Charlemagne Cipher

:

simple Number Substitution code: This code is very easy to solve. Each number stands for a letter.

Reverse Alphabet Code: In this code, each letter in the code stands for a different “real” letter. A stands for Z B stands for Y C stands for X etc.

Mary Queen of Scots Code:

Playfair Cipher: First a keyword is needed, for this example CHARLES will be used. Next, before encryption, alphabet are written in a 5x5 square, beginning with the keyword and I&J in a single element. C E G O V H A R S B D I/J K M P Q T W X Y L F N U Z

Now, the message is broken up into pairs of letters, of digraphs. The two letters in any digraph should be different, achieved in the following example by inserting an extra x between same letters. Plain text: meet me at hammersmith bridge tonight plain text in digraphs: me-et-me-at-ha-mx-me-rs-mi-th-br-id-ge-to-ni-gh-tx Encryption can now begin. All digraphs fall into one of three categories - both letters in same row, or same column, or neither. -1- same row: replaced by letter immediate right of each. MI becomes NK if one letter is at the end of row, it is replaced by letter at beginning; thus NI becomes GK. -2- both letters in same column: replaced by letter immediately beneath each. GE becomes OG if one letter is at bottom of column, replace by letter at top; thus VE becomes CG. -3- letters are neither in same row or column. To encipher the first letter, look along its row until you reach the column containing the second letter; the letter at this intersection then replaces the first letter. To encipher second letter, look along its row until your reach the column containing the first letter; the letter at this intersection replaces second letter. Hence, ME becomes GD, and ET becomes DO.

Data Shift Cipher: Pick a date (month / day / year) using a 0 in front of any single digits. Write out the date, without slash marks. Write out the message and then under write the date, continuously. Now shift each letter of the plaintext by number written under it. Using the “wrap around” continuous letters from Z go back to A, B,C etc. Example use 110466 (my birth date). Data Shift Ci pher 1 1 0 4 6 6 11 0 4 6 6 1 1 0 D=E A=B T=T A= D Data will then be EBTD

Decoding all that is needed is the key number. Write the key number under the letters and then reversing you can decode.

Substitute code: As an example: A D H I K V X M O R S U W Y Z L N E P P T

B G J C Q

With this code A=V and V=A and so on. This code can be arranged in any way desired. Half the letters on top and half on bottom, each letter is reversed with the other. Code would be MQXU.

Navajo Code: A B C D E F G H I Ant Bear Cat Deer Elk Fox Goat Horse Ice Wol-la-chee Shush Moasi Be Dzeh Ma-e Klizzie Lin Tkin

A B C D E F G H I J etc. per row. one row at a time. Remember to skip the letters in you “codeword” when you finish the alphabet. using the code word (a word that doesn’t repeat letters) place each letter under the plain text alphabet. Example code word is newsboy. Block cipher = Bloc kcip her! From here you can re-write the code from left to right and from top to bottom. n e w s b o y a c d etc. Now. Once . Bkhlceoircp! Codeword Cipher: This code is based on a special code word. in plain text.J K L M N O P Q R S T U V W X Y Z Jackass Kid Lamb Mouse Nut Owl Pig Quiver Rabbit Sheep Turkey Ute Victor Weasel Cross Yucca Zinc Tkele-cho-gi Klizzie-yazzi Dibeh-yazzi Na-as-tso-si Nesh-chee Ne-ahs-jsh Bi-sodih Ca-yeilth Gah Dibeh Than-zie No-do-ih A-keh-ki-glini Gloe-ih Al-an-as-dzoh Tsah-as-zih Besh-do-gliz Block Cipher: Write message in a rectangular block. Write out the alphabet.

A B C D E F G H I J K L M N O P Q A = N and R S T UV WX Y Z N = A and so on.Reversed Alphabet: Just write out the letters from A to M. Example : = n B = e C = w etc. A Half .the entire alphabet is “coded” use the “code” of the plain text to leave a message. and write the letters from N to Z directly below them. Example: Half would be coded as : UNYS “Break This Code” = oernx guvf pbqr .

. Example: one back of a card = J a back and a 5 = 15 = O an Ace and back = 11 = K a 5 = E a back and an 8 = 18 = R. So that = JOKER.Hiding among the Diamonds: Using a deck of cards you can leave messages. Aces = 1 Back of a card = 10 and the number cards = their number. By looking at the numerals and adding them sum will create a letter from the alphabet.

Using a drawing of a skyscraper you can use the three symbols as a line down = 1.5 and 10. Using various combinations to create a number from 1-26 will be a letter. .Skyscraper: Using any number to equal a letter. Using three symbols to equal 1. a color box for 5 and another color box for 10. Making them “windows” in the skyscraper you can create letters.

.Moth Codes: Using morse code you can place them on wings of moth’s to send a code.

A pre constructed ruler using alphabet can indicate letter. Arranging the four colors in various orders creates letters. Yellow (or any other colors or symbols) Another example: [ ] { } in various orders. This also works as far as page. []{} = A []}{ = B ][{} = C and so on to create 24 various letters can combine I/J and Y/Z to form a full alphabetical code. paragraph and word or letter. From a computer you can use the ruler bar to indicate letter position.Word .Color Dot Code: Four colors give you 24 patterns. Or use clouds or any objects. As well you can use dots on a letter or picture or these dots could be small bees or butterflys. a newspaper or book of some kind. Using any four symbols in various orders. word or letter. i. Each triple set of numbers represent a paragraph. Green. Picture / Dot Messages: Creating pictures to indicate dots and dashes to make morse code. depending on were object is located. etc. Example is black birds. .Letter: This type of code refers to a specific piece of text. Small birds are dots and larger one’s being dashes. it’s the position not the letter that indicates letter. Paragraph . Second is the word and the third is the letter. First number is the paragraph. (Every other mark =’s a letter) Just place a letter or symbol at that position. Colored dots: Red.e. Blue.

is the letters of the first line.1590 Columnar Transposition: First pick an eight (8) letter key word ( or one as long as there are rows) example will be using “Diplomat” Making an eight row grid 4 lines down you write message diplomat microfil mnillbea rriving b ycourier The message : “microfilm will be arriving by courier” Now. A= 1. The fourth line is only a mislead. arranging the grouped letters in their proper places. L= 12. as does the third set of numbers and third line. Ex. D= 4. etc. (Coded word: Classified) Cider Sale Sifted Flour I have seeds Full service old time feed store Call: 1 (876) 127-1590 To add additional letters you can us a 800 or 900. The last line is the phone number. As ex. P= 16. Once you have completed the letters the message will appear. until the whole message is coded. under the key word. Deciphering the Columnar Knowing the keyword write out the keyword and below each letter write the letters that align with them. below the key word “diplomat” write the corresponding number as were the letter comes in the alphabet. The next three numbers decodes the second line. Now create a fourth line that is a Nul line. T=20 Using the order of letters A-Z write the letters from that row. Create a three line “ad” (this is were the message is hidden). . Knowing the key word you then go from A to Z in order. The area code.Classified Code: Used like (or as) a want ad in a newspaper. A(1)= iege D(4)= mmry. I= 9. 1 800 (876) 127 . in parentheses. M= 13. O= 15.. which is the Key to the code. EX. Zero (0) in a telephone number signals the end of a coded message.

but for these examples we will not be using a mixed alphabet cube. 311 213 213 311 112 332 212 111 121 213 212 211 132 The cube is used again to convert the numbers back into letters which gives us our cihertext. As with the Bifid Cipher. We will be writing the numbers vertically below the message in the order of Layer. you first convert each letter into its corresponding number via the cube.Trifid Cipher: The Trifid Cipher is the Bifid Cipher taken to one more dimension. Layer 1 1 2 3 1 2 3 a b c d e f g h i 1 2 3 Layer 2 1 2 3 j k l mn o pq r 1 2 3 Layer 3 1 2 3 s t u vw x yz . Now. Secret Message 311213 2133111 123322 1211112 121321 2211132 The numbers are then read off horizontally and grouped into triplets. Sppsdxmabpmjf To decipher a Trifid encrypted message. the cube can be mixed to add an extra layer of protection. Step one is to use the cube to convert the letters into numbers. Column. Row. read off each column and use the cube to convert the three numbers into the plaintext letter. Otherwise everything else remains the same. Now divide the long string of numbers into three equal rows. you use a 3x3x3 cube. Instead of using a 5x5 Polybius Square.

W hen a student thinks he or she has figured it out. fill in other letters between the letters of your message so that they form other words. Students will find the first letter of your last name in the left column and then find the corresponding code-letter in the column labeled with the num ber 1. For the sec ond letter of your last nam e. find that letter in the left column and write the corresponding code-letter found in the column labeled with the number 3…and so on. To read the message. Give students 5 to 10 minutes to try to find the pattern. (To mak e an easy job of correcting students' work. have that student use the code to write your last name. For the third letter of your last name. Jefferson Cipher: Have students use the coded message at the bottom of the cipher ("The m an whose mind on virtue bent. The code is fairly straightforward. students will find that letter in the left column and write the corresponding code-letter found in the column labeled with the number 2. (See the picture above. The letters of the alphabet read down the cipher chart. your friend places a ruler under the line of words. Then. The words shouldn't have anything to do with the real message.) Circle the last letter of your message. with the circle letter over an inch or a half-inch mark and copies off the letters at each inch and half-inch interval.Inch Word: Lay the ruler across the paper.") to try to figure out the pattern. placing each letter above the inch and the half-inch marks on the ruler.. Print your message in capital letters. . you will have figured out in advance the coded spelling of your last name.) Then let them work at coding their own names.. to confuse snoopers.

T is the second most common. so it represents A. so it is B. E is the most common letter. A B C D E F G H I J E T A O N R I S H D .Frequency: This code is based on the frequency of each letter.

K L M N O P Q R S T U V W X Y Z L F C M U G Y P W B V K X J Q Z Witches Alphabet: .

Pictswirl cipher: A A M M Y Y B B N N Z Z C C O O D D P P E E Q Q F F R R G G S S H H T T I I U U J J V V KL KL WX WX .

Tagalog cipher: A B C A B C D D E F G H I J KL E F G H I J KL M N O M N Y Z Y Z O P Q R S T U P Q R S T U V WX V WX Navajo Code Talkers' Dictionary REVISED A S OF 15 JUN E 1945 (DECLASSIFIED UN DER D EPART M ENT O F DEFEN SE DIRECTIVE 5200.9) ALPHABET A A A B B B C C C D D D E E E F F F NAVAJO WORD WOL-LA-CHEE BE-LA-SANA TSE-NILL NA-HASH-CHID SHUSH TOISH-JEH MOASI TLA-GIN BA-GOSHI BE CHINDI LHA-CHA-EH AH-JAH DZEH AH-NAH CHUO TSA-E-DONIN-EE MA-E LITERAL TRANSLATION ANT APPLE AXE BADGER BEAR BARREL CAT COAL COW DEER DEVIL DOG EAR ELK EYE FIR FLY FOX .

MAJOR GEN. NAVAJO WORD DIN-NEH-IH ASHIH-HI TABAHA TACHEENE NAKIA HAS-CLISH-NIH YO-IH DEBEH-LI-ZINI LITERAL TRANSLATION CLAN SALT EDGE WATER RED SOIL MEXICAN MUD BEADS BLACK SHEEP BIH-KEH-HE (G) SO-NA-KIH WAR CHIEF TWO STAR .G G G H H H I I I J J J K K K L L L M M M N N O O O P P P Q R R R S S T T T U U V W X Y Z AH-TAD KLIZZIE JEHA TSE-GAH CHA LIN TKIN YEH-HES A-CHI TKELE-CHO-G AH-YA-TSINNE YIL-DOI JAD-HO-LONI BA-AH-NE-DI-TININ KLIZZIE-YAZZIE DIBEH-YAZZIE AH-JAD NASH-DOIE-TSO TSIN-TLITI BE-TAS-TNI NA-AS-TSO-SI TSAH A-CHIN A-KHA TLO-CHIN NE-AHS-JAH CLA-GI-AIH BI-SO-DIH NE-ZHONI CA-YEILTH GAH DAH-NES-TSA AH-LOSZ DIBEH KLESH D-AH A-WOH THAN-ZIE SHI-DA NO-DA-IH A-KEH-DI-GLINI GLOE-IH AL-NA-AS-DZOH TSAH-AS-ZIH BESH-DO-TLIZ GIRL GOAT GUM HAIR HAT HORSE ICE ITCH INTESTINE JACKASS JAW JERK KETTLE KEY KID LAMB LEG LION MATCH MIRROR MOUSE NEEDLE NOSE OIL ONION OWL PANT PIG PRETTY QUIVER RABBIT RAM RICE SHEEP SNAKE TEA TOOTH TURKEY UNCLE UTE VICTOR WEASEL CROSS YUCCA ZINC NAMES OF VARIOUS ORGANIZATIONS CORPS DIVISION REGIMENT BATTALION COMPANY PLATOON SECTION SQUAD OFFICERS COMMANDING GEN.

SO-A-LA-IH COLONEL ATSAH-BESH-LE-GAI LT.BRIGADIER GEN. PLAN NE-AS-JAH FIGHTER PLANE DA-HE-TIH-HI BOMBER PLANE JAY-SHO PATROL PLANE GA-GIH TRANSPORT ATSAH NAMES OF SHIPS SHIPS BATTLESHIP AIRCRAFT SUBMARINE MINE SWEEPER DESTROYER TRANSPORT CRUISER MOSQUITO BOAT NAMES OF MONTHS JANUARY FEBRUARY MARCH APRIL MAY JUNE JULY AUGUST SEPTEMBER OCTOBER NOVEMBER DECEMBER ONE STAR SILVER EAGLE SILVER OAK LEAF GOLD OAK LEAF TWO SILVER BARS ONE SILVER BAR WAR CHIEF THOSE IN CHARGE BLACKIES WITH WINTER OUR MOTHER ROLLED HAT BETWEEN WATERS BRAIDED HAIR BEARD IRON HAT ICE LAND WHITE CLOTHES STUTTER SLANT EYE FLOATING ISLAND RED ARMY SOUTH OUR MOTHER SHEEP PAIN AIR FORCE CHICKEN HAWK SWALLOW OWL HUMMING BIRD BUZZARD CROW EAGLE TOH-DINEH-IH LO-TSO TSIDI-MOFFA-YE-HI BESH-LO CHA CA-LO DINEH-NAY-YE-HI LO-TSO-YAZZIE TSE-E SEA FORCE WHALE BIRD CARRIER IRON FISH BEAVER SHARK MAN CARRIER SMALL WHALE MOSQUITO ATSAH-BE-YAZ WOZ-CHEIND TAH-CHILL TAH-TSO TAH-TSOSIE BE-NE-EH-EH-JAH-TSO BE-NE-TA-TSOSIE BE-NEEN-TA-TSO GHAW-JIH NIL-CHI-TSOSIE NIL-CHI-TSO YAS-NIL-TES SMALL EAGLE SQUEEKY VOICE SMALL PLANT BIG PLANT SMALL PLANT BIG PLANTING SMALL HARVEST BIG HARVEST HALF SMALL WIND BIG WIND CRUSTED SNOW . COLONEL CHE-CHIL-BE-TAH-BESH-LEGAI MAJOR CHE-CHIL-BE-TAH-OLA CAPTAIN BESH-LEGAI-NAH-KIH LIEUTENANT BESH-LEGAI-A-LAH-IH COMMANDING OFFICER HASH-KAY-GI-NA-TAH EXECUTIVE OFFICER BIH-DA-HOL-NEHI NAMES OF COUNTRIES AFRICA ZHIN-NI ALASKA BEH-HGA AMERICA NE-HE-MAH AUSTRALIA CHA-YES-DESI BRITAIN TOH-TA CHINA CEH-YEHS-BESI FRANCE DA-GHA-HI GERMANY BESH-BE-CHA-HE ICELAND TKIN-KE-YAH INDIA AH-LE-GAI ITALY DOH-HA-CHI-YALI-TCHI JAPAN BEH-NA-ALI-TSOSIE PHILIPPINE KE-YAH-DA-NA-LHE RUSSIA SILA-GOL-CHI-IH SOUTH AMERICA SHA-DE-AH-NE-HI-MAH SPAIN DEBA-DE-NIH NAMES OF AIRPLANES PLANES WO-TAH-DE-NE-IH DIVE BOMBER GINI TORPEDO PLANE TAS-CHIZZIE OBS.

VOCABULARY WORD NAVAJO ABANDON YE-TSAN ABOUT WOLA-CHI-A-MOFFA-GAHN ABREAST WOLA-CHEE-BE-YIED ACCOMPLISH UL-SO ACCORDING BE-KA-HO ACKNOWLEDGE HANOT-DZIED ACTION AH-HA-TINH ACTIVITY AH-HA-TINH-Y ADEQUATE BEH-GHA ADDITION IH-HE-DE-NDEL ADDRESS YI-CHIN-HA-TSE ADJACENT BE-GAHI ADJUST HAS-TAI-NEL-KAD ADVANCE NAS-SEY ADVISE NA-NETIN AERIAL BE-ZONZ AFFIRMATIVE LANH AFTER BI-KHA-DI (A) AGAINST BE-NA-GNISH AID EDA-ELE-TSOOD AIR NILCHI AIRDOME NILCHI-BEGHAN ALERT HA-IH-DES-EE ALL TA-A-TAH (A) ALLIES NIH-HI-CHO ALONG WOLACHEE-SNEZ ALSO EH-DO ALTERNATE NA-KEE-GO-NE-NAN-DEY-HE AMBUSH KHAC-DA AMMUNITION BEH-ELI-DOH-BE-CAH-ALI-TAS-AI AMPHIBIOUS CHAL AND DO ANGLE DEE-CAHN ANNEX IH-NAY-TANI ANNOUNCE BEH-HA-O-DZE ANTI WOL-LA-CHEE-TSIN ANTICIPATE NI-JOL-LIH ANY TAH-HA-DAH APPEAR YE-KA-HA-YA APPROACH BI-CHI-OL-DAH APPROXIMATE TO-KUS-DAN ARE GAH-TSO BIG AREA HAZ-A-GIH ARMOR BESH-YE-HA-DA-DI-TEH ARMY LEI-CHA-IH-YIL-KNEE-IH ARRIVE IL-DAY ARTILLERY BE-AL-DOH-TSO-LANI AS AHCE ASSAULT ALTSEH-E-JAH-HE ASSEMBLE DE-JI-KASH ASSIGN BAH-DEH-TAHN AT AH-DI ATTACK AL-TAH-JE-JAY ATTEMPT BO-O-NE-TAH (A) ATTENTION GIHA AUTHENTICATOR HANI-BA-AH-HO-ZIN AUTHORIZE BE-BO-HO-SNEE AVAILABLE TA-SHOZ-TEH-IH LITERAL TRANSACTION RUN AWAY FROM ANT FIGHT ANT BREAST ALL DONE ACCORDING TO ACKNOWLEDGE PLACE OF ACTION ACTION ENDING IN Y ENOUGH ADDITION ADDRESS NEAR ADJUST AHEAD ADVISE STINGER AFFIRMATIVE AFTER AGAINST AID AIR AIRDOME ALERT ALL ALLIES LONG ANT ALSO SECOND POSITION AMBUSH AMMUNITION FROG AND SLANTING ADDITION ANNOUNCE ANT ICE ANTICIPATE ANY APPEAR APPROACH APPROXIMATE RABBIT AREA IRON PROTECTOR ARMY ARRIVE MANY BIG GUNS AS FIRST STRIKER BUNCH TOGETHER ASSIGN AT ATTACK TRY ATTENTION KNOW ABOUT AUTHORIZE AVAILABLE .

BAGGAGE BANZAI BARGE BARRAGE BARRIER BASE BATTERY BATTLE BAY BAZOOKA BE BEACH BEEN BEFORE BEGIN BELONG BETWEEN BEYOND BIVOUAC BOMB BOOBY TRAP BORNE BOUNDARY BULL DOZER BUNKER BUT BY KLAILH (B) NE-TAH BESH-NA-ELT BESH-BA-WA-CHIND BIH-CHAN-NI-AH BIH-TSEE-DIH BIH-BE-AL-DOH-TKA-IH DA-AH-HI-DZI-TSIO TOH-AH-HI-GHINH AH-ZHOL TSES-NAH TAH-BAHN (B) TSES-NAH-NES-CHEE BIH-TSE-DIH HA-HOL-ZIZ TSES-NAH-SNEZ BI-TAH-KIZ BILH-LA DI EHL-NAS-TEH A-YE-SHI DINEH-BA-WHOA-BLEHI YE-CHIE-TSAH KA-YAH-BI-NA-HAS-DZOH(B) DOLA-ALTH-WHOSH TSAS-KA NEH-DIH BE-GHA BAGGAGE FOOL THEM BARGE BARRAGE IN THE WAY BASE THREE GUNS BATTLE BAY BAZOOKA BEE BEACH BEE NUT BEFORE COMMENCE FROM LONG BEE BETWEEN DOWN BELOW BRUSH SHELTER EGGS MAN TRAP BORN ELK BOUNDARY BULL SLEEP SANDY HOLLOW BUT BY WIRE ROPE MOVE AROUND TEMPORARY PLACE HID CAN BIG GUN OPERATOR CAPACITY CAPTURE CARRY CASE PUT OUT OF ACTION CAUSE ROCK CAVE SEAL AMONG DEVILS CENTER CHANGE SMALL SINGER CHARGE ALKALI CIRCLE CIRCUIT CLASS CLEAR CLIFF CLOSE SHORE RUNNER PECK TWO SPOTS COLUMN FIGHTING MIXED COME CABLE BESH-LKOH CALIBER NAHL-KIHD CAMP TO-ALTSEH-HOGAN CAMOUFLAGE DI-NES-IH CAN YAH-DI-ZINI CANNONEER BE-AL-DOH-TSO-DEY-DIL-DON-IGI CAPACITY BE-NEL-AH CAPTURE YIS-NAH CARRY YO-LAILH CASE BIT-SAH CASUALTY BIH-DIN-NE-DEY CAUSE BI-NIH-NANI CAVE TSA-OND CEILING DA-TEL-JAY CEMETARY JISH-CHA CENTER ULH-NE-IH CHANGE THLA-GO-A-NAT-ZAH CHANNEL HA-TALHI-YAZZIE CHARGE AH-TAH-GI-JAH CHEMICAL TA-NEE CIRCLE NAS-PAS CIRCUIT AH-HEH-HA-DAILH CLASS ALTH-AH-A-TEH CLEAR YO-AH-HOL-ZHOD CLIFF TSE-YE-CHEE CLOSE UL-CHI-UH-NAL-YAH COAST GUARD TA-BAS-DSISSI CODE YIL-TAS COLON NAKI-ALH--DEH-DA-AL-ZHIN COLUMN ALTH-KAY-NE-ZIH COMBAT DA-AH-HI-JIH-GANH COMBINATION AL-TKAS-EI COME HUC-QUO .

COMMA COMMERCIAL COMMIT COMMUNICATION CONCEAL CONCENTRATION CONCUSSION CONDITION CONFERENCE CONFIDENTIAL CONFIRM CONQUER CONSIDER CONSIST CONSOLIDATE CONSTRUCT CONTACT CONTINUE CONTROL CONVOY COORDINATE COUNTER ATTACK COURSE CRAFT CREEK CROSS CUB DASH DAWN DEFENSE DEGREE DELAY DELIVER DEMOLITION DENSE DEPART DEPARTMENT DESIGNATE DESPERATE DETACH DETAIL DETONATOR DIFFICULT DIG IN DIRECT DISEMBARK DISPATCH DISPLACE DISPLAY DISPOSITION DISTRIBUTE DISTRICT DO DOCUMENT DRIVE DUD DUMMY EACH ECHELON TSA-NA-DAHL NAI-EL-NE-HI HUC-QUO-LA-JISH HA-NEH-AL-ENJI BE-KI-ASZ-JOLE TA-LA-HI-JIH WHE-HUS-DIL AH-HO-TAI BE-KE-YA-TI NA-NIL-IN TA-A-NEH A-KEH-DES-DLIN NE-TSA-CAS BILH (C) AH-HIH-HI-NIL AHL-NEH AH-HI-DI-DAIL TA-YI-TEH NAI-GHIZ TKAL-KAH-O-NEL BEH-EH-HO-ZIN-NA-AS-DZOH WOLTAH-AL-KI-GI-JEH CO-JI-GOH AH-TOH TOH-NIL-TSANH AL-N-AS-DZOH SHUSH-YAHZ US-DZOH HA-YELI-KAHN AH-KIN-CIL-TOH NAHL-KIHD BE-SITIHN BE-BIH-ZIHDE AH-DEEL-TAHI HO-DILH-CLA (D) DA-DE-YAH HOGAN YE-KHI-DEL-NEI AH-DA-AH-HO-DZAH AL-CHA-NIL BE-BEH-SHA AH-DEEL-TAHI (OR) NA-NE-KLAH LE-EH-GADE AH-JI-GO EH-HA-JAY LA-CHAI-EN-SEIS-BE-JAY HIH-DO-NAL BE-SEIS-NA-NEH A-HO-TEY NAH-NEH BE-THIN-YA-NI-CHE TSE-LE BEH-EH-HO-ZINZ AH-NOL-KAHL DI-GISS-YAHZIE DI-GISS-TSO TA-LAHI-NE-ZINI-GO (D) WHO-DZAH TAIL DROP COMMERCIAL COME GLOVE MAKING TALK CONCEAL ONE PLACE CONCUSSION HOW IT IS TALK OVER KEPT SECRET MAKE SURE WON THINK IT OVER CONSIST PUT TOGETHER TO MAKE COME TOGETHER CONTINUE CONTROL MOVING ON WATER KNOWN LINES COUNTER ACT COURSE NEST VERY LITTLE WATER CROSS CUB DASH DAWN DEFENSE DEGREE DEER LAY DEER LIVER BLOW UP WET DEPART DEPARTMENT POINT OUT DOWN TO LAST DETACHED DEER TAIL BLOWN UP DIFFICULT DIG IN DIRECT GET OUT DOG IS PATCH MOVE DEER IS PLAY DISPOSITION DISTRIBUTE DEER ICE STRICT SMALL PUP DOCUMENT DRIVE SMALL DUMMY BIG DUMMY EACH LINE .

EDGE EFFECTIVE EFFORT ELEMENT ELEVATE ELIMINATE EMBARK EMERGENCY EMPLACEMENT ENCIRCLE ENCOUNTER ENGAGE ENGINE ENGINEER ENLARGE ENLIST ENTIRE ENTRENCH ENVELOP EQUIPMENT ERECT ESCAPE ESTABLISH ESTIMATE EVACUATE EXCEPT EXCEPT EXCHANGE EXECUTE EXPLOSIVE EXPEDITE EXTEND EXTREME FAIL FAILURE FARM FEED FIELD FIERCE FILE FINAL FLAME THROWER FLANK FLARE FLIGHT FORCE FORM FORMATION FORTIFICATION FORTIFY FORWARD FRAGMENTATION FREQUENCY FRIENDLY FROM FURNISH FURTHER GARRISON GASOLINE BE-BA-HI BE-DELH-NEED YEA-GO AH-NA-NAI ALI-KHI-HO-NE-OHA HA-BEH-TO-DZIL EH-HO-JAY HO-NEZ-CLA LA-AZ-NIL YE-NAS-TEH (E) BI-KHANH A-HA-NE-HO-TA CHIDI-BI-TSI-TSINE (E) DAY-DIL-JAH-HE NIH-TSA-GOH-AL-NEH BIH-ZIH-A-DA-YI-LAH TA-A-TAH (E) E-GAD-AH-NE-LIH A-ZAH-GI-YA YA-HA-DE-TAHI YEH-ZIHN A-ZEH-HA-GE-YAH HAS-TAY-DZAH BIH-KE-TSE-HOD-DES-KEZ HA-NA NEH-DIH (E) NA-WOL-NE ALH-NAHL-YAH A-DO-NIL AH-DEL-TAHI (E) SHIL-LOH (E) NE-TDALE AL-TSAN-AH-BAHM CHA-AL-EIND YEES-GHIN MAI-BE-HE-AHGAN DZEH-CHI-YON CLO-DIH (F) TOH-BAH-HA-ZSID BA-EH-CHEZ TAH-AH-KWO-DIH COH-AH-GHIL-TLID DAH-DI-KAD WO-CHI MA-E-AS-ZLOLI TA-NA-NE-LADI BE-CHA BE-CHA-YE-LAILH AH-NA-SOZI AH-NA-SOZI-YAZZIE TEHI BESH-YAZZIE HA-TALHI-TSO NEH-HECHO-DA-NE BI-TSAN-DEHN YEAS-NIL (F) WO-NAS-DI YAH-A-DA-HAL-YON-IH CHIDI-BI-TOH EDGE EFFECTIVE WITH ALL YOUR MIGHT TROOP REPRESENTING OTHERS ELEVATE ELIMINATE GET ON EMERGENCY EMPLACEMENT ENCIRCLE GO AGAINST AGREED ENGINE ENGINEER MAKE BIG ENLIST ENTIRE MAKE DITCH ENVELOP EQUIPMENT STAND UP ESCAPE ESTABLISH ESTIMATE EVACUATE EXCEPT EXPECT EXCHANGE EXECUTE EXPLOSIVE SPEED UP MAKE WIDE EACH END FAIL FAILURE FOX ARM FEED FIELD AFRAID FILE THAT IS ALL FLAME THROWER FLANK LIGHT STREAK FOX LIGHT WITHOUT CARE FORM FORMATION CLIFF DWELLING SMALL FORTIFICATION LET'S GO SMALL METAL BIG SINGER FRIENDLY FROM FURNISH FURTHER TAKE CARE OF GASOLINE .

GRENADE GUARD GUIDE HALL HALF TRACK HALT HANDLE HAVE HEADQUARTER HELD HIGH HIGH EXPLOSIVE HIGHWAY HOLD HOSPITAL HOSTILE HOWITZER ILLUMINATE IMMEDIATELY IMPACT IMPORTANT IMPROVE INCLUDE INCREASE INDICATE INFANTRY INFILTRATE INITIAL INSTALL INSTALLATION INSTRUCT INTELLIGENCE INTENSE INTERCEPT INTERFERE INTERPRET INVESTIGATE INVOLVE IS ISLAND ISOLATE JUNGLE KILL KILOCYCLE NI-MA-SI NI-DIH-DA-HI NAH-E-THLAI POTATOES GUARD GUIDE LHI-TA-A-TA HORSE ALL ALH-NIH-JAH-A-QUHE RACE TRACK TA-AKWAI-I HALT BET-SEEN HANDLE JO HAVE NA-HA-TAH-TA-BA-HOGAN HEADQUARTER WO-TAH-TA-EH-DAHN-OH HELD (PAST TENSE) WO-TAH HIGH BE-AL-DOH-BE-CA-BIH-DZIL-IGI POWERFUL SHELL WO-TAH-HO-NE-TEH HIGH WAY WO-TKANH HOLD A-ZEY-AL-IH PLACE OF MEDICINE A-NAH-NE-DZIN NOT FRIENDLY BE-EL-DON-TS-QUODI SHORT BIG GUN WO-CHI (I) SHIL-LOH (I) A-HE-DIS-GOH BA-HAS-TEH HO-DOL-ZHOND EL-TSOD HO-NALH BA-HAL-NEH TA-NEH-NAL-DAHI YE-GHA-NE-JEH BEH-ED-DE-DLID EHD-TNAH NAS-NIL NA-NE-TGIN HO-YA (I) DZEEL YEL-NA-ME-JAH AH-NILH-KHLAI AH-TAH-HA-NE NA-ALI-KA A-TAH SEIS SEIS-KEYAH BIH-TSA-NEL-KAD WOH-DI-CHIL NAZ-TSAID NAS-TSAID-A-KHA-AH-YEHHA-DILH NA-NISH (L) KAY-YAH TKA-GHIL-ZHOD AH-NA-GHAI DE-BE-YAZIE-HA-A-AH DAH-DE-YAH NISH-CLA-JIH-GOH BI-OH (L) DIL-KONH DA-A-HE-GI-ENEH BA-HAS-AH LIGHT UP IMMEDIATELY IMPACT IMPORTANT IMPROVE INCLUDE INCREASE TELL ABOUT INFANTRY WENT THROUGH BRAND INSTALL IN PLACE TEACH SMART STRENGTH INTERCEPT INTERFERE INTERPRET TRACK INVOLVOE SEVEN SEVEN ISLAND SEPERATE JUNGLE KILL KILL OIL GO AROUND LABOR LAND LAUNCH LEADER LEAST LEAVE LEFT LESS LEVEL LIAISON LIMIT LABOR LAND LAUNCH LEADER LAMB FEAST HE LEFT LEFT LESS LEVEL KNOW OTHER'S ACTION LIMIT .

LITTER LOCATE LOSS MACHINE GUN MAGNETIC MANAGE MANEUVER MAP MAXIMUM MECHANIC MECHANIZED MEDICAL MEGACYCLE MERCHANT SHIP MESSAGE MILITARY MILLIMETER MINE MINIMUM MINUTE MISSION MISTAKE MOPPING MORE MORTAR MOTION MOTOR NATIVE NAVY NECESSARY NEGATIVE NET NEUTRAL NORMAL NOT NOTICE NOW NUMBER OBJECTIVE OBSERVE OBSTACLE OCCUPY OF OFFENSIVE ONCE ONLY OPERATE OPPORTUNITY OPPOSITION OR ORANGE ORDER ORDNANCE ORIGINATE OTHER OUT OVERLAY NI-DAS-TON (L) A-KWE-EH UT-DIN A-KNAH-AS-DONIH NA-E-LAHI HASTNI-BEH-NA-HAI NA-NA-O-NALTH KAH-YA-NESH-CHAI BEL-DIL-KHON CHITI-A-NAYL-INIH CHIDI-DA-AH-HE-GONI A-ZAY MIL-AH-HEH-AH-DILH NA-EL-NEHI-TSIN-NA-AILH HANE-AL-NEH SILAGO-KEH-GOH NA-AS-TSO-SI-A-YE-DO-TISH HA-GADE BE-OH (M) AH-KHAY-EL-KIT-YAZZIE AL-NESHODI O-ZHI HA-TAO-DI THLA-NA-NAH BE-AL-DOH-CID-DA-HI NA-HOT-NAH CHIDE-BE-TSE-TSEN KA-HA-TENI TAL-KAH-SILAGO YE-NA-ZEHN DO-YA-SHO-DA NA-NES-DIZI DO-NEH-LINI DOH-A-TA-H-DAH NI-DAH-THAN-ZIE NE-DA-TAZI-THIN KUT BEH-BIH-KE-AS-CHINIGH BI-NE-YEI HAL-ZID DA-HO-DESH-ZHA YEEL-TSOD TOH-NI-TKAL-LO BIN-KIE-JINH-JIH-DEZ-JAY TA-LAI-DI TA-EI-TAY-A-YAH YE-NAHL-NISH ASH-GA-ALIN NE-HE-TSAH-JIH-SHIN EH-DO-DAH-GOH TCHIL-LHE-SOI BE-EH-HO-ZINI LEI-AZ-JAH DAS-TEH-DO LA-E-CIH CLO-DIH BE-KA-HAS-TSOZ SCATTER SPOT LOSS RAPID FIRE GUN PICK UP MAN AGE MOVING AROUND MAP FILL TO TOP AUTO REPAIRMAN FIGHTING CARS MEDICINE MILLION GO AROUND MERCHANT SHIP MESSAGE MILITARY DOUBLE MOUSE MINE MINIMUM LITTLE HOUR MISSION MISS MOPPING MORE SITTING GUN MOTION CAR HEAD NATIVE SEA SOLDIER WANT NO GOOD NET NEUTRAL NORMAL NO TURKEY NO TURKEY ICE NOW WHAT'S WRITTEN GOAL OBSERVE OBSTACLE TAKEN OCEAN FISH OFFENSIVE ONCE ONLY WORK AT OPPORTUNITY OPPOSITION EITHER ORANGE ORDER UNDER GROUND BEGIN OTHER OUT SIDE OVERLAY .

PARENTHESIS PARTICULAR PARTY PAY PENALIZE PERCENT PERIOD PERIODIC PERMIT PERSONNEL PHOTOGRAPH PILL BOX PINNED DOWN PLANE PLASMA POINT PONTOON POSITION POSSIBLE POST PREPARE PRESENT PREVIOUS PRIMARY PRIORITY PROBABLE PROBLEM PROCEED PROGRESS PROTECT PROVIDE PURPLE PYROTECHNIC QUESTION QUICK RADAR RAID RAILHEAD RAILROAD RALLYING RANGE RATE RATION RAVINE REACH READY REAR RECEIPT RECOMMEND RECONNAISSANCE RECONNOITER RECORD RED REEF REEMBARK REFIRE REGULATE REINFORCE RELIEF ATSANH A-YO-AD-DO-NEH DA-SHA-JAH NA-ELI-YA TAH-NI-DES-TANH YAL DA-AHL-ZHIN DA-AL-ZHIN-THIN-MOASI GOS-SHI-E DA-NE-LEI BEH-CHI-MA-HAD-NIL BI-SO-DIH-DOT-SAHI-BI-TSAH BIL-DAH-HAS-TANH-YA TSIDI DIL-DI-GHILI BE-SO-DE-DEZ-AHE TKOSH-JAH-DA-NA-ELT BILH-HAS-AHN TA-HA-AH-TAY SAH-DEI HASH-TAY-HO-DIT-NE KUT BIH-TSE-DIH ALTSEH-NAN-DAY-HI-GIH HANE-PESODI DA-TSI NA-NISH-TSOH NAY-NIH-JIH NAH-SAI AH-CHANH YIS-NIL DINL-CHI COH-NA-CHANH AH-JAH SHIL-LOH ESAT-TSANH (R) DEZJAY A-DE-GEH-HI KONH-NA-AL-BANSI-BI-THIN A-LAH-NA-O-GLALIH AN-ZAH GAH-EH-YAHN NA-A-JAH CHUSH-KA (R) IL-DAY (R) KUT (R) BE-KA-DENH (R) SHOZ-TEH CHE-HO-TAI-TAHN HA-A-CIDI TA-HA-NE-AL-YA GAH-AH-NAH-KLOLI LI-CHI TSA-ZHIN EH-NA-COH NA-NA-COH NA-YEL-N NAL-DZIL AGANH-TOL-JAY RIB PARTICULAR PARTY PAY SET BACK MONEY PERIOD PERIOD ICE CAT PERMIT MEMBER PHOTOGRAPH SICK PIG BOX PINNED DOWN BIRD PLASMA PIG POINT FLOATING BARREL POSITION POSSIBLE POST PREPARE PRESENT PREVIOUS 1ST POSTION PRIORITY PROBABLE BIG JOB GO PROGRESS SELF DEFENSE PROVIDE PURPLE FANCY FIRE EAR QUICK LISTEN RAID SHIPPING POINT RAILROAD GATHERING DISTANCE RABBIT ATE RATION RAVINE REACH READY REAR RECEIPT RECOMMEND INSPECTOR MAKE SURE R-E-ROPE RED BLACK ROCK GO IN REFIRE REGULATE REINFORCE RELIEF .

RELIEVE REORGANIZE REPLACEMENT REPORT REPRESENTATIVE REQUEST RESERVE RESTRICT RETIRE RETREAT RETURN REVEAL REVERT REVETMENT RIDGE RIFLEMAN RIVER ROBOT BOMB ROCKET ROLL ROUND ROUTE RUNNER SABOTAGE SABOTEUR SAILOR SALVAGE SAT SCARLET. RED SCHEDULE SCOUT SCREEN SEAMAN SECRET SECTOR SECURE SEIZE SELECT SEMI COLON SET SHACKLE SHELL SHORE SHORT SIDE SIGHT SIGNAL SIMPLEX SIT SITUATE SMOKE SNIPER SPACE SPECIAL SPEED SPORADIC SPOTTER SPRAY SQUADRON STORM NAH-JIH-CO-NAL-YA HA-DIT-ZAH NI-NA-DO-NIL WHO-NEH TKA-NAZ-NILI JO-KAYED-GOH HESH-J-E BA-HO-CHINI AH-HOS-TEEND JI-DIN-NES-CHANH NA-DZAH WHO-NEH (L) NA-SI-YIZ BA-NAS-CLA (R) GAH-GHIL-KEID BE-AL-DO-HOSTEEN TOH-YIL-KAL A-YE-SHI-NA-TAH-IH LESZ-YIL-BESHI YEH-MAS NAZ-PAS (R) GAH-BIH-TKEEN NIH-DZID-TEIH A-TKEL-YAH A-TKEL-EL-INI CHA-LE-GAI NA-HAS-GLAH BIH-LA-SANA-CID-DA-HI LHE-CHI (S & R) BEH-EH-HO-ZINI HA-A-SID-AL-SIZI-GIH BESH-NA-NES-DIZI TKAL-KAH-DINEH-IH BAH-HAS-TKIH YOEHI (S) YE-DZHE-AL-TSISI YEEL-STOD BE-TAH-HAS-GLA DA-AHL-ZHIN-BI-TSA-NA-DAHL DZEH-CID-DA-HI DI-BAH-NESH-GOHZ BE-AL-DOH-BE-CA TAH-BAHN (S) BOSH-KEESH BOSH-KEESH YE-EL-TSANH NA-EH-EH-GISH ALAH-IH-NE-TIH TKIN-CID-DA-HI A-HO-TAY LIT OH-BEHI BE-TKAH E-YIH-SIH YO-ZONS AH-NA-HO-NEIL EEL-TSAY-I KLESH-SO-DILZIN NAH-GHIZI NE-OL REMOVE REORGANIZE REPLACEMENT GOT WORD TRIPLE MEN ASK FOR RESERVE RESTRICT RETIRE RETREAT CAME BACK REVEAL TURN ABOUT CORNER RABBIT RIDGE RIFLEMEN MUCH WATER EGG FLY SAND BOIL ROLL ROUND RABBIT TRAIL RUNNER HINDERED TROUBLE MAKER WHITE CAPS PICK THEM UP APPLE SITTING RED SCHEDULE SHORT RACOON SCREEN SEAMAN SECRET SECTOR SMALL SECURITY SEIZE TOOK OUT DOT DROP ELK SITTING SHACKLE SHELL SHORE SHORT SIDE SEEN BY SIGNS INNER WIRE ICE SITTING (S) SITUATE SMOKE PICK 'EM OFF BETWEEN MAIN THING SWIFT MOTION NOW AND THEN SPOTTER SNAKE PRAY SQUASH STORM .

STRAFF NA-WO-GHI-GOID STRAGGLER CHY-NE-DE-DAHE STRATEGY NA-HA-TAH (S) STREAM TOH-NI-LIH STRENGTH DZHEL STRETCH DESZ-TSOOD STRIKE NAY-DAL-GHAL STRIP HA-TIH-JAH STUBBORN NIL-TA SUBJECT NA-NISH-YAZZIE SUBMERGE TKAL-CLA-YI-YAH SUBMIT A-NIH-LEH SUBORDINATE AL-KHI-NAL-DZL SUCCEED YAH-TAY-GO-E-ELAH SUCCESS UT-ZAH SUCCESSFUL UT-ZAH-HA-DEZ-BIN SUCCESSIVE UT-ZAH-SID SUCH YIS-CLEH SUFFER TO-HO-NE SUMMARY SHIN-GO-BAH SUPPLEMENTARY TKA-GO-NE-NAN-DEY-HE SUPPLY NAL-YEH-HI SUPPLY SHIP NALGA-HI-TSIN-NAH-AILH SUPPORT BA-AH-HOT-GLI SURRENDER NE-NA-CHA SURROUND NAZ-PAS (S) SURVIVE YIS-DA-YA SYSTEM DI-BA-TSA-AS-ZHI-BI-TSIN TACTICAL TAKE TANK TANK DESTROYER TARGET TASK TEAM TERRACE TERRAIN TERRITORY THAT THE THEIR THEREAFTER THESE THEY THIS TOGETHER TORPEDO TOTAL TRACER TRAFFIC DIAGRAM TRAIN TRANSPORTATION TRENCH TRIPLE TROOP TRUCK TYPE UNDER UNIDENTIFIED E-CHIHN GAH-TAHN CHAY-DA-GAHI CHAY-DA-GAHI-NAIL-TSAIDI WOL-DONI TAZI-NA-EH-DIL-KID DEH-NA-AS-TSO-SI ALI-KHI-HO-NE-OHA (T) TASHI-NA-HAL-THIN KA-YAH (T) TAZI-CHA CHA-GEE BIH TA-ZI-KWA-I-BE-KA-DI CHA-GI-O-EH CHA-GEE (Y) DI TA-BILH LO-BE-CA TA-AL-SO BEH-NA-AL-KAH-HI HANE-BA-NA-AS-DZOH COH-NAI-ALI-BAHN-SI A-HAH-DA-A-CHA E-GADE TKA-IH NAL-DEH-HI CHIDO-TSO ALTH-AH-A-TEH BI-YAH DO-BAY-HOSEN-E HOE STRAGGLER STRATEGY RUNNING WATER STRENGTH STRETCH STRIKE STRIP STUBBORN SMALL JOB WENT UNDER WATER SEND HELPING EACH OTHER MAKE GOOD IT IS DONE IT IS DONE WELL SUCCESS SCAR SOX SUFFER SUMMER MARY 3RD POSITION SUPPLY SUPPLY SHIP DEPEND SURRENDER SURROUND SURVIVE SYSTEM TACTICAL TAKE TORTOISE TORTOISE KILLER TARGET TURKEY ASK TEA MOUSE TERRACE TURKEY RAIN TERRITORY TURKEY HAT BLUE-JAY THEIR TURKEY HERE AFTER THE SEE THE Y THE TOGETHER FISH SHELL TOTAL TRACER DIAGRAM STORY LINE TRAIN TRANSPORTATION TRENCH TRIPLE TROOP BIG AUTO TYPE UNDER UNIDENTIFIED .

knowing what your enemy is planning helps you to prepare. Because you know that those three letters represent a real dog. It is the mission of the NATIONAL SECURITY AGENCY (NSA) and the CENTRAL SECURITY SERVICE (CSS) to learn what it can about its potential enemies and to protect America's government communications. Secrets that were kept and secrets that were not. But it is also important that your enemies do not know what you have planned. O. What Are Codes? Although most people think of codes as being secret messages. world events have changed because of secret messages. how to make secret ciphers. The code word given to a four-legged furry creature that barks are the letters D. In this section.UNIT UNSHACKLE UNTIL VICINITY VILLAGE VISIBILITY VITAL WARNING WAS WATER WAVE WEAPON WELL WHEN WHERE WHICH WILL WIRE WITH WITHIN WITHOUT WOOD WOUND YARD ZONE DA-AZ-JAH (U) NO-DA-EH-NESH-GOHZ UH-QUO-HO NA-HOS-AH-GIH CHAH-HO-OH-LHAN-IH NAY-ES-TEE TA-EH-YE-SY BILH-HE-NEH (W) NE-TEH TKOH YILH-KOLH BEH-DAH-A-HI-JIH-GANI TO-HA-HA-DLAY GLOE-EH-NA-AH-WO-HAI GLOE-IH-QUI-AH GLOE-IH-A-HSI-TLON GLOE-IH-DOT-SAHI BESH-TSOSIE BILH (W) BILH-BIGIH TA-GAID CHIZ CAH-DA-KHI A-DEL-TAHL BIH-NA-HAS-DZOH UNIT UNSHACKLE UNTIL THERE ABOUT MANY SHELTER VISIBILITY VITAL WARNING WAS WATER WAVE FIGHTING WEAPON WELL WEASEL HEN WEASEL HERE WEASEL TIED TOGETHER SICK WEASEL SMALL WIRE WITH WITH IN WITHOUT FIRE WOOD WOUND YARD ZONE What are Codes? Throughout history. Any word could be considered a codeword. you understand the code! . something else. codes are really any symbol or signal used to represent. learn about the differences between codes and ciphers. and what to look for when trying to break a cipher. G. or communicate. In the world of diplomacy.

In the world of cryptology. however.1.1.2.2. column or paragraph number.1.24 CAN = 178. and the Nth word down that column or into that paragraph. Separate the numbers by a period. they need the key! If your friends have the key.which makes them great for sending secret messages! DIRECTIONS: Use a dictionary or any book with a lot of different words. Repeat Steps 2-4 for every word in your sentence. 4.1. Find the first word in your dictionary or book.1.2 887. 24th word down.2D 7. How well you've created your code and key will determine how long your message stays a secret from others.2D 778. CODED = 239.16 CODED = 239.24 178." Example: YOU CAN CREATE YOUR OWN CODED MESSAGE. 2.35 CREATE = 293.35 293. in order for your friends to understand the coded message. YOU = 1454.Sometimes.24 5. Creating a Dictionary Code Dictionary Codes have been used for centuries.29 1454. Column 1.2 OWN = 887.1. Example: YOU = Page 1454. Write down your message in English. But. 3. Write down the page number. 1. this is called "plaintext.1.1.29 YOUR = 1454. it is important that only a few people understand the message.2.2D MESSAGE = 778.1. 1454.20 Remember to leave a space between each group of numbers. In some cases.2.2.16 239. CONGRATULATIONS! You have created your very first code! What is a Cipher? .2. They can be quite confusing to anyone who doesn't know the system . The finished cipher should look like the cipher below. your messages become secret.2. you may have to add a prefix or suffix to the numbers. YOU=1454. codes are used to make messages secret by changing the words into something else.20 6. and your enemies do not.

the word CRYPTOGRAPHY might look like this: DOHQMRZOFQYH. In our example. and so on. In our substitution cipher. Another cipher. we will use the word MAPLE for our key. A NULL is usually represented by the letter X. they must know your system. For example. In our example. Step 4 Rewrite the columns so that the letters in your Key word are in alphabetical order. called a TRANSPOSITION CIPHER. then it is very difficult for others to read your message. It involves changing the letters of your message into something else: other letters.).A cipher is a way to make a word or message secret by changing or rearranging the letters in the message. Step 3 Fill in the columns by writing your PLAINTEXT message one letter at a time. the word MAPLE will be rearranged to read AELMP. numbers. (A code affects the word. the SUBSTITUTION CIPHER. Step 2 Write the Key word on a piece of paper. For your friends to understand the message. draw a column under each letter of the Key word. Next. CHYPRAGTOPRY can be unscrambled to reveal the word CRYPTOGRAPHY.) One type of cipher. or symbols. Y=H. If only you and your friend have the key. Make A Cipher: The Key How to Encrypt a Key Cipher Step 1 Choose a word to be your KEY word. etc. your friend would need to know the KEY. Using a substitution cipher. or how the system is set up (a=f. not the individual letters. In this example C=D. Make sure the word you select has at least five or six letters in it and has no repeating letters. is a bit harder. Leave a little bit of space between each letter as you write down each letter of your Key. is created by simply rearranging the letters in the word itself. Any empty spaces should be filled in with a NULL. Step 5 . R=O. For example the word APPLE will not work with this cipher because there are two P's in the word.

but DO NOT include the letters in the Key word. CONGRATULATIONS! You have successfully deciphered a KEY CIPHER! . Step 2 Starting under the letter A and writing from left to right. Step 3 Once the grid is filled in. Reading from left to right. CONGRATULATIONS! You have successfully created a KEY CIPHER! How to Decrypt a Key Cipher Step 1 Find out what the KEY word is from the person who sent you the message. you should be able to see the plaintext message. fill in the grid with the letters from the ciphertext. Draw a column under each letter of the Key word. copy the letters in each column from top to bottom. rearrange the columns so the Key word is spelled out correctly.To see your encrypted message. Write the letters from the Key word in alphabetical order on a piece of paper.

They are not. in this order “” . several groups of frequency numbers appear to be identical. Since no fractions are used. -1-2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18-19-20-21-22-23-24-25-26E T A O N R I S H D L F C M U G Y P W B V K X J Q Z 13 10 08 08 07 07 06 06 05 04 03 03 03 03 02 02 02 02 less than two.Solving Cryptograms: Approximate number of times this letter occurs in 100 letters. Each letter occurs less often than the letter above it.

T.Most common letters in the English language is E. Nulls should not spell anything. helps keep things straight or in a grid. Don’t use an under sheet that can retain the impression of your writing. Now you have a three letter word that begins with T and ends with E using the frequencies chart the word is most likely THE. A. T is the 2nd most frequently used letter. Don’t use spaces or punctuation. I. NULLS can be used in any cipher. . and L is the second most common letter. Knowing that B was the most used letter B is probably E. When breaking a cryptogram count how many times each letter is used. Use lined or graph paper. H. meaningless letters to pad out the 5 letter words. The second most used letter is L and knowing that T is the second most used letter it is likely that L = T. Hide ciphers and codes in normal seaming letters and notes. S. The nine most frequent letters used are: E. as example. Destroy waste paper carefully Combine several types of codes together to create ciphers. You have a word LKB. Copy cipher onto another piece of paper or photo copy it. Example: after you have used a frequency chart you have found that B is the most common letter in the cryptogram. N. of five (5). Use pen for message and pencil to decode. Creative ways to help hide ciphers: Arrange “words” into groups. R. Make a frequency table. Using a table of frequencies. The average length of a word in the English language is 4 or 5 letters. Add Null to words. O. you can guess many of the letters. list all symbols or letters and keep track of amount of times tey occur in coded message.

Common English words in order of use: The Of And To A In That Is I It For As With Was His He Be Not By But Have You Which Are On Or Her Had At From This My They All Their An She Has Were Me Been Him One So If Will There Who Who No Two letter combinations in order of use: TH IN ER RE AN RA RO LI RI IO .Messages are best if they are at least 50 letters long.

HE AR EN TI TE AT ON HA OU IT ES ST OR NT HI EA VE CO DE LE ND MA SE AL IC FO IL NE LA TA EL ME EC IS DI SI CA Most Frequently Used Two letter Words: Of To In It Is .

Be As At So We He By Or On Do If Me My Up An Three letter combinations in order of use: THE ING AND ION ENT FOR TIO ERE HER ATE VER TER THA ATI HAT ERS HIS RES ILL ARE CON NCE ALL EVE ITH TED AIN EST MAN RED THI I’VE REA WIT ONS ESS AVE PER ECT ONE .

Most Frequently used three letter words: The And For Are But Not Had Her Was One Our Out You All Any Can Day Get Has Him Most Frequently used four letter words: That With Have This Will Your From They Know Want Been Good Much Some .

OO . C. Y. EE. H. S. P. A. F. P. TT.Time Very When Come Here Just Most Frequently Used First Letter: T. R. W. I. D. FF. R. B. N. W Most Common Double Letters: SS. LL. M. M. G. U. E. G. F. H. L. O. MM. N. L. D. Y. S. T. O. J. K Most frequently Used Last Letters: E. A. U.

Sign up to vote on this title
UsefulNot useful