shrouded in mystery to this day. The man may have been killed with a non-marking poison, but even the cause of death is unknown. The Somerton man was dressed in a white shirt, tie, brown knit pullover, and tan jacket. The clothes tags had been cut off and the wallet was missing. The teeth did not match any available dental records.

In the pocket of an unknown person, they found a piece of paper with the words "tamam shud", or "finished" in Persian. Later, when publishing material on this topic in one of the newspapers, a typo was made: instead of “Tamam”, the word “Taman” was printed, as a result of which the erroneous name entered the story. It was a fragment of a page from a rare edition of the Rubaiyat collection by the 12th-century Persian poet Omar Khayyam. The book was found and the inside cover was inscribed with a local phone number and an encrypted message. In addition, a suitcase with belongings was found in the storage room of a nearby railway station, but this did not help to identify the victim. Was the Somerton man a deep-cover Cold War spy? Amateur cryptographer? Years pass, but the researchers have not come close to unraveling.

Blitz ciphers

This riddle is the newest of all listed, as it was only made public in 2011. Blitz ciphers are a few pages discovered during World War II. They lay for years in wooden boxes in one of the basements of London, which was opened as a result of German bombing. One soldier took these papers with him, and it turned out that they were full of strange drawings and encrypted words. The documents contain over 50 unique calligraphic-like characters. It is not possible to date the documents, however, according to the popular version, blitz ciphers are the work of occultists or Freemasons of the 18th century.

In substitution ciphers (or substitution ciphers), in contrast to , the elements of the text do not change their sequence, but change themselves, i.e. the original letters are replaced with other letters or symbols (one or more) according to certain rules.

This page describes ciphers in which the substitution takes place on letters or numbers. When the replacement occurs for some other non-alphanumeric characters, for combinations of characters or patterns, this is called direct.

Monoalphabetic ciphers

In monoalphabetic substitution ciphers, each letter is replaced by one and only one other letter/symbol or group of letters/symbols. If there are 33 letters in the alphabet, then there are 33 substitution rules: what to change A to, what to change B to, etc.

Such ciphers are quite easy to decrypt even without knowing the key. This is done using frequency analysis ciphertext - you need to count how many times each letter occurs in the text, and then divide by the total number of letters. The resulting frequency must be compared with the reference. The most common letter for the Russian language is the letter O, followed by E, and so on. True, frequency analysis works on large literary texts. If the text is small or very specific in terms of the words used, then the frequency of the letters will differ from the reference, and more time will have to be spent on solving. Below is a table of the frequency of letters (that is, the relative frequency of letters found in the text) of the Russian language, calculated on the basis of NKRYA.

The use of the frequency analysis method to decrypt encrypted messages is beautifully described in many literary works, for example, Arthur Conan Doyle in the novel "" or Edgar Poe in "".

It is easy to compile a code table for a monoalphabetic substitution cipher, but it is quite difficult to remember it and it is almost impossible to restore it if lost, so some rules for compiling such code pages are usually invented. Below are the most famous of these rules.

random code

As I wrote above, in the general case, for the replacement cipher, you need to figure out which letter to which should be replaced. The simplest thing is to take and randomly mix the letters of the alphabet, and then write them out under the line of the alphabet. Get a code table. For example, like this:

The number of variants of such tables for 33 letters of the Russian language = 33! ≈ 8.683317618811886*10 36 . From the point of view of encrypting short messages, this is the most ideal option: in order to decrypt, you need to know the code table. It is impossible to sort through such a number of options, and if you encrypt a short text, then frequency analysis cannot be applied.

But for use in quests, such a code table must be presented somehow more beautifully. The solver must first either simply find this table or solve a certain verbal-literal riddle. For example, guess or solve.

Keyword

One of the options for compiling a code table is to use a keyword. We write down the alphabet, under it we first write down a keyword consisting of non-repeating letters, and then we write out the remaining letters. For example, for the word "manuscript" we get the following table:

As you can see, the beginning of the table is shuffled, but the end remains unshuffled. This is because the most “senior” letter in the word “manuscript” is the letter “U”, and after it the unmixed “tail” remained. The letters in the tail will remain unencoded. You can leave it like that (since most of the letters are still encoded), or you can take a word that contains the letters A and Z, then all the letters will mix up, and there will be no “tail”.

The keyword itself can also be pre-specified, for example, using or . For example, like this:

Having solved the arithmetic rebus-frame and matching the letters and numbers of the encrypted word, then you will need to enter the resulting word into the code table instead of numbers, and enter the remaining letters in order. You get the following code table:

Atbash

The cipher was originally used for the Hebrew alphabet, hence the name. The word atbash (אתבש) is composed of the letters "alef", "tav", "bet" and "shin", that is, the first, last, second and penultimate letters of the Hebrew alphabet. This sets the substitution rule: the alphabet is written out in order, under it it is also written out backwards. Thus, the first letter is encoded into the last one, the second - into the penultimate one, and so on.

The phrase "TAKE IT TO THE EXCEPTION" is converted using this cipher into "ERCHGTZ BL R E VFNPPZHS". Atbash Cipher Online Calculator

ROT1

This cipher is known to many children. The key is simple: each letter is replaced by the one that follows it in the alphabet. So, A is replaced by B, B by C, etc., and Z is replaced by A. “ROT1” means “ROTate 1 letter forward through the alphabet” (English “rotate/shift the alphabet one letter forward”). The message "Gryuklokotam grunt at night" will become "Tsyalmplpubn tsyalmplpubnyu rp opshbn." ROT1 is fun to use because it's easy for even a child to understand and easy to use for encryption. But it's just as easy to decipher.

Caesar's cipher

The Caesar cipher is one of the oldest ciphers. During encryption, each letter is replaced by another, which is separated from it in the alphabet not by one, but by a greater number of positions. The cipher is named after the Roman emperor Gaius Julius Caesar, who used it for secret correspondence. He used a three-letter shift (ROT3). Many people suggest doing encryption for the Russian alphabet using this shift:

I still think that there are 33 letters in Russian, so I propose this code table:

Interestingly, in this version, the phrase “where is the hedgehog?” is read in the replacement alphabet :)

But after all, the shift can be done by an arbitrary number of letters - from 1 to 33. Therefore, for convenience, you can make a disk consisting of two rings rotating relative to each other on the same axis, and write letters of the alphabet on the rings in sectors. Then it will be possible to have at hand the key for the Caesar code with any offset. Or you can combine the Caesar cipher with atbash on such a disk, and you get something like this:

Actually, that's why such ciphers are called ROT - from the English word "rotate" - "rotate".

ROT5

In this option, only numbers are encoded, the rest of the text remains unchanged. There are 5 substitutions, so ROT5: 0↔5, 1↔6, 2↔7, 3↔8, 4↔9.

ROT13

ROT13 is a variation of the Caesar cipher for the Latin alphabet with a shift of 13 characters. It is often used on the Internet in English-language forums as a means to hide spoilers, main points, puzzle solutions, and offensive material from casual view.

The Latin alphabet of 26 letters is divided into two parts. The second half is written under the first. When encoding, letters from the top half are replaced by letters from the bottom half and vice versa.

ROT18

Everything is simple. ROT18 is a combination of ROT5 and ROT13 :)

ROT47

There is a more complete version of this cipher - ROT47. Instead of using the A-Z alphabetical sequence, ROT47 uses a larger character set, almost all of the display characters from the first half of the ASCII table. Using this cipher, you can easily encode url, e-mail, and it will not be clear what exactly it is url and e-mail :)

For example, a link to this text would be encrypted like this: 9EEAi^^ [email protected]]CF^82>6D^BF6DE^4CJAE^4:A96C^K2> [email protected] Only an experienced guesser will be able to guess from the doubles of characters repeated at the beginning of the text that 9EEAi^^ can mean HTTP:⁄⁄ .

Polybius Square

Polybius is a Greek historian, commander and statesman who lived in the 3rd century BC. He proposed an original code for a simple replacement, which became known as "Polybius square" or Polybius's chessboard. This type of coding was originally used for the Greek alphabet, but then it was extended to other languages. The letters of the alphabet fit into a square or a suitable rectangle. If there are more letters for the square, then they can be combined in one cell.

Such a table can be used as in the Caesar cipher. To encrypt on a square, we find the letter of the text and insert the lower one from it in the same column into the encryption. If the letter is in the bottom row, then we take the top one from the same column. For Cyrillic, you can use the table ROT11(an analogue of the Caesar cipher with a shift of 11 characters):

The letters of the first line are encoded into the letters of the second, the second - into the third, and the third - into the first.

But it is better, of course, to use the "chip" of the Polybius square - the coordinates of the letters:

    Under each letter of the encoded text we write in a column two coordinates (top and side). You will get two lines. Then we write out these two lines in one line, split it into pairs of numbers and using these pairs as coordinates, again encode according to the Polybius square.

    It can be complicated. The initial coordinates are written out in a line without splitting into pairs, shifted by odd the number of steps, split the result into pairs and encode again.

Polybius Square can also be created using a code word. First, the code word is entered into the table, then the remaining letters. The code word must not contain repeated letters.

A variant of the Polybius cipher is used in prisons by tapping out the coordinates of the letters - first the line number, then the number of the letter in the line.

Poetic cipher

This encryption method is similar to the Polybius cipher, only the key is not the alphabet, but a poem that fits line by line into a square of a given size (for example, 10 × 10). If the line is not included, then its "tail" is cut off. Further, the resulting square is used to encode the text letter by letter with two coordinates, as in the Polybius square. For example, we take a good verse "Borodino" by Lermontov and fill in the table. We notice that the letters Yo, Y, X, W, W, Y, E are not in the table, which means we cannot encrypt them. The letters are, of course, rare and may not be needed. But if they are still needed, you will have to choose another verse that has all the letters.

RUS/LAT

Probably the most common cipher :) If you try to write in Russian, forgetting to switch to the Russian layout, you get something like this: Tckb gsnfnmcz gbcfnm gj-heccrb? pf,sd gthtrk.xbnmcz yf heccre. hfcrkflre? nj gjkexbncz xnj-nj nbgf "njuj^ Why not a cipher? The most that neither is a replacement cipher. The keyboard acts as a code table.

The conversion table looks like this:

Litorrhea

Litorea (from lat. littera - letter) - secret writing, a kind of ciphered writing used in ancient Russian handwritten literature. There are two types of litorea: simple and wise. A simple, otherwise called gibberish letter, is as follows. If "e" and "e" are counted as one letter, then thirty-two letters remain in the Russian alphabet, which can be written in two rows - sixteen letters each:

You get the Russian analogue of the ROT13 cipher - ROT16:) When encoding, the upper letter is changed to the lower one, and the lower one to the upper one. An even simpler version of litorea leaves only twenty consonants:

It turns out a cipher ROT10. When encrypting, only consonants are changed, while vowels and others that are not included in the table are left as is. It turns out something like “dictionary → lsosh”, etc.

The wise littoria involves more complex substitution rules. In various versions that have come down to us, substitutions of entire groups of letters are used, as well as numerical combinations: each consonant letter is assigned a number, and then arithmetic operations are performed on the resulting sequence of numbers.

Bigram encryption

Playfair cipher

The Playfair cipher is a manual symmetrical encryption technique that pioneered the use of bigram substitution. Invented in 1854 by Charles Wheatstone. The cipher provides for the encryption of pairs of characters (bigrams), instead of single characters, as in the substitution cipher and in more complex Vigenère encryption systems. Thus, the Playfair cipher is more resistant to cracking than the simple substitution cipher, since frequency analysis is more difficult.

The Playfair cipher uses a 5x5 table (for the Latin alphabet, for the Russian alphabet it is necessary to increase the size of the table to 6x6) containing a keyword or phrase. To create a table and use a cipher, just remember the keyword and four simple rules. To create a key table, first of all, you need to fill in the empty cells of the table with the letters of the keyword (without writing down repeated characters), then fill in the remaining cells of the table with alphabetic characters that are not found in the keyword, in order (in English texts, the “Q” character is usually omitted, to reduce the alphabet, in other versions "I" and "J" are combined into one cell). The keyword and subsequent letters of the alphabet can be entered into the table line by line from left to right, boustrophedon or in a spiral from the upper left corner to the center. The keyword, completed with the alphabet, makes up a 5x5 matrix and is the cipher key.

In order to encrypt a message, it is necessary to break it into bigrams (groups of two characters), for example "Hello World" becomes "HE LL OW OR LD", and find these bigrams in the table. The two bigram symbols correspond to the corners of the rectangle in the key table. Determine the positions of the corners of this rectangle relative to each other. Then, guided by the following 4 rules, we encrypt pairs of characters in the source text:

    1) If two bigram characters match, add “X” after the first character, encrypt a new pair of characters and continue. In some versions of the Playfair cipher, "Q" is used instead of "X".

    2) If the bigram characters of the source text occur in one line, then these characters are replaced by the characters located in the nearest columns to the right of the corresponding characters. If the character is the last character in the string, then it is replaced with the first character of the same string.

    3) If the bigram characters of the source text occur in one column, then they are converted to the characters of the same column, located directly below them. If the character is the bottom character in a column, then it is replaced by the first character of the same column.

    4) If the bigram symbols of the source text are in different columns and different rows, then they are replaced by symbols located in the same rows, but corresponding to other corners of the rectangle.

For decryption, it is necessary to use the inversion of these four rules, discarding the characters "X" (or "Q"), if they do not make sense in the original message.

Consider an example of composing a cipher. We use the "Playfair example" key, then the matrix will look like:

Let's encrypt the message "Hide the gold in the tree stump". We break it into pairs, not forgetting the rule. We get: "HI DE TH EG OL DI NT HE TR EX ES TU MP". The following rules apply:

    1. Digram HI forms a rectangle, replace it with BM.

    2. Digram DE is located in one column, we replace it with ND.

    3. Digram TH forms a rectangle, we replace it with ZB.

    4. Digram EG forms a rectangle, replace it with XD.

    5. Bigram OL forms a rectangle, we replace it with KY.

    6. Bigram DI forms a rectangle, we replace it with BE.

    7. Bigram NT forms a rectangle, we replace it with JV.

    8. Digram HE forms a rectangle, we replace it with DM.

    9. Digram TR forms a rectangle, we replace it with UI.

    10. Digram EX is in one line, replace it with XM.

    11. Bigram ES forms a rectangle, we replace it with MN.

    12. Digram TU is in one line, replace it with UV.

    13. Digram MP forms a rectangle, we replace it with IF.

We get the ciphertext "BM ND ZB XD KY BE JV DM UI XM MN UV IF". Thus the message "Hide the gold in the tree stump" is converted to "BMNDZBXDKYBEJVDMUIXMMNUVIF".

Wheatstone double square

Charles Wheatstone developed not only the Playfair cipher, but also another bigram encryption method, which is called the "double square". The cipher uses two tables at once, placed along the same horizontal line, and the encryption goes in digrams, as in the Playfair cipher.

There are two tables with Russian alphabets randomly located in them.

Before encryption, the original message is divided into digrams. Each digram is encrypted separately. The first letter of the digram is found in the left table, and the second letter is found in the right table. Then they mentally build a rectangle so that the bigram letters lie at its opposite vertices. The other two vertices of this rectangle give the letters of the digram of the ciphertext. Let us assume that the bigram of the initial text of the IL is encrypted. The letter AND is in column 1 and row 2 of the left table. The letter L is in column 5 and row 4 of the right table. This means that the rectangle is formed by rows 2 and 4, as well as columns 1 of the left table and 5 of the right table. Therefore, the ciphertext digram includes the letter O, located in column 5 and row 2 of the right table, and the letter B, located in column 1 and row 4 of the left table, i.e. we get the bigram of the ciphertext OB.

If both letters of the digram of the message lie in the same line, then the letters of the ciphertext are taken from the same line. The first letter of the bigram of the ciphertext is taken from the left table in the column corresponding to the second letter of the bigram of the message. The second letter of the bigram of the ciphertext is taken from the right table in the column corresponding to the first letter of the bigram of the message. Therefore, the digram of the TO message turns into a bigram of the ciphertext ZB. All digrams of the message are encrypted in a similar way:

Message

Ciphertext PE OV SCHN FM ESH RF BZh DC

Encryption using the "double square" method gives a very resistant to opening and easy to use cipher. Breaking the "double square" ciphertext requires a lot of effort, while the length of the message must be at least thirty lines, and without a computer it is not realistic at all.

Polyalphabetic ciphers

Vigenère cipher

The Vigenère cipher became a natural development of the Caesar cipher. Unlike monoalphabetic ciphers, this is already a polyalphabetic cipher. The Vigenère cipher consists of a sequence of several Caesar ciphers with different shift values. For encryption, a table of alphabets called "tabula recta" or "Vigenere square (table)" can be used. Each stage of encryption uses different alphabets, selected depending on the letter of the keyword.

For Latin, the Vigenère table might look like this:

For the Russian alphabet like this:

It is easy to see that the rows of this table are ROT ciphers with a successively increasing shift.

Encryption is as follows: under the line with the source text, the keyword is cyclically written into the second line until the entire line is filled. Each letter of the source text below has its own key letter. Further in the table we find the encoded letter of the text in the top line, and the letter of the code word on the left. At the intersection of the column with the original letter and the row with the code letter, the desired encrypted letter of the text will be located.

An important effect achieved when using a polyalphabetic cipher such as the Vigenère cipher is the masking of the frequencies of the occurrence of certain letters in the text, which simple substitution ciphers lack. Therefore, it will no longer be possible to apply frequency analysis to such a cipher.

To encrypt with the Vigenère cipher, you can use Vigenère cipher online calculator. For various variants of the Vigenère cipher with a right or left shift, as well as with the replacement of letters with numbers, you can use the tables below:

Gronsveld cipher

book cipher

If, however, a whole book (for example, a dictionary) is used as a key, then it is possible to encrypt not individual letters, but whole words and even phrases. Then the coordinates of the word will be the page number, the line number and the number of the word in the line. There are three numbers for each word. You can also use the book's internal notation - chapters, paragraphs, and so on. For example, it is convenient to use the Bible as a code book, because there is a clear division into chapters, and each verse has its own marking, which makes it easy to find the desired line of text. True, there are no modern words like “computer” and “internet” in the Bible, so for modern phrases it is better, of course, to use an encyclopedic or explanatory dictionary.

These were substitution ciphers in which letters are replaced by others. And there are also in which the letters are not replaced, but mixed with each other.