Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
FBI Codes Ciphers and Concealments Example

FBI Codes Ciphers and Concealments Example

Ratings: (0)|Views: 289 |Likes:
Published by Jason Smathers

More info:

Published by: Jason Smathers on Oct 29, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/10/2013

pdf

text

original

 
Law Enforcement Sensitive
CODES, CIPHERS AND CONCEALMENTSEXAMPLES
The purpose of this handout is to demonstrate various cryptic systems for recognition purposes. Thesesystems are not limited to the examples shown in this handout. There are many systems in use, many of which use a combination of the cryptic systems shown throughout this handout, and other more complexsystems. The examples are grouped by groups: ciphers, concealment and codes. If you wish additionalinformation on these systems, there are numerous examples on the internet.
CIPHERS
Refers to the process of replacing true characters of a readable message with different characters (i.e.numbers, letters, symbols or a combination of these) in order to encrypt a message. The true characters arecommonly referred to as
plain text
 and the encrypted characters are referred to as
cipher text
.
SUBSTITUTION CIPHERSSimple Substitution Cipher: 
The following is an example of a substitution cipher system using symbols toencrypt the message,
“MEET ME AT THE MALL”.
The message is enciphered by replacing each plain textcharacter with its respective symbol on the cipher key provided below:
Plain text
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher text
: @ # $ % ^ & * ( ) - + = [ ] < > } {
~ ? / \ | ;
Plain text: M E E T M E A T T H E M A L LEncryption: = % % = % : * % = : + +
Caesar Shift:
 
In the Caesar shift cipher system, the plain text is shifted by one or more characters to theright or left, and is used as the cipher text to represent the plain text letter in the alphabet above it. Thefollowing is an example of a Caesar shift 1 cipher.In this example, the plain text
L
is enciphered with the cipher text
M
. The phrase 'Lucky Dog' would beenciphered as follows:
Plain text:
 
L
 
U
 
C
 
K
 
 Y
 
D
 
O
 
G
 
Encryption:
 
M
 
V
 
D
 
L
 
Z
 
E
 
P
 
H
 
Plain text
 
 
A B C D E F G H I J K L M N O P Q R S T U V W X Y ZB C D E F G H I J K L M N O P Q R S T U V W X Y Z A
Cipher text
 
 
CODES, CIPHERS AND CONCEALMENTS
2
Masonic-based Cipher: 
This system employs the use of a template pattern using tic-tac-toe and“X” patterns. The letters of the alphabet are placed in the templates as in the order determined by thewriter. Each Plain text letter is encrypted by extracting the shape of the pattern that surrounds thePlain text letter. The dots are placed in the template to prevent duplication of the patterns, thusavoiding confusion. Some systems use variations of this system, such as using 3 tic-tac-toe patternswith two dots in the third template or using another character or symbol in place of the dots.
Below is an example of the encryption for the phrase
“CIPHER KEY” .
 
C I P H E R K E Y
A B C D E FG H I J K LM N O P Q
 
TXS U W YVZ
 
CODES, CIPHERS AND CONCEALMENTS
3
Telephone Keypad
:
A telephone keypad can be used to encipher a message or numbers. Using this keypadwe can encipher the phrase, “
THE EAGLE HAS ARRIVED
” by replacing each character with the number on the corresponding button on the keypad:
T H E E A G L E H A S A R R I V E D8 4 3 3 2 4 5 3 4 2 7 2 7 7 4
 
8 3 3
 Or you can encipher a numbers, for example:
2 0 2 5 5 5 4 2 3 4B 0 C L J K H C F G
(Note: When this system is used to encrypt letters, it is more difficult to decrypt, as one number can encryptthree letters. ) 
Keyword Numeric Cipher:
 
Keyword numeric ciphers can be used to encrypt numbers, especiallytelephone numbers, addresses, weights, and money amounts. Normally, these keywords are ten-letter wordswith no repeat letters. The following is a key using the keyword
BLACKHORSE
, notice that there are norepeats in the word
.
Plain text:
 
1 2 3 4 5 6 7 8 9 0Cipher text: B L A C K H O R S E
Using the above the number 
12,500 
would be enciphered:
BLKEE 
Dinomic Cipher System:
 
In the dinomic substitution cipher system, each plain text character is replaced bytwo digits (i.e. row number, column number of the cipher key).Example:
HIT GRUMPY AT 7 PM 
22 23 42 21 36 43 31 34 51 11 42 64 34 31H I T G R U M P Y A T 7 P

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Delbert Waggoner liked this
Delbert Waggoner liked this
bhbatson liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->