You are on page 1of 62

The Solution of the Zodiac Killer’s 340-Character Cipher

David Oranchak, Sam Blake, Jarl Van Eycke


arXiv:2403.17350v1 [cs.AI] 26 Mar 2024

March 27, 2024

The case of the Zodiac Killer is one of the most widely known unsolved serial killer cases in history. The
unidentified killer murdered five known victims and terrorized the state of California. He also communicated
extensively with the press and law enforcement. Besides his murders, Zodiac was known for his use of
ciphers. The first Zodiac cipher was solved within a week of its publication, while the second cipher
was solved by the authors after 51 years, when it was discovered to be a transposition and homophonic
substitution cipher with unusual qualities. In this paper, we detail the historical significance of this cipher
and the numerous efforts which culminated in its solution.

Figure 1: The Zodiac Killer’s 340-character cipher [193]


1 Background
Today homophonic substitution ciphers are readily
In the late 1960s, a serial killer known as The Zodiac broken using sophisticated specialized software such
Killer (or Zodiac) operated in northern California, as AZdecrypt [134] and ZKDecrypto [131]. These
killing at least five people [88]. He targeted mostly programs automatically explore vast spaces of can-
young couples in isolated areas, but one victim was a didate solutions by generating pseudorandom cipher
cab driver in San Francisco. During his crime spree, keys, iteratively making small pseudorandom pertur-
Zodiac mailed taunting letters to regional newspa- bations, and measuring solution fitness using lan-
pers. The letter writer took credit for the crimes, guage statistics. They use an optimization tech-
boasted about his attacks, ridiculed the police for nique known as hill climbing, an iterative process that
not being able to capture him, threatened to commit makes incremental changes and improvements to ar-
more crimes unless newspapers published his corre- bitrary solutions to problems.
spondences, and mailed four ciphers [77] and cryp-
tic messages. The first cipher was published in local
newspapers on August 1, 1969 and was solved by a
1.2 Transposition Ciphers
puzzle-loving couple within days [62]. Zodiac’s sec- In contrast with substitution ciphers, which replace
ond cipher, known as Z340 (Figure 1), appeared in letters with other letters or symbols, transposition
newspapers on November 12, 1969 and is the topic ciphers involve rearrangements of plaintext messages
of this paper. The investigations into the serial killerwhich rearrange them into seemingly unreadable
span multiple San Francisco Bay Area jurisdictions messages. In the fifth century BCE, the Greeks were
[93], but the case remains unsolved. purported to use a device known as the scytale [9]
consisting of a strip of parchment wrapped tightly
1.1 Homophonic Substitution around a wooden dowel or rod. The plaintext mes-
sage was written lengthwise along the wrapped rod.
Ciphers
Then, the wrapped parchment was unraveled, and
Early substitution ciphers used only a single sub- the message became an unreadable rearrangement of
stitution for each plaintext letter. Because a single the original, until the parchment was wrapped again
substitution fails to conceal letter frequencies, these around a similarly sized rod to restore the original
ciphers were vulnerable to being broken using fre- order of the message.
quency analysis (e.g., counting cipher symbols to see
how they might match expected letter frequencies in Kahn reports [10] what appears to be the earliest
the target language). This later evolved into the use description of keyed columnar transposition, by
of multiple substitutions, known as homophones or John Falconer, published in 1685. This form of
variants, for individual plaintext letters. When the transposition involves writing out the plaintext
quantity of variants per plaintext letter is selected message into a grid, then rearranging the column
proportional to the relative frequency of the letter order based on a keyword or phrase. The transposed
in the plaintext language, the distribution of letter message is taken by then reading the message hori-
frequencies of the ciphers becomes more uniform, zontally. Reversing the process decrypts the message.
resulting in ciphers that are harder to break. The
earliest known example of the use of homophonic Early descriptions of transposition ciphers can be
substitution in the West is a cipher created by the found in Giambattista della Porta’s 1563 book, De
Duchy of Mantua [7]. Prior to this is a system Furtivis Literarum Notis [16]. Porta’s book includes
described by 14th century Arab cryptologist ‘Alı̄ ibn descriptions of transposition schemes such as distri-
Muh.ammad Ibn al-Durayhim whereby individual bution of messages into multiple rows, and a keyed
letters are replaced by pairs of letters whose numeri- transposition that rearranges plaintext in-place gov-
cal values add up to the original letters [8]. erned by the numerical equivalents, interpreted as lin-

1
ear positions, of letters in the key phrase [179]. also threatened to go on another killing spree if the
newspapers failed to publish the ciphers.

1.3 The Zodiac Killer’s First Cipher:


Z408

Figure 3: The Hardens’ handwritten solution of Z408.


([4] pp. 224–225)

Within a few days, all three local newspapers


published their portions of the ciphertext [92] [103]
[74]. Local police requested help from the US Navy
[74], the FBI (Federal Bureau of Investigation), the
California Bureau of Investigation [61], and Donald
C. B. Marsh who was the head of the American
Cryptogram Association [78].

On August 8, 1969, eight days after the cipher


was mailed, the San Francisco Chronicle received a
solution (Figure 3) from Donald and Bettye Harden,
who solved the cipher after seeing it in the newspa-
pers [62]. Owing to Donald’s boyhood interest in
ciphers, Bettye’s insights and persistence, and some
trial and error, the Hardens discovered the plaintext
message which was encoded using a homophonic
Figure 2: The Zodiac Killer’s 408-character cipher [186] substitution cipher (also known as a monoalphabetic
substitution cipher with variants [3]). The plaintext
1
After his attacks on two young couples, Zodiac [62] follows (error corrections are in brackets) :
mailed his first cipher (Figure 2) on July 31, 1969
[92]. Denoted Z408 for its length, the cipher was sent I like killing people because it is so
in three parts to three local newspapers: the Vallejo much fun it is more fun than killing
Times-Herald, San Francisco Examiner and the San wild game in the forrest [forest]
Francisco Chronicle [103]. A handwritten letter ac- because man is the most hongertue
companied each part. Each letter essentially said the [dangerous] animal of all to kill
same thing: that the author of the letter was the mur- something give eryetheyo a [gives me
derer of a teenage couple around Christmas of 1968, the most] thrilling experience it is
and was the attacker of another couple around July even better than getting your rocks off
4, 1969, which resulted in another death. The letters 1 This version of the plaintext is reproduced from [62].
included specific details about the case, intended to Other articles published slightly different variations of the
authenticate the letter writer as the perpetrator. He plaintext.

2
with a girl the best part of it I athae
[is that] when I die I will be reborn
in paradice and all the I have killed
will become my slaves I will not give
you my name because you will trs [try]
to sloi [slow] down or atop [stop] my
collecting of slaves for my afterlife
ebeo riet emeth hpiti. [62]

Figure 5: Filler conjecture. Symbols along the last line


are possibly copied from above. [137]

arranged into an orderly grid. Accompanying the


cipher was a greeting card (See Appendix A, Figures
Figure 4: Z408 substitution key. Note: There are no sub- 51 and 52), inside which Zodiac had written:
stitutions for the letters J, Q, and Z since none appear in
the plaintext.
“This is the Zodiac speaking. I though [sic]
The substitution key derived from the Hardens’ you would need a good laugh before you
solution is shown in Figure 4. hear the bad news. You won’t get the news
for a while yet. PS could you print this
The plaintext contained misspellings and/or enci- new cipher on your frunt [sic] page? I get
pherment mistakes, resulting in some cipher symbols awfully lonely when I am ignored, so lonely
having multiple possible interpretations [161]. It also I could do my Thing!!!!!!
includes a garbled 18-character portion at the end Des July Aug Sept Oct = 7” [4]
whose meaning has not been determined. One con-
jecture is that symbols in this section were copied As with his first cipher, Zodiac pressured the newspa-
from above to serve as filler (Figure 5), making the pers to publish his ciphers by threatening to commit
third section the same size as the other two sections more violent acts. Within a few days, the cipher was
[137]. Another conjecture is that a second decryption published in several local newspapers [71] [68] [64].
process is required to decode this portion. The San Francisco Chronicle reported that homicide
detectives believed the cipher may have contained
1.4 The Zodiac Killer’s Second information about Zodiac’s additional victims [64].
Cipher: Z340 The detectives sent the cipher to several experts and
expected it to be deciphered in a few days. Graysmith
On November 8, 1969, Zodiac mailed a second cipher [5] claimed that the NSA (National Security Agency)
(Figure 1) to the San Francisco Chronicle (Figure said that the cipher definitely contained a message.
6) [64]. Z340, so named for its length, resembled Despite more than a half century of attempts to de-
Zodiac’s first cipher, Z408, for its use of a mixture of code the infamous Z340 cipher, which even ranked
letters, backwards letters, shapes and other symbols, first on the FBI’s list of top unsolved ciphers [70], it

3
Figure 7: Z13, Zodiac’s 13-character cipher [67]

and generally aren’t scientifically falsifiable [169]. Zo-


diac mailed another short cipher, Z32 (Figures 8 and
56), on June 26, 1970, along with a map [66] (Figure
57). In the accompanying letter, Zodiac claimed the
solution to the cipher gave the location to a bomb
that he had devised and hidden somewhere. He had
written about his bomb design and plans in previ-
ous correspondences. Once again, Zodiac had created
a cipher that resists cryptanalysis due to its short
length and abundance of unique symbols.

Figure 6: The Zodiac Killer’s 340-character cipher as


published by the San Francisco Chronicle on November
13, 1969.

remained uncracked.

1.5 The Zodiac Killer’s remaining


ciphers
Figure 8: Z32, Zodiac’s 32-character cipher [187]
On April 20, 1970, Zodiac mailed another taunting
letter with a cipher to the San Francisco Chronicle.
He wrote:
2 Historical efforts to break
“This is the Zodiac speaking. By the way Z340
have you cracked the last cipher I sent
you? My name is ”. [67] By the time Z340 appeared in local newspapers, the
Zodiac case was becoming well known. The grow-
ing media focus elevated his Z340 cipher, drawing
That opening was immediately followed by his increased interest in finding its solution. Shortly af-
new, much shorter cipher, known as Z13 (Figure 7). ter Zodiac mailed it, many people raced to decipher
it, and some asserted their decryptions were correct.
Cryptanalysis is all but impossible for such a short But none were definitively endorsed by law enforce-
ciphertext, because solutions are not guaranteed to ment, so these efforts continued for decades. Hun-
be unique, and many thousands have been proposed dreds, if not thousands, of attempts and purported

4
solutions exist. Providing all of them is outside the 340 symbols: “There is a definite message. Testing
scope of this paper; however, we will detail several shows it is not just gibberish.”
notable attempts.

Initial months (1969–1970): On November 12, Donald C. B. Marsh: A November 14, 1969
1969, it was reported that Z408 ’s key was tried article [78] reported Colorado School of Mines math
on Z340, but failed to unlock any message [68]. It professor Dr. Donald C. B. Marsh was asked by the
was also reported that the cipher was turned over San Francisco Police Department (SFPD) to assist
to “professional cryptographers” [99]. “Homicide with the decryption of Zodiac’s ciphers. At the
detectives have forwarded copies of the cryptogram time, Marsh had been a member of the American
to a number of experts and expect it to be deciphered Cryptogram Association for about 20 years, where
within a few days” [64]. At the time, authorities he solved thousands of ciphers and also served as its
suspected that victims’ names might have been President.
concealed in the cipher, owing to the inclusion of
August in Zodiac’s list of months associated with his Marsh had been asked to decrypt Z408, but the
attacks, which he had included on the accompanying Hardens had already solved it before him. However,
card (Figure 52). At that point, no attack that he independently verified their solution, and indi-
could be definitively associated with Zodiac occurred cated that the unresolved last 18 letters could be
in August. Reporter Paul Avery speculated Zodiac nulls, a secondary encipherment not yet discovered,
might have been taking credit for a recent killing of or an anagram. He thought that while Zodiac
San Jose girls Deborah Gay Furlong and Kathleen made Z408 more complex by using homophones, it
Snoozy in August 1969, despite the doubts of the didn’t require a cryptography expert to devise, and
investigator of that case [64]. felt there were aspects that seemed like the work
of an amateur. Further, he issued a challenge to
San Francisco Examiner reported that an analysis Zodiac, asking him to send him a cipher containing
of Z340 indicated Zodiac had changed his encipher- the killer’s identity. Marsh hoped Zodiac would
ment method. “Cryptographers noted that the man comply, and said he could decrypt such a cipher
has altered the code used in the earlier messages, despite Zodiac’s efforts. Later, Marsh saw Z340
in such a way as to indicate he is a sophisticated published in the newspaper, and said he was ea-
expert on this sort of puzzle” [75]. They noted the ger to work on decrypting it to help law enforcement.
addition of new symbols that were not present in the
first cipher [68]. Using Z408’s key, San Francisco
Examiner staff attempted to decipher Z340’s con- FBI’s cryptanalysis: On November 12, 1969, the
tent. This resulted in gibberish, even after exploring San Francisco Police Department (SFPD) submitted
potential decodings in various directions or skipping Z340 to the FBI [157] and requested a comparison
letters in a systematic manner. Examiner staff also with Z408 and assistance to decipher the message
noted that some symbols that seemed new might (Figure 9).
simply be the result of sloppy penmanship or hurried
construction of the cipher. Publicly available Zodiac case files by the FBI con-
firm their involvement in attempts to break Z340. In
On November 13, 1969 the San Francisco Chron- a cryptanalysis report dated December 18, 1969, the
icle reported [65] that amateur cryptographers “by FBI summarized their findings on Z340 (Figure 50):
the hundreds” were at work trying to decipher Z340. [156]
One of them was reported to have said the cipher
definitely contained word patterns hidden in the • Z408 ’s key failed to produce a message.

5
Attempts from other agencies: An alleged
attempt by the NSA from the late 1960s or early
1970s to solve Z340 was documented on an online
Zodiac forum [145]. The document (Figure 55)
reportedly belonged to Jack Mulanax, a Vallejo
Police Department detective who worked the Zodiac
case, and shows a printout of the phrase “ANOTH-
ERSLAVE” being cribbed or applied to multiple
Figure 9: Request for assistance from the FBI Laboratory positions in the ciphertext to try to yield more words
and its cryptographic section. [157] or phrases from the partial substitution.

Newspaper articles claimed the National Security


• The FBI tried applying the Z408 key as part of Agency [100], and Navy cryptographers [94], also
a “combination cryptosystem”, including linear attempted to break Z340. The Los Angeles Times
and route transposition, with a negative result. reported on May 8, 1970 that attempts to solve Z340
were so far met with failure, including attempts
• Applying Z408 ’s key produced plaintext letter by “computers at the National Security Agency in
n-gram frequencies that still resembled expected Washington” [100]. Experts speculated that Zodiac
frequencies of English text. may have deliberately constructed a false code to
muddle the investigation. However, we have not
• Approximately 20% of the ciphertext was new yet found any other confirmation or details of such
(i.e., those symbols did not appear in Z408 ). attempts, perhaps due to classification levels of such
information or other information security based
• They examined the ciphertext for “cyclic use of impediment.
variants”, or predictable sequences of alternat-
ing substitutions for individual plaintext letters.
The sequences they identified were used in sub-
sequent cryptanalysis. American Cryptogram Association (ACA),
1970: ACA publication, The Cryptogram, pub-
• They applied crib words and phrases used before lished information about Zodiac and his ciphers
by Zodiac to try to reveal more of the plaintext in their January–February 1970 edition [57]. An
message. This was also done with grouping of ACA member prepared a clearer copy of the cipher
various selections of cyclic variants. They also from the newspapers. However, The Cryptogram
tried to extract plaintext in different reading di- reported “our top solvers have been working on it. . .
rections: backwards, columnar, alternating row- but this has not been solved.” The next issue [58]
wise directions (a “snake” pattern), etc. reported “there is no word of any solution yet”, and
published a newer copy of the cipher with corrections
to apparent mistakes in its reproduction.
• They made attempts to anagram portions of
the ciphertext with words used as cribs, such
as “Christmass” (a known misspelling used by
Zodiac), with focus on certain symbols, and on Robert Graysmith (1986): The author Robert
ciphertext regions having more repeating sym- Graysmith was a cartoonist at the San Francisco
bols. Chronicle at the time of Zodiac’s crime spree. Years
later, in 1986, Graysmith published Zodiac, a book
• They concluded: “No decryption could be af- about the case, in which he identified suspects and
fected.” claimed he solved Z340 [6] (Figure 10). Further,

6
he claimed his so-called solution was verified by Gareth Penn, 1981–1985: Gareth Penn (pen
two members of the ACA: Greg Mellen and Eugene name George Oakes), an author who wrote frequently
Waltz. We have been unable to find any evidence of about the Zodiac case, accused a University of Cal-
such verifications existing outside of Graysmith and ifornia, Berkeley professor of being the killer, and
his book. Moreover, the FBI conducted a cryptanal- developed a large body of writings containing theo-
ysis of Graysmith’s claimed solution and concluded ries, many mathematical and pseudo-cryptographical
that “the solution has been forced”, “any random in nature, in support of his claims. Many of them ap-
selection of words could be arranged to be as ‘logi- pear in his self-published books Times 17 [15] and its
cal’ [as Graysmith’s transposed plaintext]”, and the follow-up The Second Power [14]. On several occa-
“sense of rightness is completely absent in the pro- sions, the FBI analyzed his cryptographic ideas [159]
posed solution” [158]. Our own analysis led us to the and gave negative conclusions:
same conclusion [109].
• “The bulk of [Penn’s] theory. . . is based on spec-
ulation and a multitude of assumptions.”

• “It is possible that some of the assumptions are


correct. Many, if not most, appear to be forced
with results being used selectively if they are in
keeping with the overall theme of the solution.”

Figure 10: Graysmith’s claimed solution to Z340 [6].


2.1 Solution claims in popular media
(2011–present)
The popularity of the case and noteworthy nature
American Cryptogram Association (ACA),
of Z340 led many amateur codebreakers to join the
1988–1989: In a 1988 issue of The Cryptogram
efforts to solve the cipher. Many so-called solutions
[59], a non-member claimed to have an accurate Zo-
were developed that “went viral” and received signif-
diac cipher solution, and requested assistance from
icant attention in the news media. Examples include
ACA members to verify it. We don’t know if such
Corey Starliper’s arbitrary decipherment system in
assistance was provided, or of the outcome of any
2011 [98], Daryll Lathers’ anagrammed solution in
attempts to verify the solution. Then in 1989, The
2012 [73], and Gary Stewart’s 2014 production of his
Cryptogram published a computer program [60] that
father’s name from Zodiac’s ciphers [83]. Proposed
allowed ACA members to experiment with Z340, and
solutions to Z340 were frequently posted at online
reported a member, who went by the pseudonym
forums specializing in discussions on the Zodiac
TRIODE, found a possible decryption of the last two
case. Many alleged solutions were also sent to the
lines (Figure 11).
present authors to solicit analysis and feedback.
A diverse range of decryption methods were used,
with a significant portion failing to meet standards
of testing for correctness, such as having sufficient
unicity distance (minimum ciphertext length to
guarantee a single correct key), and demonstrating
uniqueness of the deciphered message, such that no
Figure 11: Claimed decipherment of last two lines of Z340 other equally plausible messages can be generated
[60]
with the same approach.

7
Corey Starliper (2011): An example of a solu- 5-part television series in which a codebreaking team
tion claim in popular media that attracted a lot of consisting of Kevin Knight, Ryan Garlick, Craig
attention was one made by Corey Starliper in 2011. Bauer, and David Oranchak was formed to explore
His claim was reported in the Tewksbury Patch with the Zodiac case and attempt to solve Z340. In the
the headline, “Tewksbury Native: I’ve Cracked The final episode an alleged partial solution (Figures 12
Code Of The Zodiac Killer” [98]. The headline sug- and 13) was presented by Craig Bauer, a professor
gested Zodiac’s cipher was solved, causing the story of mathematics at York College of Pennsylvania,
to go viral multiple times [101] and spread rapidly on former Scholar-in-Residence at NSA’s Center for
social media. David Oranchak developed an analy- Cryptologic History, and Editor-in-Chief of the
sis pointing out the many flaws in the solution claim journal Cryptologia. It reads:
[163], concluding that it was a hoax. The original
news source published a follow-up article detailing
criticisms from cryptographers, researchers, and in- HERE IT IS I KILL BOTH NIGHT AND DAY.
vestigators about Starliper’s claims [97]. The story I LIVE BY THE GUN BAREL AIM SO QUIT
exemplified a trend in Zodiac-related news that un- WISHING FOR GAME TO BE OVER PIGS IS MI
critically reports individuals’ claims2 . WRIST NI LOCKS? NOW ANGRY DANGEROS. I
WON’T CHANGE ANY OF GAME
RICHERD M NIKSON [107]
Gary Stewart (2014): In 2014, authors Susan
Mustafa and Gary Stewart published The Most Dan-
gerous Animal of All: Searching for My Father. . . Producers of the show opted to excise the code-
and Finding the Zodiac Killer [17]. The book chron- breaking team’s objections to Bauer’s so-called
icled Stewart’s search for his biological father, Earl solution, and it was aired as if it were supported by
Van Best Jr., whom he identified as the Zodiac Killer the team’s efforts and endorsement. Bill Briere, a
based on circumstantial evidence. The book was classical cryptanalyst, wrote a critical review of the
adapted for production into a documentary series on production, including: “Unlike History’s portrayal,
FX Network in 2020 [81]. During the production, cryptanalysis is not a creative-writing exercise, a
producers tried to validate Stewart’s claims with a game of Scrabble, or a magic trick. It is a science. If
private investigator, who ultimately uncovered evi- the damage that’s been done is to be turned around,
dence contradicting and discrediting Stewart. Stew- we cryptanalysts must call out the fakes when we see
art and Mustafa were confronted with these findings them and not allow cryptologic history to be rewritten
on camera for the docuseries. Vulture detailed [80] by entertainers, charlatans, and profiteers.” [147]
how the series disproved the book’s claims, and in-
cluded Mustafa’s contrite admission: “The lesson to Nick Pelling, author of the Cipher Mysteries blog,
be learned here, for me, is setting out to prove some- gave a sardonic and negative review of Bauer’s
thing as opposed to disproving something is a big mis- solution: “I suspect what most people would agree on
take. That’s a big mistake for a journalist to make. I about this ‘solution’ are:
have to own up to it. I have to take responsibility for
it.” Her admission is a reminder of confirmation bias
[44], a tendency which can cause people to focus on • it’s primarily intuitive, and not really ‘crypto-
supportive evidence for their claims and beliefs while logical’ in any useful sense of the word.
ignoring contrary information.

Craig Bauer (2017): In 2017, the History chan- • it’s either really brilliant or really foolish, and
nel released The Hunt for the Zodiac Killer [155], a almost certainly nowhere inbetween.” [171]
2 Examples include: [91], [63], [72], and [82]

8
• At the 2015 Symposium on Cryptologic History
[116] and 2018 ACA conference [117], Oranchak
gave a summary of Zodiac’s ciphers, what was
known about Z340, and the progress to date to-
wards any solution. In 2017 he presented the
challenges of separating true and false clues ob-
served in Z340 [115].

More examples involving academic work and com-


putational methods are included in subsequent sec-
Figure 12: The Craig Bauer alleged solution to the first 8 tions.
lines of Z340. [107]

2.3 Prior academic efforts


(1993–2019)
Figure 13: The Craig Bauer alleged partial solution to
A wide variety of academic studies explored
lines 19 and 20 of Z340. [107] codebreaking methods for the Zodiac ciphers in
particular, and homophonic ciphers in general. A
sampling of these studies follows.
2.2 Present authors’ prior efforts
(2012–2017) King and Bahler (1993) [35] described an algo-
rithm that automatically detected and collapsed
The decryption success reported herein was preceded cyclic homophones (also known as cyclic variants).
by the authors’ many years of failed experiments, Their approach was able to partially detect cyclic
dead-end ideas, and efforts to summarize what was homophones in Z408 but failed to confirm them in
known about the Zodiac case and ciphers. Some ex- Z340. Their previous paper [34] described a mea-
amples include: surement called multiplicity, computed as the ratio
of the cipher alphabet size to the ciphertext length.
• Oranchak [168] ran an experiment using a large This measurement combined with unicity distances
corpus of text to apply cribs to Z408 and Z340, provided a way to characterize the difficulty in
in an attempt to reveal possible plaintext in non- arriving at solutions for homophonic ciphers.
cribbed portions of the ciphers.

• In a 2012 article [162], Oranchak summarized Dao (2008) [22] attempted to determine if the
reasons for and against belief in a real plaintext method used to produce Z340 was homophonic
message in Z340. substitution, and produced hill climbing software for
solving such ciphers.
• Around 2013, Jarl Van Eycke began participat-
ing in Zodiac forums [142] and exploring hy- Oranchak (2008) [47] developed a dictionary-based
potheses for Z340 using the ZKDecrypto [131] attack using a genetic algorithm (an optimization
software written by Brax Sisco, Michael Eaton, method inspired by natural selection) that reframed
and Wesley Hopper. This eventually led to homophonic substitution as a constraint satisfaction
his development of AZdecrypt to achieve bet- problem. The technique effectively solved known
ter performance and more cryptanalytic capa- ciphers such as Z408 but Z340 remained unbroken.
bilities. He also worked on novel statistical anal-
yses, which helped guide various explorations of Basavaraju (2009) [19] produced a homophonic
hypotheses and experiments. cipher solver via genetic algorithm with crossover

9
variations. It was able to produce partial decrypts Turkish language.
of Z408 but no solution to Z340 was found.
Zhong (2016) [56] used Hidden Markov Models
Raddum and Sýs (2010) [48] explored the hypoth- (HMM) to break homophonic substitution ciphers.
esis that Z340 was not just a faked cipher (i.e., a The attack was tested on Z340 but failed, even when
random stream of meaningless symbols), by showing assuming Z340 was a combination of homophonic
that the amount of orderly cycles of repeating substitution and a type of column transposition.
symbols in the ciphertext was high compared to
random sequences. They explained a strategy for Vobbilisetty et al. (2017) [54] applied Hidden
decryption of homophonic ciphers that worked for Markov Models to solve simple substitution ciphers,
Z408 but failed to produce a solution for Z340. then expanded the technique to work on homophonic
substitution ciphers.
Ravi and Knight (2011) [49] developed a Bayesian
approach (updating probabilities and making predic- Kopal (2019) [36] developed a codebreaking
tions), using dictionaries and letter n-gram language method for homophonic ciphers using simulated
models to crack simple and homophonic substitution annealing (an optimization method inspired by
ciphers. They demonstrated the approach’s ability metallurgical annealing) with fixed temperatures.
to automatically crack Z408.
Juzek (2019) [32] introduced a cipher classification
Berg-Kirkpatrick and Klein (2013) [21] improved method using information theory and support vector
Expectation-Maximization (an iterative statistical machines (a supervised learning algorithm for classi-
algorithm) using random restarts, and applied fication and regression tasks). The method correctly
the algorithm to homophonic ciphers, including classified Z408 as a substitution cipher. It classified
Z340, which failed to yield a solution. Also, by Z340 as an “advanced cipher” or “pseudo-cipher”.
successfully cracking many ciphers made to match
properties of the real Z340, the authors argued that 2.4 Computational tools and
Z340 was likely not a homophonic cipher as assumed.
methods (1969–2020)
Dhavare, Low, and Stamp (2013) [24] developed In addition to the computational methods described
a nested hill climber attack for homophonic ciphers in the academic papers listed earlier, other computer
that they also applied to Z340. They reported based tools for cryptanalysis of homophonic ciphers
putative plaintexts but none are correct. have been developed over the years. Some examples
are summarized below.
Nuhn et al. (2013) [46] used beam search, a
heuristic algorithm that narrows down a search In the Zodiac case files made available by the
space, to crack homophonic substitution ciphers, FBI, a cryptanalysis report dated December 18,
including Z408. They did not report the presumably 1969 appears [156] (Figure 50). The report describes
negative results for Z340. examinations on Z340 and the application of EDP
(electronic data processing) runs, wherein crib words
Yi (2014) [55] described an attack based on and phrases were applied with computer assistance
the combination of homophonic substitution and into the ciphertext at different positions, resulting
columnar transposition. When applied to Z340, no in printouts that could be examined for potentially
legible plaintext was discovered. legible results from other regions of the ciphertext.

Serengil and Akin (2011) [50] attacked Turkish In 1989 the American Cryptogram Association’s
homophonic ciphers using vulnerabilities of the periodical The Cryptogram featured an article [60]

10
about the Zodiac ciphers and included an interactive
BASIC program which prompts the user to enter Oranchak developed a limited dictionary-based
cipher-to-plaintext letter substitutions, and displays substitution solver in 2008 [47]. It uses a genetic
the resulting plaintext decryptions for examination. algorithm to slide a non-conflicting set of words
into candidate locations within a highly-constrained
CrypTool [26] [38] is open source cryptography substring of a ciphertext. The quality of solutions is
e-learning software which supports numerous cryp- measured using letter n-gram statistics.
tographic algorithms. Development began in 1998,
and by 2012 its successor CrypTool 2 was released. In 2011 Oranchak developed CryptoScope [127],
The software has evolved into an extensible, modular another web-based interactive tool for performing
platform for configuring workflows and experiments cryptanalysis on Z340 and other ciphers. It was
with cryptographic algorithms, and has automated designed to produce statistical analyses and search
cryptanalysis and codebreaking features. It also for meaningful patterns in ciphertexts.
includes a homophonic substitution analyzer, which
can break Z408. CryptoCrack [129], initially released in 2011
and regularly updated, is interactive codebreaking
Software called ZKDecrypto [131] was one of the software developed by Phil Pilcrow that can auto-
first (if not the first) that could automatically and matically crack over 60 different cipher types.
accurately decrypt the Z408 cipher. It uses a tabu
hill climber search to explore random modifications Mike Cole developed a cipher generator in 2012
to candidate substitution keys. Recent modifications [120], designed to produce Zodiac-like homophonic
are stored in a tabu list, a memory structure that substitutions, which is especially useful for testing
stores recently explored solutions, which helps hypotheses and automated solvers.
guide the search into novel territory in the search
landscape. ZKDecrypto was a group programming In 2013 Umanovskis [132] developed lgp-decrypto,
effort started in 2006 by Brax Sisco, Michael Eaton, a linear genetic algorithm to attack Z340. He also
and Wesley Hopper, with some contributions from developed zkdecrypto-lite, a lightweight version of
David Campbell. Sisco started with a command ZKDecrypto designed for batched experiments [133].
line version that could automatically solve Z408.
Eaton and Hopper joined the project later to add a Oranchak in 2013 released an interactive word
graphical user interface. search tool [126] that interprets cipher symbols
directly as plaintext, and conducts searches for
In 2007 Oranchak developed a web-based inter- words entered by users.
active tool for cracking Z340 [128]. Users could
visit the site and experiment with their own symbol In 2017, Heiko Kalista developed several tools
substitutions to try to solve the cipher. The tool related to cryptanalysis of Zodiac ciphers. One was
assumed Z340 was constructed as a simple homo- Peek-A-Boo [122], a tool for visualizing transposi-
phonic substitution, so in retrospect the users were tion schemes. Kalista designed it to improve the
always doomed to failure. exploration of different transpositions of Z340 in a
more visual manner. He also created an automatic
In 2007 University of North Texas professor Ryan solver called Your Secret Pal [121] which uses a hill
Garlick led an effort [102] to implement a heuristic climber to crack homophonic substitution ciphers
search for solutions to Z340, including a server-based quickly. Additionally, he created a homophonic
architecture that received candidate keys from cipher generation tool called Cipher Factory [123],
distributed clients, as a way to parallelize and scale which allows users to produce test ciphers with
up the codebreaking task. adjustable parameters.

11
Lasry’s broad application of search metaheuristics
Oranchak released another homophonic cipher [13], Matthews’ use of genetic algorithms [43], and
cryptanalysis tool called Cipher Explorer in 2017 Song et al.’s development of a simulated annealing
[125]. It was designed to display the various Zodiac genetic algorithm [52].
ciphers symbolically, to more resemble the original
ciphertexts and layouts, and gives users many tools
for marking up ciphertexts for presentational needs.
AZdecrypt: AZdecrypt [134] is a highly special-
In 2019 Fritz Reichmann developed cDecryptor ized cipher solver created by one of the present
and jDecryptor [130], a hill climbing algorithm authors, Jarl Van Eycke, in 2014. He developed
written in C++ and Java, respectively, for solving the program because he wished to join the effort
homophonic substitution ciphers. to break Z340, and was inspired by ZKDecrypto
which became the basis for his program. As Van
George Belden released Project Zenith [118], Eycke explored different hypotheses about Z340,
another hill climber for homophonic substitution he incorporated experimental efforts and ideas into
ciphers, in 2019. Inspired by AZdecrypt, it started AZdecrypt. It uses a highly tuned, optimized, and
as a standalone program which evolved into a specialized simulated annealing algorithm. On a
web-based version. modern 8-core CPU AZdecrypt can solve up to 200
homophonic substitution ciphers per second with
In 2020 Jonathan Block created an interactive a 99%+ solve rate [180]. Because of this speed
web-based solver [119] that lets users supply sub- and accuracy, AZdecrypt set the stage for running
stitutions for cipher symbols to produce plaintext tests on millions of transposition variations and test
solution candidates for Z340. It also supports ciphers per day on personal computers, which accel-
rearranging Z340 with a few transposition variants. erated the exploration of experimental hypotheses.
It can also solve a wide variety of transposition
Other studies of computational techniques used and polyalphabetic ciphers directly, and in various
to cryptanalyze and solve substitution ciphers in combinations.
general include Delman’s application of genetic
algorithms (2004) [23], Forsyth and Safavi-Naini’s When testing candidate plaintexts, AZdecrypt
use of simulated annealing (1993) [27], Jakob- normally measures letter n-gram statistics crossing
sen’s iterations of matrix manipulations (1995) the row boundaries of the cipher grid. Geoffrey
[31], King and Bahler’s algorithm for reducing LaTurner introduced the idea of adapting AZdecrypt
sets of homophones (1993) [35], Lasry’s broad so these measurements avoid crossing row bound-
application of search metaheuristics (2018) [13], and aries instead [170]. This feature was important
Spillman et al.’s use of genetic algorithms (1993) [53]. for exploring the possibility that Z340 contained
fragments of plaintext that were not in the correct
Studies more focused on transposition ciphers in order, or that such fragments resulted from errors in
general include Al-Kazaz et al’s use of a compres- the original encipherment process.
sion model to recognize correct decryptions [33],
Delman’s application of genetic algorithms [23], AZdecrypt uses letter n-gram statistics to measure
Dimovski and Gligoroski’s use of three optimization candidate solutions when its hill climber explores
heuristics [25], Giddy and Safavi-Naini’s application candidate keys. Most letter n-gram based solvers are
of simulated annealing to combinatorial optimization limited to 5- or 6-grams, but because of its optimiza-
[29], Kullback’s general solution for double transpo- tions, AZdecrypt can support up to 8-grams, which
sition [12], Lasry et al’s divide-and-conquer approach are ideal for codebreaking problems with longer keys
to solving a double transposition challenge [39], or shorter available ciphertext. Such large n-grams

12
impose huge memory requirements on personal
computers (up to 256GB), but in 2019 programmer
and researcher Louie Helm developed a modular
method to load 8-gram stats into much less RAM
(16GB and less) [139]. In the two years leading up to
Z340’s solution, Helm made many contributions to
improve AZdecrypt’s code and handling of n-gram
statistics.

While many of the aforementioned tools and stud- Figure 14: Z408 cycling of homophones. Fourteen plain-
ies were effective for specific encipherment systems text Es are substituted with two identical seven-symbol se-
and configurations, we will see in subsequent sections quences.
that Z340 resisted cryptanalysis for so long because
of its nature as a mixed or blended cryptosystem.

3 Observations and
measurements
Online collaboration was an important component in
the search for a solution to Z340. Many participants
in this search made online contributions such as
forum posts, blog entries, emails, social media posts,
and videos. A significant challenge in this effort Figure 15: Cycling of symbol groups in Z340
was organizing the information that was generated
from such a diverse community, which is composed
of contributors with a wide range of skills, both Z408 shows a very strong homophone cycling
applicable and non-applicable to cryptanalysis. behavior. That is, for a given plaintext letter,
Much of the content generated by the community is substitution variants are sometimes selected from an
speculative in nature, or otherwise does not directlyorderly repeating sequence of multiple cipher sym-
apply to formal cryptanalysis of Z340. bols (example shown in Figure 14). However, while
Z340 showed a similar cycling behavior (Figure 15),
In 2012 Oranchak started a web page to collect it was not as significant, and was perhaps disrupted
factual observations made on the Zodiac ciphers over by the encipherment method.
the years [164]. The primary goal in maintaining
such a summary was to create a substantial factual Z340 exhibits an unusual absence of repetitions
basis from which to draw ideas and plans for further of symbols appearing within the same horizontal
experimentation on Z340. Because the encipherment window of length 17 (the width of the cipher grid
method was unknown, the sea of possibilities was is also 17). This was taken to be evidence of some
vast, so it was hoped these observations would help purposeful process Zodiac applied when creating the
guide the way. cipher. A related observation is that there are nine
rows that have zero repeating symbols (Figure 16),
Some of the noteworthy observations made since which is statistically significant compared to random
Z340 was published were as follows: scrambles of the cipher. We speculate Zodiac may
have intentionally obscured cycling homophones

13
with this approach, and that it suggests the symbols are joined by a shared fourth cipher symbol (Figure
were assigned in a normal horizontal reading order. 17). The orientations of the two shapes are identical,
making them more conspicuous. One discovery of
the shapes was posted in 2010 on an online Zodiac
forum [135]. It was suspected that the shapes were
indications of some purposeful encipherment pro-
cess beyond homophonic substitution, particularly
because of the rarity of such patterns appearing in
both normal substitution cipher grids and random
shuffles of Z340. Oranchak observed them appearing
at a rate of approximately once per 237,000 random
shuffles of Z340 [164]. It was also observed that such
patterns are more likely to occur if the underlying
plaintext is very repetitive.

Figure 16: Nine lines of Z340 have no repeating symbols.

Z408 has a significant amount of errors, which


include spelling errors, encipherment mistakes, and Figure 17: Repeating backwards L-shaped patterns of in-
an undeciphered section at the end (possible nulls or tersecting trigrams in Z340. These patterns are some-
filler). Whether these were intentional, or reflections times referred to as “pivots”.
of hurried or amateur effort, is unknown.
Z340 has a set of symbols that are unusually
Twenty of the symbols in Z340 were not used in clustered, or are unexpectedly absent from certain
Z408, and comprise nearly a fourth of the entire regions of the cipher grid (Figure 18). This was
Z340 ciphertext. The additional symbols compared interpreted as additional evidence of a real enci-
to Z408 increases the keyspace size for Z340 by a pherment process and message, since the behavior
factor of 269 , and combined with the shorter cipher deviates significantly from a random process.
length of Z340 compared to Z408, makes Z340 a
harder problem to solve. Repeating trigrams are present in both Z408 and
Z340. Their appearance in the latter (Figure 19) is
Z340 has an unusual pattern of two “backwards L” suggestive of repetitive underlying plaintext, much
shapes, composed of trigrams (three cipher symbols) as it is for the former (Figure 20). Additionally, one
that repeat in vertical and horizontal directions and such repetition occurs in the same column positions

14
Figure 18: Unusual clustering. The symbols from the box
on the left only appear in the highlighted positions in Z340,
avoiding a large section in the middle of the ciphertext.

but on different rows of the cipher grid.

Figure 20: Coverage of repeating trigrams in Z408.

However, when repeating bigrams are measured


periodically (that is, with fixed intervals between
the symbols comprising the bigram), Z340 shows
a dramatic increase in repeating bigrams at period
19, whereas Z408 shows no increases at any period
other than 1. This observation was suggestive of the
possible use of transposition in Z340, and became
Figure 19: Repeating trigrams in Z340. Note one pair one of the most important guiding factors in the
appears in the same columns. search for its solution. This is discussed in more
detail in Section 5.2.
A few readable words are visible in the ciphertext
directly, such as “HER” at the very beginning, It is worth pointing out that if we expand the range
“FBI” read diagonally, and “ZODIAC” (but spelled of features we seek, then we may encounter them
ZODAIK with a solid triangle standing for the D) more often, and possibly post hoc claim them to be
at the end. Those and other examples are shown in significant. Some features might be attributable to
Figure 21. something like the look-elsewhere effect [152], a phe-
nomenon where an observation that seems statisti-
Z408 has a significant quantity of repeating cally significant actually arose by chance. For in-
bigrams, whereas Z340 has a quantity that does not stance, the aforementioned repeating backwards L-
significantly deviate from the expected result of a shaped patterns rarely appear during random shuf-
random process. fles of Z340’s ciphertext. However, many random
shuffles would also likely find other interesting and

15
Figure 22: Coverage of repeating bigrams in Z408 and
Z340.

Figure 21: Examples of “words” appearing directly in the


ciphertext: HER, GOD, BOO, TOM, FBI, POSH, BOY,
and ZODIAC (“ZODAIK”)

seemingly rare features, not just the two “backwards


L’s”. Some of the aforementioned features may be
the result of a coincidence-generating effect, which
is difficult to measure without simulating the entire
range of features that would be considered significant
when observed.
Figure 23: Re-writing Z340 using Period 19 transposition
dramatically increases the count of repeating bigrams.
3.1 FBI observations and hypotheses
In 2009, FBI Cryptanalysis and Racketeering • Randomness tests are roughly similar for Z408
Records Unit (CRRU) chief Dan Olson pointed out vs Z340.
several observations about Z340 [195] to Tom Voigt,
who runs zodiackiller.com: • If Z340 lacked a message, or was evenly scram-
bled, then row and column randomness would be
• Lines 1–3 and 11–13 show much higher random- nearly identical, which was not observed.
ness (fewer repeated characters) than other lines,
suggestive of homophonic substitution. In that same year, Olson was featured on an
episode of the History Channel show MysteryQuest
• Lines 4, 10, 14, 17 and 18 have many repeated [108], in which he describes a theory that Z340 might
symbols. need to be split into two equal parts of 10 lines each,
where only lines 1–3 and 11–13 are considered to con-
• Randomness is far greater for rows than tain a valid message. These sections must be placed
columns, seeming to point away from columnar side by side in this scheme, so that line 1 and line 11
or diagonal transposition. are read in a continuous stream, then lines 2 and 12,

16
might have been applied as an additional step in
Z340 ’s encipherment. They referred to this as a
“combination cryptosystem” and explored linear and
route transposition on candidate plaintexts, with
negative results [156].

Berg-Kirkpatrick et al. (2013) [21] argued that


Z340 is not likely strictly homophonic, due to
the ease at which Z340 -like test ciphers can be
automatically solved.

Yi (2014) [55] suspected Z340 used a combination


of substitution and columnar transposition, partly
from examining previous efforts which had failed
to crack Z340 under the homophonic substitution
assumption.

Zhong (2016) [56] also made an attempt to crack


Z340 using a combination of substitution and trans-
position, prompted by the conclusion in [21] that
such a combination was likely employed. In 2019,
Juzek’s cipher classification method [32] put Z340 in
Figure 24: Z340 and Z408 repeating bigram count at dif- the “advanced cipher” or “pseudo-cipher” category,
ferent periods. For Z340 spike occurs at period 19, with a which further added to the ever-growing suspicion
count of 37. The average count from random shuffles of that Z340 was not just a substitution cipher.
Z340 is 20.
Outside of the academic world, researchers in
the online community were using tools such as
and finally lines 3 and 13. The remaining lines may ZKDecrypto [131] and AZdecrypt [134] to crack
or may not contain a valid message. Z340-like test ciphers. These test ciphers were
designed to mimic many of Z340’s qualities and
statistics, such as length, index of coincidence (IC)
4 Conjecture: Z340 is a [2] (a statistical measurement of the likelihood of
transposition and a repeated letters), quantity of homophone cycles, and
repeating n-grams. The fact that software tools
homophonic substitution can solve these test ciphers easily but not Z340
cipher rejects the idea that Z340 is a simple homophonic
substitution cipher.
In the many years since the November 1969 mailing
of Z340, attempts to solve Z340 had repeatedly In 2019, Oranchak presented results of an ex-
failed. Many of those attempts assumed Z340 was periment using a deep learning, multiple-category
enciphered using a similar system as Z408, which classification model to classify cipher types [111].
was a monoalphabetic, homophonic substitution This classification model predicted that Z340 is
cipher. strongly homophonic but also exhibits qualities of
other types of ciphers such as route and columnar
The FBI in late 1969 suspected a transposition transposition, and also pointed strongly against the

17
hypothesis that Z340 is gibberish. argue that at least one of those ciphers is a hoax.
Mateer (2013) [42] also concluded that they are
On the other hand, the results of all of the afore- hoaxed, based on his cryptanalysis of the solved
mentioned efforts and software tools do not conclu- Beale cipher and its construction method.
sively point at the combination cryptosystem hypoth-
esis, because any of the following hypotheses could Further indications of the possible use of trans-
also have been true: position include these unusual qualities observed in
Z340 ’s ciphertext:
• Z340 could have been enciphered with a message
whose n-gram frequency distribution is an out- • Patterns in Z340, such as the repeating “back-
lier when compared to the usual n-gram statis- wards L” shapes (Figure 17), were suggestive of
tics used in many programmatic hill climbers. patterns in underlying plaintext being oriented
For example, the plaintext could have been writ- in multiple directions.
ten without the use of the letter e, the most com-
mon letter in the English language. Such a text • Cyclic homophones in Z340 are somewhat sup-
is known as a lipogram, a kind of constrained pressed (Figure 15) when compared to Z408
writing. Other examples of statistical outliers (Figure 14) and to other constructed test ciphers
for the plaintext could be: a list of names, loca- of length 340. One explanation is that a transpo-
tions, or a long sequence of numbers spelled out sition step may have disrupted the cycling phe-
in words. However, in such cases, n-gram statis- nomenon3 .
tics could be generated for use by a specialized
run of a hill climber to attempt to exclude these • The cipher contains a lower number of repeat-
hypotheses. ing bigrams than expected (Figure 22). Other
test homophonic ciphers with known underly-
• Z340 could have been intended as a legitimate ing plaintext messages, similar indices of coin-
substitution cipher but some unknown error in cidence, and similar cipher symbol distributions
its encipherment process yielded unrecoverable usually contain more repeating bigrams than ob-
plaintext. Specialized experiments are required served in Z340.
to exclude this hypothesis, but since the error
type and extent are unknown, it is difficult to • The repeating bigram count spikes dramatically
cover all the possibilities. at period 19 (Figure 23) (see Section 5.2). Nor-
mal bigrams are considered to be at period 1
• Z340 could have been a hoaxed or gibberish mes- (that is, taking Z340 as a one-dimensional lin-
sage, intentionally devised to waste investiga- ear sequence, the bigram’s constituent symbols
tors’ time, much to the presumed satisfaction of have a linear distance of exactly one position).
Zodiac. This hypothesis can be explored by sim- The constituent symbols of a bigram at period
ulating the method of constructing the hoaxed or 19 have a one-dimensional distance of exactly
gibberish cipher, but again the type and extent 19 positions. Several transposition cipher types,
of such a construction method are unknown and such as columnar transposition, are known to
difficult to cover adequately. Some examples of exhibit similar periodic qualities in their cipher-
examinations of hoax hypotheses exist in the lit- texts. Figure 24 shows Z340’s repeating bigram
erature for other ciphers. For example, in 1980 count over a range of considered periods, where
Gillogly [30] examined the seemingly encrypted it peaks at period 19.
Beale papers from the 19th century. Only one 3 However, this may be contradicted by the observation of
has been solved and the others have received minimal repeating symbols within windows of length 17 as
attention from literally generations of cryptan- described in Section 3, which would be difficult to achieve if
alysts. Gillogly presented statistical evidence to substitution were performed prior to transposition.

18
We further argue that the following qualities
pointed away from the gibberish or hoax hypothe-
ses:
• The repeating n-gram patterns described above
were suggestive of repeating patterns in a real
underlying plaintext.
• Cyclic use of homophones was detected for Z340,
even though its presence was less significant than
it was for Z408.
• Unigram (single symbol) distribution of Z340
is consistent with the premise that Zodiac was
actively avoiding premature reuse of his cipher Figure 25: The forward K symbol was corrected by Zodiac
symbols. This “spread out” nature of unigrams to a backwards K.
is statistically significant, and occurs in a hori-
zontal reading direction consistent with a hori-
zontal substitution process [164].
5 Attacking Z340
• Successful decryption of Z408 revealed it was de- 5.1 Crowdsourced research
signed with a real message, so Zodiac had al-
ready proved his ability to create a functioning The Internet has enabled crowdsourcing of research
cipher. on the Zodiac Killer case for several decades.
The first noteworthy Zodiac-focused website, Tom
• The space of possible transposition schemes, par- Voigt’s zodiackiller.com, has been in operation since
ticularly ones that might have been invented by it was launched in 1998 [90]. It became a focal
Zodiac, had not yet been explored exhaustively. point for case-related information, documents, and
Numerous experiments were still possible, since discussions. The popularity of the case gradually
the quantity of hypotheses was so high. led to more websites with their own communi-
• Zodiac corrected a mistaken symbol in the top ties of collaborating Zodiac researchers, such as
right region of ciphertext (Figure 25), suggest- Michael Butterfield’s zodiackillerfacts.com launched
ing that he cared enough about his creation to in 2007 [136], and Mike Morford’s zodiackiller.net
correct a possible mistake, but evidently did not (formerly zodiackillersite.com and zodiackiller-
want to suffer the tedium of redrafting the entire site.forummotion.com) in 2010 [142]. Such sites
cipher grid. hosted many active conversations with research,
information, opinions, speculations, stories and
• We hypothesize that Zodiac was motivated by debates about the Zodiac case and ciphers.
attention, and wanted Z340 solved because it
would get his name into the headlines not only Analysis of Z340 benefited from collecting factual
after mailing it to the newspapers, but when information about the cipher, its context in the
a solution was found (which is what happened Zodiac case, statistical analyses of the ciphertext,
with Z408 [92] [62]). With a single functioning and other cryptanalytic observations. In those early
cipher, he could get his name in the news at least days of online collaboration on the case, very little
twice. But a hoaxed cipher would have likely re- research material pertaining to Zodiac’s ciphers was
mained perpetually obscure. Nevertheless, the available in the academic literature. Some useful
notoriety of Z340 grew the longer it remained factual details, cryptanalytic observations, and
unsolved. experimental results were found in online Zodiac-

19
themed forums, but these were difficult to identify In particular, the repeating “backwards L” shapes
due to the breadth of conversations. For example, were suggestive of possible use of multiple reading
many of the conversations were speculative and/or directions [135]. But more importantly, periodic
argumentative in nature, so useful factual details qualities were observed when investigating repeating
got lost in the noise. This motivated Oranchak to bigram counts.
collate and summarize factual observations on the
website zodiackillerciphers.com, as an “Encyclopedia In the summer of 2015, both Van Eycke [143] and
of Observations” [164]. As users on online forums a Zodiac forum user using the alias daikon [138] in-
discovered interesting details about the ciphers, dependently made the same observation that bigram
Oranchak endeavored to preserve them on the site. counts increased at period 19 (sometimes referred to
This allowed other researchers to use the information as “a distance of 19”). Both initially thought that
as a foundational source of factual details to build columnar transposition was involved in the encipher-
upon. ment process, but experiments based on that hypoth-
esis had negative results. Additionally, other enci-
The online community drew a wide variety of pherment schemes were considered, such as zigzag
people eager to crack the case and its ciphers, which routes, spiral routes, splitting the grid into quadrants
brought many different approaches and viewpoints. or subgrids, diagonal routes, reflections, flips, rota-
Z340 ’s notoriety in particular attracted the interest tions, interleaving columns, interleaving rows, polyal-
of people from many walks of life and with a phabetic schemes, and more. One hypothesis was
wide range of abilities pertaining to codebreaking. that Zodiac may have made some encipherment mis-
Some people had no codebreaking experience and takes during transposition, such as accidentally skip-
approached the ciphers with intuition, speculation, ping or duplicating parts of the message during tran-
pattern-seeking, sometimes flawed analysis, and scription or transposition, which would introduce sig-
confirmation bias (a tendency to accept validating nificant errors in decryption. None of these hit upon
information but reject contradicting information). the exact method used to encipher Z340, but some
Some also became aggressively convinced their of the manipulations of ciphertext resulted in even
favored Zodiac suspect was the correct one and higher bigram counts than that observed for period
the ciphers reflected their suspect’s name or other 19 bigrams. The responsiveness of bigram counts to
details4 . Others brought more rational and/or simple manipulations of the ciphertext was an impor-
technical skills to the investigations. Taken as a tant clue that motivated the authors’ further experi-
whole, the combined efforts of the entire group ments [164].
of enthusiastic investigators led to crowdsourced
knowledge about Z340, providing many useful details 5.2 Repeating bigram counts
that made the discovery of its solution possible, as
long as researchers could navigate around numerous Let us define a bigram as an ordered pair of ci-
unusable ideas and information. phertext elements (symbols) or plaintext elements
(letters). For example, Z340 ’s ciphertext begins
A number of researchers investigating Z340 sus- with the bigram (c1 , c2 ) = (H, E). Z408 ’s plaintext
pected it may have used a different encipherment begins with the bigram (p1 , p2 ) = (I, L).
system than Z408, or a similar system with addi-
tional steps. In the previous section we summarized Consider the linear distance between elements of
observations of Z340 that led to these suspicions. the bigram. In those examples, the distance is one
4 Some people also derived or generated information point-
since the bigram elements are adjacent to each other.
ing to their suspect from Zodiac’s non-enciphered letters, or
So we define those as period 1 bigrams. But we also
from the factual case details themselves such as locations and consider bigrams more generally, at any distance or
dates. period.

20
Algorithm 1 Period p algorithm 25, only 1.36 standard deviations from the mean ob-
1: function bigrams(c, p, n) ▷ Generate served for random shuffles of Z340 ’s ciphertext. In an
B, the sequence of period p bigrams from cipher experiment with 1,000 artificially constructed homo-
c of length n. Note: p must be ≤ n/2. phonic ciphertexts of length 340, with known under-
2: B ← {} lying plaintexts sampled from English-language cor-
3: i←1 pora, the average number of repeating bigrams ob-
4: while i ≤ p do served was 34.5 [112] (Figure 26).
5: j←i
6: while j ≤ n − p do
7: B ← B ∪ {(cj , cj+p )} unless j + p > n
8: j ←j+p
9: end while
10: i←i+1
11: end while
12: return B
13: end function

A ciphertext c consists of a sequence of ciphertext


units, (c1 , c2 , c3 , . . . , cn ), where n is the length
of the ciphertext. The full sequence of period 1 Figure 26: Repeating bigrams in shuffles of Z340 (left his-
bigrams, expressed as a sequence of ordered pairs, is: togram) vs. Z340-like ciphertexts (right histogram). Dot-
{(c1 , c2 ), (c2 , c3 ), . . . , (cn−1 , cn )}. There are several ted lines from left to right mark: Mean of repeats for shuf-
methods to produce a bigram sequence for any fles of Z340 (20), repeats for Z340 period 1 (25), mean of
period. One way is given by the BIGRAMS function repeats for Z340-like ciphers (34.5), and repeats for Z340
shown in Algorithm 1, which successively samples period 19 (37).
bigrams from the ciphertext at the given period. We
analyze this method in more detail in Section 5.3, But for Z340, a total of 34 different periods in
where it is referred to as pseudo-period transposition.the range [2, 170] result in repeating bigram counts
that meet or exceed that of period 1. The highest
A bigram repeats if the same ordered pair ap- occurs at 5
period 19, for which there are 37 repeating
pears in multiple locations in the sequence. Let bigrams . This led to suspicion that a transposition
us define the bigram count for a bigram b as c(b), scheme might be involved in the construction of
and set it to the number of times b appears in the Z340. By contrast, there is no period in the range
bigram sequence. Then define the repeat count as [2, 204] such that bigram counts for the Z408 exceed
r(b) = c(b) − 1. For example, if b appears three times its count for period 1, and Z408 is known to lack a
in the ciphertext, then c(b) = 3, and r(b) = 2. transposition step.

Further transposition variations raise the total


We measure the total repeating bigrams for a ci-
repeating bigram counts [164]. For example, hori-
phertext by summing r(b) for every distinct bigram
zontally mirroring the ciphertext prior to measuring
b in the sequence. For Z408 (period 1), this to-
the period 15 bigram count raises the count from 37
tal is 62, which is 7.52 standard deviations from the
mean observed for random shuffles of Z408 ’s cipher- 5 The next highest peaks are 30 at period 5, 29 at period

text. By contrast, Z340 (period 1) has a total of 39, and 28 at period 85.

21
to 41. Column period 2 combined with linear period • Feeding the transposed versions of Z340 into
18 produces 44 repeating bigrams. Various row-wise AZdecrypt and other solver programs.
and column-wise offsets and periodic operations lead
to between 41 and 45 bigrams. Moving the entire last • Generating test ciphers under various hypothe-
column immediately before the first column raises ses, then cryptanalyzing them to determine if
period 19 repeats from 37 to 45. These increases Z340 could fall under the same hypotheses.
in observed repeating bigrams by applying simple
• Exploring other hypotheses such as:
manipulations were suspected to be due to getting
closer to the true transposition scheme of Z340. – Encipherment mistakes or interruptions
such as transposition misalignments,
Other noteworthy ciphers demonstrate periodical skipped symbols (nulls), or extra inserted
behavior due to transposition-related encipherment symbols (filler).
[170]:
– Polyalphabetism
• Feynman 1 [172] (period 5) – Wildcards (that is, certain cipher symbols
• Kryptos 3 [20] (periods 8 and 85) may be allowed to stand for any letter, or
any selection from a fixed set of letters)
• Langrenus [85] (period 3)
– Variations of inscription (how the cipher is
Some periodic repeating bigram behavior can be written) and transcription (how the cipher
attributed to redundancy in language. For example, is read)
Van Eycke shows that the average plaintext of size – Quadrants or subgrids
340 will show repeating bigram counts for periods 1,
2 and 3 that are higher than the observed counts for • Connecting observations of periodic phenomena
random shuffles of plaintext [170]. with other aspects of Z340.

The backwards L shapes (pivots) (see Figure 17) • Investigating Z340 ’s somewhat suppressed ho-
contributed to the periodic bigram count, but at pe- mophonic cycling behavior, and determining if
riod 39 instead of 19, because they consist of bigrams any manipulations could reverse this partially
that repeat at period 39. muted effect.

• Determining what role the pivots and other un-


5.3 Transposition investigations usual features might have in the encipherment
scheme.
The periodic nature of Z340 became the focus of
many threads on the Zodiac Killer online forums, par- • Incorporating transposition schemes into AZde-
ticularly Mike Morford’s (defunct) site zodiackiller- crypt directly so it can explore a space of trans-
site.com [142]. For several years prior to discovery of positions.
the solution, there were many cryptanalytic investi-
gations and experiments conducted by forum partic- • Sharing and analyzing solution proposals.
ipants. Activities included:
On May 17, 2020, Van Eycke proposed a trans-
• Statistical analysis and cryptanalysis. position hypothesis for Z340 (Figure 27) [144],
which, in hindsight, closely resembled the correct
• Attempts to determine if specific observations
hypothesis. It also significantly increased Z340’s
were statistically significant.
repeating bigram count from 25 to 42. However,
• Rearranging Z340 using a wide variety of trans- due to errors in Zodiac’s encryption, running this
position rules. transposed version of Z340 through AZdecrypt at

22
the time did not yield a positive result. Van Eycke
was on the right track with his significant discovery,
and had essentially found the needle in the haystack
without realizing it.

Figure 28: Pseudo-period 19: period 18 when wrapping


around vertically and period 19 otherwise.

nals through the two-dimensional representation of


the cipher when viewed as a 20 by 17 array. Blake
wanted to explore similar transpositions; one little-
known way to enumerate a two-dimensional array is
via a doubly-periodic proper decimation. That is, a
proper (n, m)-decimation of an N by M array, C is
given by
Figure 27: Van Eycke’s proposed transposition matrix for
Z340 [144]. Cell numbers represent the reading order for decn,m (Ck ) = Cn k mod N,m k mod M
this transposition.
k ∈ [0, N × M − 1],

In January 2019, Australian applied mathemati- providing n is coprime to N and m is coprime


cian Sam Blake reached out to David Oranchak to M . (If these conditions are not satisfied, then
after watching his YouTube talk titled “The Zodiac the decimation is improper and some indices will be
Ciphers—What do we know, and when do we stop missed.) While this may appear complex, geomet-
trying to solve them?” [116]. Blake was intrigued rically this is just n-down, m-across, and wrapping
by Oranchak’s discussion of the statistically unlikely around periodically both horizontally and vertically.
spike in repeating bigrams at period 19, as observed
by daikon (a zodiackillersite.com forum user) [138] The (1, 2)-decimation of a 20 by 17 array takes
and Jarl Van Eycke [143]. Blake noticed the period similar diagonals through the cipher as the pseudo-
19 discussed was only a pseudo-period 19, as it used period 19 and period 19 transpositions (Figure 30).
period 18 when wrapping around vertically. In Fig-
ures 28 and 29 we illustrate the differences between The pseudo-period 19, period 19, and the (1, 2)-
period 19 and pseudo-period 19 transpositions of the decimation of Z340 each possess 37 repeating
indices of Z340. bigrams. Blake passed these observations on to
Oranchak by email in early 2019.
Both of these transpositions take similar diago-

23
Figure 29: Period 19: a period 19 decimation of 340. Figure 30: (1, 2)-decimation of a 20 by 17 array.

Blake then enumerated billions of candidate the plaintext6 . Plaintexts that more closely
transposition schemes and applied each scheme in resemble English language text score higher
an iterative way to produce a set of transposition than plaintexts that resemble gibberish.
variants. These variants were sieved based on
thresholding the number of repeating bigrams. Z340 ’s cipher alphabet contains 63 distinct sym-
bols, which lowers the cipher’s index of coincidence
Using these variants, during 2019 and 2020, Oran- compared to substitution ciphers with smaller alpha-
chak and Blake conducted experiments on Z340 with bets. This results in a much larger space of possible
these steps: substitution keys. Therefore, there was a greater
probability of finding readable words and phrases
• Blake produced batches of transposition varia- when automatic solvers such as AZdecrypt searched
tions of Z340, under certain fixed transposition for high-scoring substitution keys. But among such
schemes. results, none appeared to be on the right track.

• Oranchak processed each variation in AZdecrypt Blake and Oranchak expanded their search to
which would produce a batch of candidate plain- include the hypothesis that Zodiac may have split
texts. his cipher into multiple sections. Starting with
one horizontal split, Blake and Oranchak consid-
• Blake processed each variation in ZKDecrypto ered all positive a, b such that a + b = 17 (Figure 31).
using the Spartan supercomputer [176] at The
University of Melbourne. Then one vertical split, considering all positive a,
• Oranchak analyzed the plaintext results to deter- b such that a + b = 20 (Figure 32).
mine if any of them warranted further scrutiny.
This was extended to two and three horizontal
– AZdecrypt ranks each plaintext result and three vertical splits, where Blake and Oran-
based on a composite score that includes 6 The entropy is needed to keep the solver from converging
language n-gram statistics, and the en- to solutions that only use a few of the most common letters in
tropy (or measure of unpredictability) of the English alphabet (“n-gram spaghetti”). [180]

24
a b
5.4 Solution breakthrough, first 9
rows

20

Because of the sheer number of transposition vari-


ations, and the fear that a positive result may
have been lost in the pile, Blake and Oranchak
decided to reprocess them all in AZdecrypt with
17 a more careful experimental approach, paying
closer attention to the AZdecrypt scores and their
Figure 31: Splitting the cipher horizontally into two ver-
relationship to cipher length (because many of
tical segments.
the transpositions had length less than 340 due to
omitted portions that accounted for nulls and skips
in the ciphertext). AZdecrypt scoring was changed
from 5-gram stats (the default) to 6-gram stats.
It was hoped the increase in n-gram stats would
improve the accuracy of the solver. At this stage,
b
the total number of transposition variations to be
reprocessed was 655,088. Also, during the course
20
of previous experiments, Van Eycke released newer
versions of AZdecrypt with more features, bug fixes,
and performance improvements. A new feature that
a
turned out to be instrumental was the software’s
ability to add whitespace characters automatically
to candidate plaintexts. Both Z408 and Z340 lack
17
word divisions, so decrypted plaintexts also lack
Figure 32: Splitting the cipher vertically into two hori- them. But AZdecrypt’s new feature could automati-
zontal segments. cally insert them where they likely belonged, based
on language n-gram statistics. This made partial
solutions much more comprehensible.

chak considered all positive a, b, c, d such that


a + b + c + d = 17 and a + b + c + d = 20 respectively.

On December 2, 2020, Blake and Oranchak began


Blake and Oranchak had wanted to test all can- running the batch of 655,088 transposition variations
didate transpositions for each section; however, the of Z340 in AZdecrypt. By the next day, after only
number of candidates proved to be intractable. So processing a relatively small portion of the variations,
they initially considered using the same candidate AZdecrypt reported the following result for one of
transposition on each section. Each was processed them, which included some noteworthy words and
in AZdecrypt and ZKDecrypto with seemingly nega- phrases (marked in all-caps) that attracted their in-
tive results. terest:

25
e [HOPE YOU ARE] he sing ist
torra enn [TRYING TO CATCH
ME] th aftaint mt on the
ts [SHOT WHICH BRINGS UP]
als in tabs it me name of ar
heed [OR THE GAS CHAMBER]
beca ate it wild vent me
roler a dice ai i the vs
shen because too wha seen
tight deserts wors ros me Figure 33: The phrases “HOPE YOU ARE” and “TRY-
there everyoneed [HE HAS ING TO CATCH ME” resemble these phrases in Zodiac’s
other correspondences.
NOTHING THEN THEY] he ach
paradict is they alreare and
norder ther ameo earre and • Section 3 : Row 19
becauite is yot tv hat mr
newe itle never ind baeyn • Section 4 : Row 20
neia at a hoe cdr pet
The same transposition scheme, a (1, 2)-decimation
Those phrases constituted only 23% of the cipher- had been applied to each section (Figures 34 and 35).
text. The remaining 73% still appeared to be mostly This scheme is formally defined in Section 5.3, but
incomprehensible gibberish. It was not unusual can also be described with the following procedure:
for candidate plaintexts to feature assortments of
1. Start at position 1. This is considered the cur-
comprehensible phrases amidst noise or gibberish,
rent position.
but in this particular candidate, the subject matter
of the legible phrases was striking, and evidently 2. Write out the cipher symbol at the current posi-
consistent with the tone of writing associated with tion.
Zodiac’s other correspondences (Figure 33). For
example, “HOPE YOU ARE” is reminiscent of 3. Move down one position, wrapping around to the
Zodiac’s phrases from other letters: “I hope you first row if the bottommost boundary of the grid
have fun” [182], “I hope you do not think” [181], and is reached.
“I hope you enjoy your selves” [183]. The phrase
4. Move right two positions, wrapping around to
“TRYING TO CATCH ME” resembled a theme that
the first column if the rightmost boundary of the
appeared in other Zodiac letters: “The police shall
grid is reached.
never catch me” [191], and “If the Blue Meannies
[sic] are evere [sic] going to catch me” [189]. These 5. Continue from step 2 until all positions are vis-
factors compelled us to pay closer attention to this ited.
particular solution candidate.
Because the solution was far from complete, and
The transposition variation that led to this solu- the transposition was applied to individual sections,
tion was one that split the original 20 rows of Z340 ’s Oranchak decided to run Section 1, consisting of the
ciphertext into four sections: first 9 rows of Z340, in AZdecrypt. This produced
a negative result (Figure 36), likely due to the high
• Section 1 : The first 9 rows multiplicity. Multiplicity [34] is the ratio of the key
length to the cipher length. When considering only
• Section 2 : The second 9 rows the first 9 rows, this ratio is thus 63/153 or about

26
Figure 34: A (1, 2)-decimation matrix for all four sections Figure 35: The (1, 2)-decimation from Figure 34 applied
of Z340. to all four sections. Left: Original Z340 ciphertext; Right:
Results after applying decimation to each section.

0.41. By contrast, the multiplicity of Z408 is only to eight and mous the first lled
0.13. Automatic solvers can find solutions for low think there say song yours again
multiplicity ciphers more easily than they can for year ours tots pot so en their indith
high multiplicity ciphers, due to the smaller solution indiving tenderal but welcoment sound
space of the former7 . thems easily place thanized use of
stuff you
To overcome this limitation, Oranchak used
the cribbing feature in AZdecrypt. Cribbing is
the insertion of known or suspected text into a Figure 36: AZdecrypt solution for first 9 rows of trans-
candidate plaintext, to try to coax more legible posed Z340, no cribs applied. Negative result.
plaintext out of the non-cribbed regions. Oranchak
placed the phrases HOPE YOU ARE, TRYING
TO CATCH ME, and THE GAS CHAMBER into amount of fixed partial plaintext. It quickly con-
the locations where they appeared in the plaintext verged on the plaintext shown in Figure 38.
that had resulted from the batch run. Placing The three of us believed there was a very high
the cribs in their corresponding positions resulted chance this message was close to the true message
in substitutions for 27 of the 63 unique symbols intended by Zodiac, because of these factors:
of Z340’s cipher alphabet (or about 43% of its
• Despite some garbled misspellings, the message
key), yielding 83 out of 153 characters (or 54%)
was intuitively comprehensible.
of the entire plaintext for the first 9 rows (Figure 37).
• Comprehensible portions of previous decryption
AZdecrypt’s key search was then initiated to attempts in AZdecrypt were usually very short
recover the remaining 46% of plaintext, looking by comparison (isolated to individual words and
through a much smaller search space due to the large small fragments).
7 We later found that AZdecrypt can solve the first 9 rows • The (1, 2)-decimation transposition scheme was
without using cribs if n-grams of length 7 or higher are used. orderly, and not random rearrangements (ana-

27
– Seventeen days prior, on October 22, 1969,
someone claiming to be Zodiac had repeat-
edly called into Jim Dunbar’s live call-in
TV program which also featured prominent
attorney Melvin Belli [106].
– The decryption said, “That wasn’t me on
the TV show.”
– During the program, the same caller said,
“I need help. I’m sick. I don’t want to go to
the gas chamber.” [84] (emphasis ours)
– Z340’s Section 1 decryption said, “I am not
afraid of the gas chamber.”

Figure 37: AZdecrypt cribs for Section 1 of Z340’s ci- 5.5 Solution breakthrough,
phertext.
remaining sections

i [HOPE YOU ARE] having lots of fun


in [TRYING TO CATCH ME] that wasnt
me on the tv show which bring or pa
point about me i um not afraid of
[THE GAS CHAMBER] becuase it will
send me to pay unlce all the

Figure 38: Initial AZdecrypt solution for cribbed Section


1. Cribs are marked. Figure 39: Homophonic substitution key for Z340 derived
from Section 1 breakthrough. Note: There are no substi-
tutions for the letters J, K, Q, X, and Z since none appear
gramming) such as those employed by other in the plaintext.
misguided solution attempts which can gener-
ate numerous non-unique, comprehensible and All symbols of Zodiac’s cipher alphabet for Z340
partially comprehensible solutions (e.g. [6] [158] appear in the first nine rows of the transposed ci-
[109]). pher. Therefore, the entire cipher key was already
determined (Figure 39) and could be applied to the
• The decryption process did not force predeter- remaining sections of the cipher, resulting in the fol-
mined words or phrases into the plaintext, apart lowing 340-character plaintext:
from the phrases used in the cribbing, which was
only prompted by their spontaneous appearance • Section 1: I HOPE YOU ARE HAVING LOTS OF
in the initial batch run of systematic transposi- FUN IN TRYING TO CATCH ME THAT WASNT ME
tion variations of Z340. ON THE TV SHOW WHICH BRING OR PA POINT
ABOUT ME I UM NOT AFRAID OF THE GAS
• The decryption made significant contemporary CHAMBER BECUASE IT WILL SEND ME TO PAY
references that lined up with known events in UNLCE ALL THE
the Zodiac case:
• Section 2: SOO HEN BE CURSEE OOW HAVE
– Zodiac mailed Z340 on November 8, 1969. ENSUGH SLAVER TO WOR V FOV ME WHERE

28
ESERYONE EL HEH US NOTHING WHEN THEY
REACH PAY UNICE SO TREY ALREU FAA I FI
OF NET TH IF AM NO EA FREA IF BNC ARISE
IV YO WT SHAT MR NEW
• Section 3: EIW LENESE FLIL BAAY
• Section 4: NNE I UADAHO I CFR PET
The second section had a high English language
n-gram score compared to random text or gibberish,
but still appeared garbled. For example, Section 2’s
top-scoring 6-grams based on English language statis-
tics were as follows:
• NOTHIN, WHENTH, HENTHE, SNOTHI, MEWHER,
YONEEL, THEYRE, OTHING, INGWHE, ERYONE,
Figure 40: “DEATH” and “LIFE IS” appear in plaintext
HEYREA, THINGW, EWHERE, RYONEE, NTHEYR,
prior to transpositions of sections.
ENTHEY, WHEREE, HAVEEN, NGWHEN, HINGWH,
SLAVER, GWHENT, EYALRE, EYREAC, OWHAVE, EFIL WILL EB NA EASY ENO NI
RTOWOR, HENBEC, ERTOWO, YREACH, HEREES
ECIDARAP DEATH
The 6-grams match many common words and
phrases in English. (e.g., nothing, when the, they’re, LIFE WILL BE AN EASY ONE IN
thing when, everyone, etc.) Furthermore, when ap- PARADICE DEATH
plying this cipher key to the original unmodified Z340
ciphertext, we noticed some additional clear text Figure 41: Last two lines of Z340 plaintext. Top: Normal
(Figure 40): and reversed words were observed. Bottom: Result of re-
versals.
• The word DEATH appeared at the very end of
the last line.
• BECAUSE ? HAVE ENOUGH SLAVES TO WORK
• LIFE IS appeared in the upper right portion of FOR ME WHERE EVERYONE ELSE HAS NOTHING
the 2nd section. WHEN THEY REACH PARADICE SO THEY ARE
At that point, Oranchak, Blake, and Van Eycke AFRAID OF LETTING ? BECAUSE I (VOW?)...
teamed up to determine how to resolve the remaining
garbled sections of ciphertext. Thinking that Zodiac We soon noticed that errors were systematically
changed his strategy for Section 2 of the cipher, we appearing on line 15 (the 6th line of Section 2)
briefly explored other variations of transpositions (Figure 42). Van Eycke determined the cause:
that might lead to a better decryption, but reached there was a symbol skipped on that line. Much of
negative results. However, we noticed reversed words the garbled text was corrected by circularly right-
within the last two lines of the candidate plaintext shifting the segment RATENYRNOSRVSH within the line
(Figure 41). IERRATENYRNOSRVSH, to read IERHRATENYRNOSRVS8 .
He also determined that the portion reading LIFE IS
Because the 2nd section seemed only partially gar- needed to be ignored during the transposition step
bled, we tried to interpret it using the closest match- in the 2nd section. Once those two items were taken
ing words and phrases. One partial interpretation 8 The H at the end wraps around to the fourth position in

was: the line after right-shifting.

29
into account, transposition of the 2nd section results
in comprehensible plaintext.

Figure 43: The transposition used to encipher Z340.

OF DEATH I AM NOT AFRAID BECAUSE I


[VNOW: KNOW] THAT MY NEW LIFE WILL BE
Figure 42: Examples of four words that were garbled on AN EASY ONE IN [PARADICE: PARADISE]
the same line of Section 2 during transposition. LIFE IS DEATH

With these corrections, the transposition used in The final substitution key is given in Figure 44.
the enciphering of Z340 is given in Figure 43. Final transpositions of cipher and plaintext are given
in Figures 53 and Figures 54.
The full plaintext, including remaining mis-
spellings (in brackets, with assumed corrections)9 , is
as follows:

• I HOPE YOU ARE HAVING LOTS OF [FAN:


FUN] IN TRYING TO CATCH ME THAT WASN’T
ME ON THE TV SHOW WHICH [BRINGO:
BRINGS] UP A POINT ABOUT ME I AM NOT
AFRAID OF THE GAS CHAMBER [BECAASE:
BECAUSE] IT WILL SEND ME TO [PARADLCE:
Figure 44: Refined homophonic substitution key to deci-
PARADISE] ALL THE [SOOHER: SOONER]
pher entire Z340 ciphertext. Note: There are no substitu-
BECAUSE [E: I] NOW HAVE ENOUGH SLAVES
tions for the letters J, K, Q, X, and Z since none appear
TO [WORV: WORK] FOR ME WHERE EVERYONE in the plaintext.
ELSE HAS NOTHING WHEN THEY REACH
[PARADICE: PARADISE] SO THEY ARE AFRAID
On December 5, 202010 , we submitted a report
9 We placed the “LIFE IS” portion, which was ignored dur- summarizing our findings to the FBI Cryptanalysis
ing transposition, near the end, to read “LIFE IS DEATH”.
The precise placement of “LIFE IS” remains subjective, and 10 In a bizarre coincidence, this was the 340th day of the

other possible interpretations are documented at [167]. year 2020. We did not plan this!

30
and Racketeering Records Unit (CRRU ). On Decem- 6 von zur Gathen’s estimate of
ber 11, after sufficient time was given to conduct vic-
tim notifications, we were cleared to release our solu-
Z340 ’s unicity distance
tion to the public, which was done via a video posted In the previous section, we outlined several items
to YouTube [113]. The FBI released two official state- that support our claim that the true solution has
ments on December 11, 2020 confirming the solution. been found, such as contemporary references to
The first is attributed to the San Francisco FBI field events involving Zodiac, the lack of forced words and
office and is a more general announcement. The sec- phrases, and the application of methodical trans-
ond is from the FBI as a whole and gives more detail position methods rather than random rearrangement.
from the perspective of CRRU, the FBI Laboratory
unit that includes cryptanalysts. The statements are We supplement the evidence with von zur Gathen’s
as follows: paper [28]. He estimated the unicity distance for
Z340 ’s cipher system. Unicity distance, defined in
• FBI, San Francisco Field Office [79]: “The FBI Claude Shannon’s 1949 paper [51], is the minimum
is aware that a cipher attributed to the Zo- length of ciphertext needed to guarantee that a leg-
diac Killer was recently solved by private citi- ible decipherment is the only one that can be found
zens. The Zodiac Killer case remains an ongo- for the given cipher system. In other words, if the ci-
ing investigation for the FBI San Francisco di- phertext meets this minimum length, then it is prac-
vision and our local law enforcement partners. tically impossible for another key to exist that pro-
The Zodiac Killer terrorized multiple communi- duces an equally plausible (but different) decryption.
ties across Northern California and even though The calculation of unicity distance is based on the en-
decades have gone by, we continue to seek jus- tropy (measurement of uncertainty or unpredictabil-
tice for the victims of these brutal crimes. Due ity) of the cipher key space, and the redundancy of
to the ongoing nature of the investigation, and the underlying plaintext language. Von zur Gathen
out of respect for the victims and their families, performed a calculation of unicity distance based on
we will not be providing further comment at this the information theoretic contributions of individual
time.” components of Z340 ’s encipherment system:

• Statement from FBI [148]: “The FBI has a team 1. Homophonic substitution
of cryptanalysis experts that decipher coded
messages, symbols, and records from criminals 2. Sectioned plaintext
known as the Cryptanalysis and Racketeering
3. Transpositions
Records Unit. CRRU regularly works with the
cryptologic research community to solve ciphers. 4. Irregular substitutions (misspellings and “dum-
On December 5, 2020, the FBI received the solu- mies” or nulls)
tion to a cipher popularly known as Z340 from
a cryptologic researcher and independently ver- He then considered the entropy (or unpredictabil-
ified the decryption. Cipher Z340 is one of four ity) of the underlying plaintext language by calculat-
ciphers attributed to the Zodiac Killer. This ing it under three different assumptions:
cipher was first submitted to the FBI Labora-
tory on November 13, 1969, but not successfully 1. The base language is standard English.
decrypted. Over the past 51 years CRRU has 2. The base language is represented solely by
reviewed numerous proposed solutions from the Z340’s plaintext.
public—none of which had merit. The cipher
was recently solved by a team of three private 3. The base language is the entirety of Zodiac’s cor-
citizens.” pus, consisting of all of his correspondences.

31
However, the varying quantitative range found for then writing each letter out in turn following this
base language entropies in those three scenarios did “two right, one down” rule.
not have much effect on the final unicity calculation,
which von zur Gathen determined to be at most 152.
Since the discovered Z340 message has length 340, Triangular manipulations: An equivalent trans-
it is well beyond this limit, and can be concluded position, discovered by CRRU forensic cryptanalyst
to be the only plausible decryption of the ciphertext Jeanne Anderson, can be achieved using a simple me-
under Z340 ’s encipherment system, and subject to chanical method involving triangular divisions of the
the assumptions stated in von zur Gathen’s paper. ciphertext grid for sections 1 and 2. The steps ap-
plied to Section 1 are as follows11 :

7 Discussion and open 1. Write out the plaintext for the section in the
normal reading direction, in a grid containing 9
questions rows of 17 characters (Figure 45).
7.1 Speculations on construction 2. Rewrite the plaintext into a grid of the same
method dimensions, but vertically by columns.

The “backwards L” patterns (pivots), as discussed 3. Divide the grid into triangular sections, noted in
in Section 3 (Figure 17), do not seem to have a Figure 46.
known connection to the transposition scheme that
4. Move the triangular sections in a mirroring fash-
Zodiac used. This remains an open question: Did
ion, as shown in Figure 46.
Zodiac purposefully create those patterns, upon
noticing that the transposed plaintext had similar 5. The resulting grid of plaintext is the final ar-
patterns, by carefully assigning symbols to preserve rangement of the plaintext for that section prior
the patterns? Or were they a random unintended to substitution with symbols.
result of the encipherment process?
A similar process can be followed for Section 2.
It is not clear what method Zodiac used to apply However, the complications of “LIFE IS” remaining
the transposition scheme to Section 1 and Section untransposed, and the error made on the 6th line of
2. Presumably, he performed the transposition by the section, have to be taken into account.
hand, using only pen and paper. We are aware of the
following two hypotheses for construction methods. Software tools such as AZdecrypt and Kopal’s
Z340 transposition reverser [124] can be used on
the original ciphertext to reverse the transposition
process and yield the normal reading order of the
Knight’s move: In chess, the knight piece can
encrypted plaintext.
move on the board two squares vertically and one
square horizontally, or two squares horizontally
and one square vertically. The transposition op-
eration needed to read the decoded plaintext in Graph paper: An observation made on the Zodiac
the untransposed Z340 cipher resembles this move, forums in 2011 [141] noted that graph paper contain-
where the knight piece always moves right two ing half-inch squares (two squares per inch) relates
squares and down one square, wrapping around the to the combined dimensions of Z408 and Z340. The
boundaries of the section as needed. It is possible standard size for letter paper in the United States is
Zodiac constructed the plaintext grid in this fashion, 11 A video that shows a demonstration of these steps can be

starting his message in the upper left corner and viewed at [114], starting at the 10:09 timestamp.

32
required to decrypt Z340. However, there is not yet
a way to confirm these speculations.

Figure 45: Rewriting Section 1 plaintext by columns. On


the left is the starting plaintext. On the right is the plain-
text rewritten vertically by columns. Colors alternate at
word breaks.

Figure 47: Four envelopes mailed by Zodiac on which


he had written text in diagonal directions [194]. Clock-
wise from top left: Z340 envelope (November 8, 1969),
“Bus Bomb” letter (November 9, 1969), Melvin Belli let-
ter (December 20, 1969), and Halloween card (October
27, 1970).
Figure 46: Rewriting Section 1 plaintext by triangles. On
the left is the plaintext rewritten vertically by columns.
On the right is the plaintext after triangular portions are
rewritten in a mirrored fashion.
7.2 Security through obscurity
It is clear that the complications introduced by Zo-
diac led to much delay in its solution. If the ci-
8.5” x 11”. Thus two such sheets of half-inch ruled pher were simply one of the well-understood classi-
graph paper together contain 748 squares, which ex- cal systems, such as homophonic substitution, trans-
actly equals the sum of the lengths of Z408 and Z340. position, or polyalphabetic substitution (e.g., Vi-
Whether or not Zodiac intended this remains a sub- genère), then traditional cryptanalysis and applica-
ject of speculation. tion of powerful cipher solving tools would have bro-
ken it. But several factors that needed to be discov-
Transposition clues: Another open question is: ered confounded cryptanalysis for many years:
Did Zodiac leave hints about how to decrypt Z340 ?
• The presence of sectional divisions of the cipher
grid.
Starting with the card Z340 was mailed in, Zo-
diac sent three communications in a row, and a Hal- • The quantity and dimensions of the sections.
loween card, with diagonal writing on the accompa-
nying envelopes (Figure 47), something he did not do • The types of transpositions applied to each sec-
in his other communications. We can speculate that tion.
these may have hinted at the diagonal reading di-
rection of Z340’s transposition scheme. Further, the • The disruptions to the transposition procedures.
Halloween card bears a distinctive and unexplained • The presence and quantity of misspellings and
symbol shown in Figure 48. It is made up of diagonal encipherment errors.
line segments, which could be interpreted as diagonal
reading directions, and the segments could be inter- • The substitution key required to uncover the
preted as splitting a region into three sections, as was plaintext.

33
Zodiac succeeded in applying the principle of se- cryptography, such as the 1920s series “Solving Ci-
curity through obscurity, whereby ignorance of the pher Secrets” by M. E. Ohaver [178]. Ohaver’s ar-
presence and components of a method of secrecy is ticles and the contemporary popularity of crypto-
enough to protect the secret. We are not aware of graphic puzzles led to the founding of the Ameri-
any cryptanalytic tools that could have aided in such can Cryptogram Association in 1930 [146]. Comic
a combination of difficulties except for the manual books in Zodiac’s time were also full of codes, ci-
and iterative process we went through. And if any phers, and articles about cryptography [110]. Zo-
of the confounding factors had been more extreme diac’s correspondences included several references to
(e.g., additional sections, different combinations of pop culture, such as The Most Dangerous Game [86],
transpositions, additional encipherment errors, more Gilbert and Sullivan’s The Mikado [185], The Exor-
unique symbols, etc.), the cipher might still remain cist [184], and Badlands [190]. Thus we might specu-
unsolved. late he could have obtained cryptography knowledge
from other pop culture sources such as comic books
and detective magazines.
7.3 Zodiac’s cryptographic ability
Can we make any conclusions about Zodiac’s skill
pertaining to cryptography, and where he may have 8 Future directions
learned those skills? The plaintext itself does not
seem to reveal any additional information about the 8.1 Zodiac’s identity
perpetrator’s identity or his crimes. We can only
speculate on some possibilities. Much of the effort behind attempts to crack Z340
and Zodiac’s other cryptograms came from curiosity
The first is that police and amateur investigators about the hidden messages and the possibility that
alike have speculated that Zodiac may be linked Zodiac may have indeed given up his name or other
to the military [95]. This speculation is based on identifying information, or perhaps additional infor-
observations such as his crew cut hairstyle, close mation about his crimes. In a letter that he mailed
proximity of his crimes to a Navy base on Mare on July 31, 1969 with one segment of Z408 [74],
Island in Vallejo, and the perceived expertise in Zodiac claimed: “In this cipher is my identity.” Four
ciphers, explosives, bomb making, orienteering and days later he mailed a letter to the San Francisco
firearms conveyed by his correspondences. Also, Chronicle teasing authorities with: “By the way,
military-style boot prints were found at one of the are the police having a good time with the code? If
crime scenes [151]. If he served in the military, not, tell them to cheer up; when they do crack it
perhaps he received cryptologic training there. they will have me [61].” But within days, Z408 was
solved and revealed Zodiac’s admission: “I will not
The second possibility is that he was self-taught give you my name because you will try to slow down
about cryptography from contemporary sources. or stop my collecting of slaves for my afterlife [96].”
Many books about making and breaking codes were
available in his time [140], including David Kahn’s In later messages, Zodiac continued his game of
comprehensive history of cryptography, The Code- teasing that he might reveal his name. Referring to
breakers [11], first published in 1967, two years be- Z340 which was still unsolved at the time, he began
fore Zodiac created his cryptograms. Detective fic- his April 20, 1970 letter [67] with a similar question:
tion stories in periodicals and newspapers in the early “By the way have you cracked the last cipher I
20th century sometimes involved codes and ciphers12 . sent you? My name is ”. The blank line
These periodicals also published many articles about was immediately followed by his third cryptogram,
Z13. Short enough to suggest it might conceal a
12 Examples include [87] [89] [104] and [105]. name, Z13 is an intriguing target for sleuths and

34
codebreakers. Many attempts have been made to killings, including his running theme of produc-
extract names and other identifying information ing “slaves for [his] afterlife.”
from the short sequence of symbols [169]. Given his
previous unfulfilled claim to reveal his identity in
the puzzle, there is no reason to believe he would Z340 :
simply give up his name in it, unless he understood
the difficulty of verifying any solution that might fit. • He likely made Z340 more complicated to solve
Nevertheless, people interested in the Zodiac case because of how quickly Z408 was solved.
continue to try to extract names and other infor-
mation from Zodiac’s ciphers and correspondences,
on the chance that he really did hide his personal • He added transposition features, which were not
details somewhere. present in Z408, and reflect a somewhat deeper
understanding of classical cryptography.
The aforementioned Professor Donald C. B. Marsh
(see Section 2) was again interviewed about the • The plaintext message again revealed nothing
Zodiac ciphers. In a January 6, 1970 article in specific about Zodiac’s identity apart from deny-
the Vallejo Evening News Chronicle [76], Marsh ing he was the same “Zodiac” that appeared on
said he suspected Zodiac would likely have not the Jim Dunbar program with Melvin Belli [106].
put his name in Z340, since he failed to put any The message continued Zodiac’s theme of killing
identifying information in Z408. Marsh also said he to produce slaves for his afterlife which he re-
and fellow members of the American Cryptogram ferred to as “paradice [sic]”, a word he also used
association “have not wasted much time or effort” in other correspondences.
on Z340, because “I would imagine. . . the contents
of this second cipher are as valueless as those of
• He was concerned with setting the record
the first—consisting merely of boasts or a rehash
straight, or at least his perception of the record.
of his warped philosophical beliefs.” Now that we
He denied calling in to the Jim Dunbar TV pro-
know the hidden message in Z340, his suspicion was
gram, writing he had “grown rather angry with
accurate and arguably prophetic.
the police for their telling lies” about him [191],
and denied responsibility [181] for a bomb that
Short of a specific name, we can speculate on some
killed San Francisco police officer Brian McDon-
elements of Zodiac’s profile based on what we have
nell [69].
learned from the two solved ciphers:

Z408 : • He possibly expected Z340 to be solved rela-


tively quickly, otherwise the reference to Jim
• He knew enough about cryptography to apply a Dunbar’s TV program would become increas-
proper homophonic substitution. ingly dated the longer the cipher remained un-
• He was sloppy and made some encipherment mis- solved. Perhaps he was better at creating ciphers
takes and misspellings (or perhaps intentionally than solving them or estimating the difficulty of
made them). solving them.

• His construction of the cipher grid was overall


Readers may research suspects in the Zodiac
orderly, and his application of homophones dur-
case by visiting online communities, such as Tom
ing substitution was organized.
Voigt’s Zodiac Killer site (https://zodiackiller.
• The plaintext message revealed not his identity com) and Mike Morford’s Zodiac forum (https://
but a list of his purported motivations for his forum.zodiackillerciphers.com/community).

35
8.2 Remaining Zodiac ciphers • It is filler added by Zodiac, ostensibly to fill
out the 3rd section of ciphertext so that it
8.2.1 Z13 and Z32
matches the dimensions of the previous two sec-
In Section 1.5 we discussed Zodiac’s remaining ci- tions (Z408 was split into thirds and mailed to
phers: Z13 and Z32. At the time of publication they three different newspapers).
remain unsolved. Under minimal assumptions, such
as the hypothesis that they employ simple substitu- • It contains a still unknown secondary message,
tion, they do not meet the unicity distance require- requiring a different key and/or procedure than
ments to guarantee unique solutions. Many plausible that used to decrypt the first 390 characters.
plaintexts can be generated under this hypothesis.
For example, thousands of solutions can be gener- If Z18 does indeed contain a still hidden message,
ated for Z13 and are collected at [169]. And it is al- then discovering it faces the same steep challenge pre-
most trivial to generate plausible plaintexts for Z32 sented by Z13 and Z32. Fifteen of its 18 symbols
because 29 of its 32 symbols are unique, giving sig- are unique, making it easy to generate many plausi-
nificant freedom in producing substitution keys that ble and scientifically unfalsifiable plaintexts. By con-
yield legible plaintexts. Therefore, for both cryp- trast, the 390-character solved portion of Z408 uses
tograms, there is no known test that can scientifically an alphabet of only 54 unique symbols, which highly
falsify or validate candidate solutions, apart from the constrains the space of possible legible plaintexts.
biases and preferences of whoever produces them, or
the remote chance that more directly confirming Zo- 8.2.3 Miscellaneous symbology
diac materials can be found such as his notebooks
or a confession. Now that we know Z340 was com- Several mysterious elements, not necessarily crypto-
plicated by unexpected factors that were added to graphic in nature, still remain in Zodiac’s correspon-
simple homophonic substitution, it is possible that dences, and there is much speculation on whether or
Zodiac may have added similar complications to the not they have any meaning.
encipherment of Z13 and Z32, greatly expanding the
space of possibilities. Thus, extraordinary evidence is
required to confirm solutions for such short ciphers13 .

8.2.2 Z18
In Section 1.3 we discuss Z408 and its last 18 sym-
bols, which we denote Z18. The substitution key for
Z408 produces a readable message for all but the last
18 letters, which read: EBEORIETEMETHHPITI14 . Two Figure 48: Symbol found on the Halloween card (left) and
possible explanations for this sequence are: its envelope (right) [192].
13 Some possibilities include:
1. Solid connections are discovered between the solved ci- The Halloween card symbol: Zodiac mailed a
phers and Z13 or Z32. Halloween card to San Francisco Chronicle reporter
2. The ciphers are discovered to have been taken from some Paul Avery on October 20, 1970 [192]. The card
other source for which a verified solution is available. contained handwritten threatening remarks and sym-
3. Zodiac’s worksheets are discovered and they show how bols, including the unique and explained mark shown
the cryptograms were made. in Figure 48 which appeared both inside the card and
14 Slight variations in this sequence are possible due to some on the envelope the card was mailed in. A wide va-
cipher symbols being associated with more than one plaintext riety of interpretations of the symbol have been sug-
letter. For more details, see [161]. gested, many of which are tracked at [166].

36
at least some of the remaining unsolved ciphers.
Investigating Z340 was a years-long process of ex-
perimental iteration, resulting in the organic growth
of skills and software tools required to tackle the
problem. Ultimately, an exhaustive and laborious
experimental process, involving both manually and
automatically executed steps, was required to unlock
the solution. One small step that can be made
with existing tools is to generalize the exploration
of suspected segments of an unknown ciphertext.
A possible avenue of future research would be to
Figure 49: Exorcist letter symbol [184]. add such a feature to a solver such as AZdecrypt,
such that the dimensions of the segments would be
considered part of candidate keys. Perhaps then
The Exorcist letter markings: On January 29,
the solver can discover partially accurate keys to
1974, after being silent for almost three years, Zodiac
Z340 and other unknown ciphertexts without being
mailed another letter to the San Francisco Chronicle
given any specific information about how they are
[184]. The letter mentioned the film The Exorcist and
constructed.
included mysterious markings at the bottom (Figure
49) resembling fragments of letters of the alphabet.
Various speculative interpretations of these markings
are tracked at [165]. 8.4 Cipher type classification
One of the most important steps in the cryptanalysis
8.3 Improvements to cryptanalytic of an unknown cipher is the identification of the en-
tools cipherment method. Over time, cryptographers have
developed methods for identifying unique signatures
The resilience of Z340 to cryptanalysis shows that or markers that help reduce the space of possible
classical encryption methods can be adjusted in cryptographic schemes. Historically this has been
ways that make them overcome their significant performed manually by skilled cryptanalysts but now
security limitations. Hybrid cryptographic schemes, computers are relied upon to aid the task. The ci-
unpredictable layouts, encipherment mistakes, other pher type identification problem has been studied15 ,
errors, ad hoc manipulations, and other factors are and identification systems have a variety of reported
often not sufficiently considered when attacking an accuracies. Some systems incorporate artificial intel-
unknown cipher. Had Z340 been constructed with ligence concepts such as neural networks, and train
more of these kinds of complications, it might still classifiers to identify cipher types using large sets of
remain unsolved. examples of known ciphertexts. It is conceivable that
greater classification accuracies can be achieved with
Many unsolved ciphers considered to be “classical” larger training sets and more hardware, such as those
or pen-and-paper oriented remain unsolved [177] used by LLM (large language model ) applications,
[154], which may be due to these kinds of challenges. like ChatGPT [160]. Such large training sets could
Cryptanalysis tools and codebreaking software often be supplemented with examples of hybrid and ad hoc
look at individual classical cryptographic schemes encipherment systems to improve the generalization
rather than hybrid or modified schemes such as power of classifiers. Improved ability to identify enci-
how Z340 was constructed. Modifying these tools pherment systems will likely result in breakthroughs
to incorporate what we learned from Z340 will
be challenging but possibly essential to breaking 15 Examples include [18] [37] [40] [41] and [45].

37
in solving more unsolved ciphers. 10.1 David Oranchak
Thanks to Sam, Jarl, and the rest of the Zodiac
research community for all their hard work that led
9 Summary to this success. Mike Morford, Michael Butterfield
and Tom Voigt for their Zodiac sites and forums, full
of useful information, collections of case materials
After 51 years, the exceedingly large target on
(a source of many of the images in this paper),
the back of the Z340 has finally been taken
and lively discussions. Brax Cisco, Wesley Hopper,
down. If not for the previously detailed fragments
Michael Eaton and David Campbell for developing
“HOPEYOUARE”, “TRYINGTOCATCHME”, and
the influential solver ZKDecrypto which inspired
“GASCHAMBER” from the original partial break
Jarl’s AZdecrypt. Geofrey LaTurner who contributed
of the cipher, the Z340 might still remain unsolved.
many fascinating cipher experiments on the forums
in his investigations of the period 19 phenomena.
We have detailed the historical significance of the Thanks to Heiko Kalista for his many contributions
Z340, prior efforts to solve the cipher, our solution, on the forums, excellent Zodiac cipher font, and
and the validation of the solution. codebreaking tools. And to Dan Olson, Jeanne
Anderson, and Scott Hull at FBI CRRU for their
The solution of this cipher was the result of a valuable support.
large, multi-decade group effort, and we ultimately
stood on the shoulders of many others’ excellent And many thanks to my family for their support
cryptanalytic contributions. and putting up with this long quest.

We dedicate our efforts to the victims of the Zodiac


10.2 Sam Blake
Killer, their families and descendants. We hope that
one day justice will prevail. Many of the experiments we conducted as part of
our research into candidate transpositions of Z340
were conceived because we had access to the Spartan
supercomputer [176] at The University of Melbourne.
10 Acknowledgments We thank The University of Melbourne’s Research
Computing Services and the Petascale Campus
We would like to thank Klaus Schmeh, Bill Briere, Initiative.
Elonka Dunin, and Louie Helm, who all gener-
ously reviewed and copy edited early drafts of this This research was conducted while I was a research
manuscript. fellow at The University of Melbourne.

Coincidentally, Elonka Dunin and Klaus Schmeh I wish to thank my former PhD Advisor, Andrew
had just released their book “Codebreaking: A Prac- Tirkel, who was a constant sounding board for my
tical Guide” on December 10, the day immediately research in this area.
before the solution to Z340 was announced. The
book had multiple references to Z340 as a famous Lastly, I wish to thank David and Jarl for their
unsolved code so, somewhat tongue-in-cheek, we in- persistence, brilliance, and amazing teamwork.
formed them that now they were going to have to
rewrite the book! (which they did, releasing an 10.3 Jarl Van Eycke
expanded edition with that and other updates on
September 19, 2023 [1]). I wish to make special mentions to:

38
• David Oranchak, for everything, including get- families of sequences with good autocorrelation and
ting this adventure started for me. pairwise cross-correlation. He subsequently used
these families of arrays in a Python package for
• Sam Blake for applying his expert mathematical encrypted spread spectrum steganography (water-
skills to the problem. marking) of audio, imagery, and video.
• Geoffrey LaTurner (aka “smokie treats”) for
working with me so actively throughout the While Sam had known about the unsolved Zodiac
years on just about everything. cipher for many years, he was inspired to look into
Z340 after watching two lectures given by David
• Louie Helm for helping me out with developing Oranchak in 2015 [116] and 2018 [117].
AZdecrypt.
Sam is currently experimenting with the final un-
• All the people at the Zodiac forums, to name a
solved Kryptos cipher [153].
few by their handles: daikon, doranchak, glurk,
Largo, Marclean, Mr lowe, smokie treats, and
f.reichmann. 11.3 Jarl Van Eycke
• All the people at the FreeBASIC forum, to name Jarl Van Eycke is a cipher expert from Flanders, Bel-
a few by their handles: counting pine, dodicat, gium. Originally schooled as a graphic designer, he
fxm, jj2007, Lothar Schirm, MichaelW, MrSwiss, now works as a warehouse operator for a logistics
paul doe, PaulSquires, SARG, srvaldez, St W, provider, mostly handling parts for the automotive
and Richard. industry. He started out with cryptography in 2014
trying to solve the unsolved Z340 cryptogram and it
• And all the people I forgot to include who should has been a hobby ever since. Starting in late 2014,
be on this list! Jarl has been the ongoing author of AZdecrypt, a fast
and powerful cipher solver [173]. Besides Z340, he
cracked the 350-year old Code of Langren [85] [175]
11 About the authors in 2021, a 122-year old encrypted newspaper ad [174]
in 2022, and holds a world record along with Louie
11.1 David Oranchak Helm for a bigram substitution challenge [173].
Dave is a software developer and cryptologist with
over 25 years of experience working on challenging
problems. He has a Master of Science degree in Com-
puter Science from NTU/Walden, and a Bachelor of
Science degree in Computer Engineering from Vir-
ginia Tech. He has worked for many areas of industry
and levels of government, including the Department
of Defense, Defense Intelligence Agency, Department
of Justice, and the codebreaking unit of the FBI. His
years of research into the Zodiac ciphers led to the
YouTube series Let’s Crack Zodiac and guest appear-
ances on a variety of TV docuseries [150].

11.2 Sam Blake


Sam has a PhD in mathematics from Monash Uni-
versity in Melbourne, Australia. His PhD concerned

39
List of Figures
1 The Zodiac Killer’s 340-character cipher [193] . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 The Zodiac Killer’s 408-character cipher [186] . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
3 The Hardens’ handwritten solution of Z408. ([4] pp. 224–225) . . . . . . . . . . . . . . . . . . 2
4 Z408 substitution key. Note: There are no substitutions for the letters J, Q, and Z since none
appear in the plaintext. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
5 Filler conjecture. Symbols along the last line are possibly copied from above. [137] . . . . . . 3
6 The Zodiac Killer’s 340-character cipher as published by the San Francisco Chronicle on
November 13, 1969. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
7 Z13, Zodiac’s 13-character cipher [67] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
8 Z32, Zodiac’s 32-character cipher [187] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
9 Request for assistance from the FBI Laboratory and its cryptographic section. [157] . . . . . 6
10 Graysmith’s claimed solution to Z340 [6]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
11 Claimed decipherment of last two lines of Z340 [60] . . . . . . . . . . . . . . . . . . . . . . . 7
12 The Craig Bauer alleged solution to the first 8 lines of Z340. [107] . . . . . . . . . . . . . . . 9
13 The Craig Bauer alleged partial solution to lines 19 and 20 of Z340. [107] . . . . . . . . . . . 9
14 Z408 cycling of homophones. Fourteen plaintext Es are substituted with two identical seven-
symbol sequences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
15 Cycling of symbol groups in Z340 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
16 Nine lines of Z340 have no repeating symbols. . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
17 Repeating backwards L-shaped patterns of intersecting trigrams in Z340. These patterns are
sometimes referred to as “pivots”. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
18 Unusual clustering. The symbols from the box on the left only appear in the highlighted
positions in Z340, avoiding a large section in the middle of the ciphertext. . . . . . . . . . . . 15
19 Repeating trigrams in Z340. Note one pair appears in the same columns. . . . . . . . . . . . 15
20 Coverage of repeating trigrams in Z408. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
21 Examples of “words” appearing directly in the ciphertext: HER, GOD, BOO, TOM, FBI,
POSH, BOY, and ZODIAC (“ZODAIK”) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
22 Coverage of repeating bigrams in Z408 and Z340. . . . . . . . . . . . . . . . . . . . . . . . . . 16
23 Re-writing Z340 using Period 19 transposition dramatically increases the count of repeating
bigrams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
24 Z340 and Z408 repeating bigram count at different periods. For Z340 spike occurs at period
19, with a count of 37. The average count from random shuffles of Z340 is 20. . . . . . . . . . 17
25 The forward K symbol was corrected by Zodiac to a backwards K. . . . . . . . . . . . . . . . 19
26 Repeating bigrams in shuffles of Z340 (left histogram) vs. Z340 -like ciphertexts (right his-
togram). Dotted lines from left to right mark: Mean of repeats for shuffles of Z340 (20),
repeats for Z340 period 1 (25), mean of repeats for Z340 -like ciphers (34.5), and repeats for
Z340 period 19 (37). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
27 Van Eycke’s proposed transposition matrix for Z340 [144]. Cell numbers represent the reading
order for this transposition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
28 Pseudo-period 19: period 18 when wrapping around vertically and period 19 otherwise. . . . 23
29 Period 19: a period 19 decimation of 340. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
30 (1, 2)-decimation of a 20 by 17 array. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
31 Splitting the cipher horizontally into two vertical segments. . . . . . . . . . . . . . . . . . . . 25
32 Splitting the cipher vertically into two horizontal segments. . . . . . . . . . . . . . . . . . . . 25

40
33 The phrases “HOPE YOU ARE” and “TRYING TO CATCH ME” resemble these phrases in
Zodiac’s other correspondences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
34 A (1, 2)-decimation matrix for all four sections of Z340. . . . . . . . . . . . . . . . . . . . . . 27
35 The (1, 2)-decimation from Figure 34 applied to all four sections. Left: Original Z340 cipher-
text; Right: Results after applying decimation to each section. . . . . . . . . . . . . . . . . . 27
36 AZdecrypt solution for first 9 rows of transposed Z340, no cribs applied. Negative result. . . 27
37 AZdecrypt cribs for Section 1 of Z340 ’s ciphertext. . . . . . . . . . . . . . . . . . . . . . . . 28
38 Initial AZdecrypt solution for cribbed Section 1. Cribs are marked. . . . . . . . . . . . . . . . 28
39 Homophonic substitution key for Z340 derived from Section 1 breakthrough. Note: There
are no substitutions for the letters J, K, Q, X, and Z since none appear in the plaintext. . . . 28
40 “DEATH” and “LIFE IS” appear in plaintext prior to transpositions of sections. . . . . . . . 29
41 Last two lines of Z340 plaintext. Top: Normal and reversed words were observed. Bottom:
Result of reversals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
42 Examples of four words that were garbled on the same line of Section 2 during transposition. 30
43 The transposition used to encipher Z340. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
44 Refined homophonic substitution key to decipher entire Z340 ciphertext. Note: There are no
substitutions for the letters J, K, Q, X, and Z since none appear in the plaintext. . . . . . . . 30
45 Rewriting Section 1 plaintext by columns. On the left is the starting plaintext. On the right
is the plaintext rewritten vertically by columns. Colors alternate at word breaks. . . . . . . . 33
46 Rewriting Section 1 plaintext by triangles. On the left is the plaintext rewritten vertically by
columns. On the right is the plaintext after triangular portions are rewritten in a mirrored
fashion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
47 Four envelopes mailed by Zodiac on which he had written text in diagonal directions [194].
Clockwise from top left: Z340 envelope (November 8, 1969), “Bus Bomb” letter (November
9, 1969), Melvin Belli letter (December 20, 1969), and Halloween card (October 27, 1970). . . 33
48 Symbol found on the Halloween card (left) and its envelope (right) [192]. . . . . . . . . . . . . 36
49 Exorcist letter symbol [184]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
50 FBI summary of Z340 analysis [156]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
51 November 8, 1969 dripping pen card (Back and front) [149]. . . . . . . . . . . . . . . . . . . . 44
52 November 8, 1969 dripping pen card (Inside) [149]. . . . . . . . . . . . . . . . . . . . . . . . . 45
53 Z340 ciphertext sections before (left) and after (right) transpositions. . . . . . . . . . . . . . 46
54 Z340 plaintext sections before (left) and after (right) transpositions. . . . . . . . . . . . . . . 47
55 An alleged attempt by NSA to solve Z340 by sliding the crib “ANOTHERSLAVE” to multiple
positions [145]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
56 June 26, 1970 Button Letter and Cipher (Z32 ) [188] . . . . . . . . . . . . . . . . . . . . . . . 49
57 June 26, 1970 Button Letter Map [188] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

41
42
A Appendix
FBI summary of Z340 analysis

Figure 50: FBI summary of Z340 analysis [156].

43
November 8, 1969 dripping pen card

Figure 51: November 8, 1969 dripping pen card (Back and front) [149].

44
November 8, 1969 dripping pen card

Figure 52: November 8, 1969 dripping pen card (Inside) [149].

45
Final Z340 ciphertext transpositions.

Figure 53: Z340 ciphertext sections before (left) and after (right) transpositions.

46
Final Z340 plaintext transpositions.

Figure 54: Z340 plaintext sections before (left) and after (right) transpositions.

47
Alleged attempt by NSA to solve Z340

Figure 55: An alleged attempt by NSA to solve Z340 by sliding the crib “ANOTHERSLAVE” to multiple positions
[145].

48
Z32 : Letter and cipher

Figure 56: June 26, 1970 Button Letter and Cipher (Z32) [188]
49
Z32 : Map

Figure 57: June 26, 1970 Button Letter Map [188]

50
B References
Books
[1] Elonka Dunin and Klaus Schmeh. Codebreaking: A Practical Guide. No Starch Press, 2023.
[2] William Frederick Friedman. The index of coincidence and its applications in cryptanalysis. Vol. 49.
Aegean Park Press California, 1987.
[3] William Frederick Friedman et al. Military Cryptanalysis, Part 1 Monoalphabetic Substitution
Systems. NSA/CSS Cryptologic Documents. National Security Agency, 1938. url:
https://books.google.com/books?id=ytcXnwEACAAJ.
[4] Robert Graysmith. Zodiac Unmasked: The Identity of America’s Most Elusive Serial Killer
Revealed. Penguin, 2007.
[5] Robert Graysmith. Zodiac: The Shocking True Story of the Hunt for the Nation’s Most Elusive
Serial Killer. Penguin, 2007, pp. 121–122.
[6] Robert Graysmith. Zodiac: The Shocking True Story of the Hunt for the Nation’s Most Elusive
Serial Killer. Penguin, 2007, pp. 241–244.
[7] David Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Simon and Schuster, 1996, p. 107.
[8] David Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Simon and Schuster, 1996, p. 96.
[9] David Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Simon and Schuster, 1996, p. 82.
[10] David Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Simon and Schuster, 1996, p. 155.
[11] David Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Simon and Schuster, 1996.
[12] Solomon Kullback. General solution for the double transposition cipher. Vol. 84. Aegean Park Press,
1980.
[13] George Lasry. A methodology for the cryptanalysis of classical ciphers with search metaheuristics.
Kassel University Press GmbH, 2018.
[14] Gareth Penn. The Second Power: A Mathematical Analysis of the letters attributed to the Zodiac
murderer and supplement to Times 17. 1999.
[15] Gareth Penn. Times 17: The Amazing Story of the Zodiac Murders in California and
Massachusetts, 1966-1981. Foxglove Press, 1987.
[16] Giambattista della Porta. De Furtivis Literarum notis, vulgo de Ziferis libri IIII. Apud Ioa. Mariam
Scotum, 1563.
[17] Gary Stewart and Susan Mustafa. The Most Dangerous Animal of All. HarperCollins Publishers,
2014. isbn: 9780007579815.

51
Papers
[18] Ahmed J Abd and Sufyan Al-Janabi. “Classification and identification of classical cipher type using
artificial neural networks”. In: Journal of Engineering and Applied Sciences 14.11 (2019),
pp. 3549–3556.
[19] Pallavi Kanagalakatte Basavaraju. “Heuristic Search Cryptanalysis of The Zodiac 340 Cipher”.
Master’s Thesis. San José State University, 2009.
[20] Craig Bauer, Gregory Link, and Dante Molle. “James Sanborn’s Kryptos and the matrix encryption
conjecture”. In: Cryptologia 40.6 (2016), pp. 541–552.
[21] Taylor Berg-Kirkpatrick and Dan Klein. “Decipherment with a million random restarts”. In:
Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing. 2013,
pp. 874–878.
[22] Thang Dao. “Analysis of the Zodiac 340-cipher”. Master’s Thesis. San José State University, 2008.
[23] Bethany Delman. “Genetic algorithms in cryptography”. Master’s Thesis. Rochester Institute of
Technology, 2004.
[24] Amrapali Dhavare, Richard M Low, and Mark Stamp. “Efficient cryptanalysis of homophonic
substitution ciphers”. In: Cryptologia 37.3 (2013), pp. 250–281.
[25] Aleksandar Dimovski and Danilo Gligoroski. “Attacks on the transposition ciphers using
optimization heuristics”. In: Proceedings of ICEST (2003), pp. 1–4.
[26] Bernhard Esslinger. “CrypTool—an open source project in practice”. In: Lessons learned from a
successful open source project. Published in Datenschutz and Datensicherheit (2009).
[27] William S Forsyth and Reihaneh Safavi-Naini. “Automated cryptanalysis of substitution ciphers”.
In: Cryptologia 17.4 (1993), pp. 407–418.
[28] Joachim von zur Gathen. “Unicity distance of the Zodiac-340 cipher”. In: Cryptologia (2023),
pp. 1–15.
[29] Jonathan P Giddy and Reihaneh Safavi-Naini. “Automated cryptanalysis of transposition ciphers”.
In: The Computer Journal 37.5 (1994), pp. 429–436.
[30] James J Gillogly. “The Beale cipher: A dissenting opinion”. In: Cryptologia 4.2 (1980), pp. 116–119.
[31] Thomas Jakobsen. “A fast method for cryptanalysis of substitution ciphers”. In: Cryptologia 19.3
(1995), pp. 265–274.
[32] Tom S Juzek. “Using the entropy of N-grams to evaluate the authenticity of substitution ciphers
and Z340 in particular”. In: Proceedings of the 2nd International Conference on Historical
Cryptology, HistoCrypt. 2019, pp. 23–26.
[33] Noor R Al-Kazaz, Sean A Irvine, and William J Teahan. “An automatic cryptanalysis of
transposition ciphers using compression”. In: Cryptology and Network Security: 15th International
Conference, CANS 2016, Milan, Italy, November 14–16, 2016, Proceedings 15. Springer. 2016,
pp. 36–52.
[34] John C King and Dennis R Bahler. “A framework for the study of homophonic ciphers in classical
encryption and genetic systems”. In: Cryptologia 17.1 (1993), pp. 45–54.
[35] John C King and Dennis R Bahler. “An algorithmic solution of sequential homophonic ciphers”. In:
Cryptologia 17.2 (1993), pp. 148–165.

52
[36] Nils Kopal. “Cryptanalysis of homophonic substitution ciphers using simulated annealing with fixed
temperature”. In: Proceedings of the 2nd International Conference on Historical Cryptology
(HistoCrypt). 2019, pp. 107–16.
[37] Nils Kopal. “Of ciphers and neurons—detecting the type of ciphers using artificial neural networks”.
In: Proceedings of the 3rd International Conference on Historical Cryptology (HistoCrypt). 171.
2020, pp. 77–86.
[38] Nils Kopal and Bernhard Esslinger. “New Ciphers and Cryptanalysis Components in CrypTool 2”.
In: 2022, pp. 127–136.
[39] George Lasry, Nils Kopal, and Arno Wacker. “Solving the double transposition challenge with a
divide-and-conquer approach”. In: Cryptologia 38.3 (2014), pp. 197–214.
[40] Ernst Leierzopf et al. “A massive machine-learning approach for classical cipher type detection
using feature engineering”. In: International Conference on Historical Cryptology (HistoCrypt).
2021, pp. 111–120.
[41] Ernst Leierzopf et al. “Detection of Classical Cipher Types with Feature-Learning Approaches”. In:
Data Mining: 19th Australasian Conference on Data Mining, AusDM 2021, Brisbane, QLD,
Australia, December 14–15, 2021, Proceedings 19. Springer. 2021, pp. 152–164.
[42] Todd D Mateer. “Cryptanalysis of Beale cipher number two”. In: Cryptologia 37.3 (2013),
pp. 215–232.
[43] Robert AJ Matthews. “The use of genetic algorithms in cryptanalysis”. In: Cryptologia 17.2 (1993),
pp. 187–201.
[44] Raymond S Nickerson. “Confirmation bias: A ubiquitous phenomenon in many guises”. In: Review
of general psychology 2.2 (1998), pp. 175–220.
[45] Malte Nuhn and Kevin Knight. “Cipher type detection”. In: Proceedings of the 2014 Conference on
Empirical Methods in Natural Language Processing (EMNLP). 2014, pp. 1769–1773.
[46] Malte Nuhn, Julian Schamper, and Hermann Ney. “Beam search for solving substitution ciphers”.
In: Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics
(Volume 1: Long Papers). 2013, pp. 1568–1576.
[47] David Oranchak. “Evolutionary algorithm for decryption of monoalphabetic homophonic
substitution ciphers encoded as constraint satisfaction problems”. In: Proceedings of the 10th annual
conference on Genetic and evolutionary computation. 2008, pp. 1717–1718.
[48] Havard Raddum and Marek Sys. “The zodiac killer ciphers”. In: Tatra Mountains Mathematical
Publications 45.1 (2010), pp. 75–91.
[49] Sujith Ravi and Kevin Knight. “Bayesian inference for Zodiac and other homophonic ciphers”. In:
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human
Language Technologies. 2011, pp. 239–247.
[50] Sefik Ilkin Serengil and Murat Akin. “Attacking Turkish texts encrypted by homophonic cipher”.
In: Proceedings of the 10th WSEAS International Conference on Electronics, Hardware. 2011.
[51] Claude E Shannon. “Communication theory of secrecy systems”. In: The Bell system technical
journal 28.4 (1949), pp. 656–715.

53
[52] Jun Song et al. “Cryptanalysis of transposition cipher using simulated annealing genetic algorithm”.
In: Advances in Computation and Intelligence: Third International Symposium, ISICA 2008
Wuhan, China, December 19–21, 2008 Proceedings 3. Springer. 2008, pp. 795–802.
[53] Richard Spillman et al. “Use of a genetic algorithm in the cryptanalysis of simple substitution
ciphers”. In: Cryptologia 17.1 (1993), pp. 31–44.
[54] Rohit Vobbilisetty et al. “Classic cryptanalysis using hidden Markov models”. In: Cryptologia 41.1
(2017), pp. 1–28.
[55] Jeffrey Yi. “Cryptanalysis of Homophonic Substitution-Transposition Cipher”. Master’s Thesis. San
José State University, 2014.
[56] Guannan Zhong. “Cryptanalysis of Homophonic Substitution Cipher Using Hidden Markov
Models”. Master’s Thesis. San José State University, 2016.

News/Periodicals
[57] In: American Cryptogram Association: The Cryptogram (Jan.–Feb. 1970), pp. 2, 24.
[58] In: American Cryptogram Association: The Cryptogram (Mar.–Apr. 1970), p. 26.
[59] In: American Cryptogram Association: The Cryptogram (Mar.–Apr. 1988), p. 7.
[60] In: American Cryptogram Association: The Cryptogram (Jan.–Feb. 1989), pp. 12–13.
[61] “‘Cipher Killer’s’ New Letter”. In: San Francisco Examiner (Aug. 4, 1969).
[62] “A ‘Murder Code’ Broken”. In: San Francisco Chronicle (Aug. 9, 1969).
[63] San Francisco ABC7 News. Woman claims father was Zodiac killer. Accessed: March 27, 2024.
Apr. 29, 2009. url: https://abc7news.com/archive/6787931/.
[64] Paul Avery. “‘I’ve Killed Seven,’ The Zodiac Claims”. In: San Francisco Chronicle (Nov. 12, 1969).
[65] Paul Avery. “Zodiac ‘Legally Sane’”. In: San Francisco Chronicle (Nov. 13, 1969).
[66] Paul Avery. “Zodiac Says He Killed S.F. Officer”. In: San Francisco Chronicle (June 30, 1970).
[67] Paul Avery. “Zodiac Sends New Letter—Claims Ten”. In: San Francisco Chronicle (Apr. 22, 1970).
[68] Hubert J. Bernhard. “Zodiac Changes Code In New Cryptogram”. In: San Francisco Examiner
(Nov. 12, 1969).
[69] Don Branning. “‘Zodiac’ Boasts of 10 Killings”. In: San Francisco Examiner (Apr. 22, 1970).
[70] Macgregor Campbell. “Unbreakable: Who was the Zodiac killer?” In: New Scientist (May 18, 2011).
[71] L. Pierce Carson. “A Letter From Zodiac”. In: Napa Register (Nov. 12, 1969).
[72] Sacramento CBS13 News. Zodiac Killer’s Identity And Weapon Uncovered? (archived), Accessed:
March 27, 2024. Aug. 28, 2008. url: https://web.archive.org/web/20100117004253/http:
//cbs13.com/local/zodiac.killer.kaufman.2.805799.html.
[73] Arthur Cleveland. “Decoding a Killer—Gloversville man claims he’s solved Zodiac’s puzzle”. In:
The Leader Herald (Feb. 4, 2013).
[74] “Coded Clue in Murders”. In: San Francisco Chronicle (Aug. 2, 1969).

54
[75] Jane Eshleman Conant. “Zodiac Boasts He’ll Kill Again”. In: San Francisco Examiner (Nov. 12,
1969).
[76] “Cryptogram Expert Belittles Zodiac Code”. In: Vallejo Evening News Chronicle (Jan. 6, 1970).
[77] Paul Drexler. “Ultimate puzzle: The world of Zodiology”. In: San Francisco Examiner (Aug. 8,
2015).
[78] Bob Duncan. “Golden Cryptographer Decodes Messages Sent by Zodiac Killer”. In: Golden Daily
Transcript (Nov. 14, 1969).
[79] Kevin Fagan. “‘Zodiac ‘340 Cipher’ cracked by code experts 51 years after it was sent to the S.F.
Chronicle”. In: San Francisco Chronicle (Dec. 11, 2020).
[80] Maria Elena Fernandez. “She Thought She Found the Zodiac Killer. Then a True Crime Show
Proved Her Wrong”. In: Vulture (Mar. 13, 2020).
[81] Mahita Gajanan. “The Most Dangerous Animal of All Chronicles One Man’s Mission to Prove His
Father Was the Zodiac Killer”. In: Time (Mar. 6, 2020).
[82] Jeremy Gorner. “Reading the signs left by Zodiac—Police officer says he solved killer’s code”. In:
Calgary Herald (Apr. 24, 2011).
[83] Elon Green. “A Man Claims the Zodiac Killer Is His Father in a New Book That’s Been Kept
Secret for Months”. In: New York Magazine (May 12, 2014).
[84] Duston Harvey. “‘Zodiac’ Misses Appointment With Belli”. In: The San Bernardino Sun (Oct. 23,
1969).
[85] Alan Hope. “Flemish warehouse worker cracks 350-year-old code”. In: The Brussels Times (Jan. 22,
2021).
[86] Adrian Horton. “The Zodiac Killer has been a mystery for 50 years—but one man thinks he’s solved
it”. In: The Guardian (Mar. 6, 2020).
[87] Henry A. Keller. “Under The Lamp”. In: Detective Story Magazine 29.6 (Feb. 24, 1920).
[88] “Letter Claims Writer Killed Cabbie, 4 Others”. In: San Francisco Chronicle (Oct. 15, 1969).
[89] “Long Arm Of Uncle Sam—XII—The Double Code”. In: Fort Worth Star-Telegram (Oct. 19, 1919).
[90] Bethany A. Monk. “Will Zodiac Ever Be Solved?” In: Benicia Herald (Mar. 27, 2010).
[91] Andi Murphy. “Great Falls man decodes Zodiac Killer’s ciphered letters in search of his identity”.
In: Great Falls Tribune (Aug. 8, 2008).
[92] “Note Tells of Killings in Vallejo”. In: Vallejo News Chronicle (Aug. 1, 1969).
[93] Keith Power. “Lawmen Pool Their Zodiac Clues”. In: San Francisco Chronicle (Oct. 21, 1969).
[94] Bryan K Pruitt. “Zodiac task force using modern DNA tests”. In: Vallejo Times-Herald (Feb. 23,
2001).
[95] Tim Reiterman. “A second look / 4 years without Zodiac—the questions remain”. In: San Francisco
Examiner (Jan. 30, 1978).
[96] “Salinas Teacher Breaks Code On Vallejo Murders”. In: San Francisco Sunday Examiner and
Chronicle (Aug. 10, 1969).
[97] Brandon Schillemat. “Proposed Zodiac 340 Solution Comes Under Fire From Critics”. In:
Tewksbury Patch (July 30, 2011).

55
[98] Brandon Schillemat. “Tewksbury Native: I’ve Cracked The Code Of The Zodiac Killer”. In:
Tewksbury Patch (July 20, 2011).
[99] Dave Smith. “He’s Killed Seven, Zodiac Now Says”. In: Los Angeles Times (Nov. 12, 1969).
[100] Dave Smith. “Zodiac’s Trail—a Confusing Crime Pattern”. In: L.A. Times (May 8, 1970).
[101] Corey Starliper. “Viral Tewksbury Native Who Offered Solution To Zodiac 340 To Release First
Novella To Public At No Charge”. In: Your Tewksbury Today (Nov. 9, 2017).
[102] “UNT Team Takes on the Zodiac Killer”. In: University of North Texas Computer Science and
Engineering Student Newsletter (Sept. 2007). url:
https://www.smohanty.org/News_Articles/2007/2007-09-19_Student-Newsletter.pdf.
[103] “Vallejo Mass Murder Threat Fails”. In: San Francisco Examiner (Aug. 3, 1969).
[104] Charles Edmond Walk. “Stories From The Notebook Of An Old Detective—The Complex Cipher”.
In: The Salt Lake Tribune (Jan. 30, 1916).
[105] Ared White. “Secret Agent B-7”. In: Adventure 89.3 (Sept. 1, 1934).
[106] “Zodiac TV Caller Fails To Keep Secret Meeting In SF”. In: Vallejo News Chronicle (Oct. 22, 1969).

Videos
[107] Craig Bauer. 2018-06-18-Craig-Bauer-Zodiac-HistoCrypt. Accessed: March 27, 2024. June 19, 2018.
url: https://www.youtube.com/watch?v=2WFLrQTrOt0.
[108] MysteryQuest—San Francisco Slaughter. Accessed: March 27, 2024. Sept. 30, 2009. url:
https://www.zodiackiller.com/MQSFS.html.
[109] David Oranchak. Let’s Crack Zodiac—Episode 1—Graysmith. Accessed: March 27, 2024. Apr. 12,
2020. url: https://www.youtube.com/watch?v=N_Oh4snhF70.
[110] David Oranchak. Let’s Crack Zodiac—Episode 12—Zodiac and Batman. Accessed: March 27, 2024.
Jan. 20, 2022. url: https://www.youtube.com/watch?v=-_ubR5upVKE.
[111] David Oranchak. Let’s Crack Zodiac—Episode 13—Deep Learning. Accessed: March 27, 2024.
Mar. 1, 2022. url: https://www.youtube.com/watch?v=Se9ZlaBSr90.
[112] David Oranchak. Let’s Crack Zodiac—Episode 2—Bigrams. Accessed: March 27, 2024. Oct. 22,
2021. url: https://www.youtube.com/watch?v=WN3wT9atYHw.
[113] David Oranchak. Let’s Crack Zodiac—Episode 5—The 340 Is Solved! Accessed: March 27, 2024.
Dec. 11, 2020. url: https://www.youtube.com/watch?v=-1oQLPRE21o.
[114] David Oranchak. Let’s Crack Zodiac—Episode 6—How was the 340 made? Accessed: March 27,
2024. Jan. 29, 2021. url: https://www.youtube.com/watch?v=UfrFSrI05hk.
[115] David Oranchak. The Unsolved Zodiac 340 Cipher: Features or Phantoms? Accessed: March 27,
2024. Oct. 29, 2017. url: https://www.youtube.com/watch?v=rew8uLqCS2w.
[116] David Oranchak. The Zodiac Ciphers—What do we know, and when do we stop trying to solve
them? Accessed: March 27, 2024. Nov. 1, 2015. url:
https://www.youtube.com/watch?v=BV5R3TBMWJg.
[117] David Oranchak. What is Zodiac’s 340-Character Cipher? 2018 ACA Presentation. Accessed:
March 27, 2024. Sept. 28, 2018. url: https://www.youtube.com/watch?v=3Hk__Hk5c9M.

56
Software
[118] George Belden. Project Zenith. Accessed: March 27, 2024. 2019. url:
https://github.com/beldenge/Zenith.
[119] Jonathan Block. Zodiac 340 Solver. Accessed: March 27, 2024. 2020. url:
https://www.jonathanblock.com/zodiac/index.html.
[120] Michael Cole. Cipher Generator Released. Accessed: March 27, 2024. 2012. url:
http://zodiacrevisited.com/cipher-generator-released/.
[121] Heiko Kalista. A Solver for Mac Users. Zodiac Discussion Forum, Accessed: March 27, 2024. 2018.
url: https://forum.zodiackillerciphers.com/community/zodiac-cipher-mailings-
discussion/a-solver-for-mac-users/.
[122] Heiko Kalista. New tool: Peek-a-boo. Zodiac Discussion Forum, Accessed: March 27, 2024. 2017.
url: https://forum.zodiackillerciphers.com/community/zodiac-cipher-mailings-
discussion/new-tool-peek-a-boo/.
[123] Heiko Kalista. Yet another cipher tool. Zodiac Discussion Forum, Accessed: March 27, 2024. 2017.
url: https://forum.zodiackillerciphers.com/community/zodiac-cipher-mailings-
discussion/yet-another-cipher-tool/.
[124] Nils Kopal. Zodiac-340-Transposition-Reverser. Accessed: March 27, 2024. 2020. url:
https://github.com/n1k0m0/Zodiac-340-Transposition-Reverser.
[125] David Oranchak. Cipher Explorer. Accessed: March 27, 2024. 2017. url:
http://zodiackillerciphers.com/cipher-explorer.
[126] David Oranchak. Word Search Gadget. Accessed: March 27, 2024. 2013. url:
http://zodiackillerciphers.com/word-search-gadget/.
[127] David Oranchak. Zodiac Cipher CryptoScope. Accessed: March 27, 2024. 2011. url:
http://zodiackillerciphers.com/webtoy/stats.html.
[128] David Oranchak. Zodiac Cipher Webtoy. Accessed: March 27, 2024. 2007. url:
http://zodiackillerciphers.com/webtoy/.
[129] Phil Philcrow. CryptoCrack. Accessed: March 27, 2024. 2011. url:
https://sites.google.com/site/cryptocrackprogram.
[130] Fritz Reichmann. Homophonic Solvers in C++ and Java. Zodiac Discussion Forum, Accessed:
March 27, 2024. 2020. url: https://forum.zodiackillerciphers.com/community/zodiac-
cipher-mailings-discussion/homophonic-solvers-in-c-and-java/.
[131] Brax Sisco. ZKDecrypto GitHub repository. https://github.com/glurk/zkdecrypto. Accessed:
March 27, 2024. 2009.
[132] Daniels Umanovskis. lgp-decrypto. Accessed: March 27, 2024. 2013. url:
https://github.com/umanovskis/lgp-decrypto.
[133] Daniels Umanovskis. zkdecrypto-lite. Accessed: March 27, 2024. 2012. url:
https://code.google.com/archive/p/zkdecrypto-lite/.
[134] Jarl Van Eycke and David Oranchak. AZdecrypt GitHub repository.
https://github.com/doranchak/azdecrypt. Accessed: March 27, 2024. 2023.

57
Forums
[135] Bentley and Smithy. Zodiac 340 Code. Zodiac Discussion Forum, Accessed: March 27, 2024. Apr. 5,
2010. url: https://forum.zodiackillerciphers.com/community/zodiac-cipher-mailings-
discussion/zodiac-340-code/.
[136] Michael Butterfield. Zodiac Killer Facts. Accessed: March 27, 2024. 2007–. url:
https://zodiackillerfacts.com/.
[137] Brax Cisco. The final 18 symbols are nothing but filler! Zodiac Killer Facts forum (archived),
Accessed: March 27, 2024. Oct. 7, 2009. url:
https://web.archive.org/web/20110204001157/http:
//www.zodiackillerfacts.com/forum/viewtopic.php?f=49&t=423.
[138] daikon. Things I noticed about Z340. zodiackillersite forum (archived), Accessed: March 27, 2024.
Aug. 5, 2015. url: https://web.archive.org/web/20201212120731/http:
//www.zodiackillersite.com/viewtopic.php?p=39003.
[139] Louie Helm. AZdecrypt 1.16. Zodiac Discussion Forum, Accessed: March 27, 2024. Oct. 8, 2019.
url: https://forum.zodiackillerciphers.com/community/postid/72954/.
[140] Humboldt Squid. Cipher, Code, and Secret Writing Books (pre 1970). Zodiac Discussion Forum,
Accessed: March 27, 2024. Sept. 10, 2015. url:
https://forum.zodiackillerciphers.com/community/zodiac-cipher-mailings-
discussion/cipher-code-and-secret-writing-books-pre-1970/.
[141] Jem. 340 + 408 = 17 columns x (20 + 24 = 44) rows. zodiackillersite forum (archived), Accessed:
March 27, 2024. Dec. 19, 2011. url: https://web.archive.org/web/20180907075345/https:
//www.zodiackillersite.com/viewtopic.php?f=81&t=296.
[142] Mike Morford. zodiackillersite. Archived at
https://web.archive.org/web/20210703055042/http://www.zodiackillersite.com/ and
https://forum.zodiackillerciphers.com/community/; Accessed: March 27, 2024. 2010–. url:
http://zodiackillersite.forummotion.com.
[143] Jarl Van Eycke. Schemes 340. zodiackillersite forum (archived), Accessed: March 27, 2024. July 28,
2015. url: https://web.archive.org/web/20201212083301/http:
//www.zodiackillersite.com/viewtopic.php?f=81&t=2158&start=20.
[144] Jarl Van Eycke. Z340: multiple transcription rectangles. Zodiac Discussion Forum, Accessed: March
27, 2024. May 17, 2020. url: https://forum.zodiackillerciphers.com/community/zodiac-
cipher-mailings-discussion/z340-multiple-transcription-rectangles/.
[145] Tom Voigt. Zodiac’s Code. Zodiac Discussion Forum, Accessed: March 27, 2024. Oct. 5, 2010. url:
https://www.tapatalk.com/groups/zodiackillerfr/viewtopic.php?p=2744.

Web
[146] American Cryptogram Association. History. Accessed: March 27, 2024. 2016. url:
https://www.cryptogram.org/about-the-aca/history/.
[147] Bill Briere. This is NOT the Zodiac speaking. Accessed: March 27, 2024. 2018. url:
https://www.linkedin.com/pulse/zodiac-speaking-bill-briere/.

58
[148] Michael Butterfield. BREAKING NEWS: The Zodiac’s ‘340 Cipher’ has been solved. Accessed:
March 27, 2024. 2020. url: https://zodiackillerfacts.com/news-and-updates/breaking-
news-the-zodiacs-340-cipher-has-been-solved/.
[149] Michael Butterfield. San Francisco Chronicle Dripping Pen Card & 340 Cipher—November 8
1969—Zodiac Killer Facts Image Gallery. Accessed: March 27, 2024. 2010. url:
https://www.zodiackillerfacts.com/gallery/thumbnails.php?album=8.
[150] David Oranchak—Internet Movie Database. Accessed: March 27, 2024. 2023. url:
https://www.imdb.com/name/nm9507958/.
[151] Napa County Sheriff’s Department. Lake Berryessa police report. Accessed: March 27, 2024. 1969.
url: https://www.zodiackiller.com/LBReport11.html.
[152] Tommaso Dorigo. Supernatural Coincidences And The Look-Elsewhere Effect. Accessed: March 27,
2024. Oct. 16, 2009. url: https://www.science20.com/quantum_diaries_survivor/
supernatural_coincidences_and_lookelsewhere_effect.
[153] Elonka Dunin. Elonka’s Kryptos Page. Accessed: March 27, 2024. 2003–. url:
https://elonka.com/kryptos/.
[154] Elonka Dunin and Klaus Schmeh. Codebreaking: A Practical Guide—Unsolved Cryptograms.
Accessed: March 27, 2024. 2024. url:
https://codebreaking-guide.com/links/unsolved-cryptograms.
[155] the History channel. The Hunt for the Zodiac Killer. Accessed: March 27, 2024. 2017. url:
https://www.history.com/shows/the-hunt-for-the-zodiac-killer.
[156] Federal Bureau of Investigation. FBI Records: The Vault. The Zodiac Killer. Page numbers: 55–58.
Accessed: March 27, 2024. url:
https://drive.google.com/file/d/1p8RWnkahNRCGE1G1hKEo-ifAqmQWC0aP/view?usp=sharing.
[157] Federal Bureau of Investigation. FBI Records: The Vault. The Zodiac Killer Part 02 of 06. Page
numbers: 29–30. Accessed: March 27, 2024. 2011. url: https://vault.fbi.gov/The%20Zodiac%
20Killer/The%20Zodiac%20Killer%20Part%2002%20of%2006/view.
[158] Federal Bureau of Investigation. FBI Records: The Vault. The Zodiac Killer Part 05 of 06. Page
numbers: 102–118. 2011. url: https://vault.fbi.gov/The%20Zodiac%20Killer/The%20Zodiac%
20Killer%20Part%2005%20of%2006/view.
[159] Federal Bureau of Investigation. FBI Records: The Vault. The Zodiac Killer Part 05 of 06. Page
numbers: 143–145. Accessed: March 27, 2024. 2011. url: https://vault.fbi.gov/The%20Zodiac%
20Killer/The%20Zodiac%20Killer%20Part%2005%20of%2006/view.
[160] OpenAI. Optimizing language models for dialogue, 2022. Accessed: March 27, 2024. 2022. url:
https://openai.com/blog/chatgpt.
[161] David Oranchak. Annotated solution to the 408 cipher. Accessed: March 27, 2024. 2012. url:
http://zodiackillerciphers.com/408/key.html.
[162] David Oranchak. Cipher Legitimacy. Accessed: March 27, 2024. 2012. url:
http://zodiackillerciphers.com/wiki/index.php?title=Cipher_Legitimacy.
[163] David Oranchak. Corey Starliper’s Zodiac hoax. Accessed: March 27, 2024. 2011. url:
http://www.oranchak.com/zodiac/corey/hoax.html.

59
[164] David Oranchak. Encyclopedia of Observations. Accessed: March 27, 2024. 2012–. url:
http://zodiackillerciphers.com/wiki/index.php?title=Encyclopedia_of_observations.
[165] David Oranchak. Exorcist letter markings. Accessed: March 27, 2024. 2023. url:
http://zodiackillerciphers.com/wiki/index.php?title=Exorcist_letter_markings.
[166] David Oranchak. Halloween card. Accessed: March 27, 2024. 2023. url:
http://zodiackillerciphers.com/wiki/index.php?title=Halloween_card.
[167] David Oranchak. Solution to the 340. Accessed: March 27, 2024. 2020–. url:
http://zodiackillerciphers.com/wiki/index.php?title=Solution_to_the_340.
[168] David Oranchak. Throw The Book At Him [Part 1]. Accessed: March 27, 2024. 2012. url:
http://www.zodiackillerciphers.com/?p=58.
[169] David Oranchak. Z13 Solutions. Accessed: March 27, 2024. 2023. url:
http://zodiackillerciphers.com/wiki/index.php?title=Z13_Solutions.
[170] David Oranchak, Sam Blake, and Jarl Van Eycke. Solution to Zodiac’s 340-Character Cipher.
American Cryptogram Association 2021 Convention keynote presentation. 2021.
[171] Nick Pelling. “The Hunt For The Zodiac Killer” Season Finale, and Craig Bauer’s Z340 Cipher
“Crack”. Accessed: March 27, 2024. 2017. url: https://ciphermysteries.com/2017/12/14/hunt-
zodiac-killer-season-finale-craig-bauers-z340-cipher-crack.
[172] Nick Pelling. Feynman Ciphers. Accessed: March 27, 2024. 2013. url:
https://ciphermysteries.com/other-ciphers/feynman-ciphers.
[173] Klaus Schmeh. Bigram 750 challenge solved, new world record set. Accessed: March 27, 2024. 2019.
url: https://scienceblogs.de/klausis-krypto-kolumne/2019/12/19/bigram-750-
challenge-solved-new-world-record-set/.
[174] Klaus Schmeh. Cold case newspaper ad solved after eight years. Accessed: March 27, 2024. 2022.
url: https://scienceblogs.de/klausis-krypto-kolumne/cold-case-newspaper-ad-solved-
after-eight-years/.
[175] Klaus Schmeh. Jarl Van Eycke solves 400 year old longitude message. Accessed: March 27, 2024.
2021. url: https://scienceblogs.de/klausis-krypto-kolumne/jarl-van-eycke-solves-400-
year-old-longitude-message/.
[176] Spartan Documentation. Accessed: March 27, 2024. 2023. url:
https://dashboard.hpc.unimelb.edu.au.
[177] The DECRYPT Project—Decryption of Secret Historical Manuscripts. Accessed: March 27, 2024.
2024. url: https://de-crypt.org/.
[178] John Toebes. Solving Cipher Secrets—By M. E. Ohaver. Accessed: March 27, 2024. 2017. url:
https://toebes.com/Flynns/Flynns.htm.
[179] S. Tomokiyo. Porta’s De Furtivis Literarum Notis (1563). Accessed: March 27, 2024. 2015. url:
http://cryptiana.web.fc2.com/code/porta.htm.
[180] Jarl Van Eycke. Solving the Zodiac Killer’s Cipher. HistoCrypt keynote presentation. 2021.
[181] Tom Voigt. April 20, 1970 “My name is...” Letter, Cipher. Accessed: March 27, 2024. 2001. url:
https://zodiackiller.com/MyNameIsLetter.html.

60
[182] Tom Voigt. April 20, 1970 Bomb Diagram. Accessed: March 27, 2024. 2001. url:
https://zodiackiller.com/Bomb2.html.
[183] Tom Voigt. April 28, 1970 Dragon Card. Accessed: March 27, 2024. 2004. url:
https://zodiackiller.com/DCHR.html.
[184] Tom Voigt. Jan. 29, 1974 Exorcist Letter. Accessed: March 27, 2024. 1999. url:
https://zodiackiller.com/ExorcistLetter.html.
[185] Tom Voigt. July 26, 1970 “Little List” Letter. Accessed: March 27, 2024. 2000. url:
https://zodiackiller.com/Mikado1.html.
[186] Tom Voigt. July 31, 1969 Times-Herald, Chronicle, and Examiner Ciphers. Accessed: March 27,
2024. 2001. url: https://zodiackiller.com/Letters.html.
[187] Tom Voigt. June 26, 1970 Button Letter, Cipher (Color). Accessed: March 27, 2024. 2004. url:
https://zodiackiller.com/PLHR.html.
[188] Tom Voigt. June 26, 1970 Button Letter, Cipher (Color). Accessed: March 27, 2024. 2007–. url:
https://zodiackiller.com/letters_index.html.
[189] Tom Voigt. March 13, 1971 Los Angeles Times Letter. Accessed: March 27, 2024. 2001. url:
https://zodiackiller.com/LATimesLetter.html.
[190] Tom Voigt. May 8, 1974 Citizen Card (Back). Accessed: March 27, 2024. 2007. url:
https://zodiackiller.com/CitizenCard1.html.
[191] Tom Voigt. Nov. 9, 1969 Bus-Bomb Letter 1 (Color). Accessed: March 27, 2024. 2004. url:
https://zodiackiller.com/BBL1HR.html.
[192] Tom Voigt. Oct. 27, 1970 Halloween Card. Accessed: March 27, 2024. 1999. url:
https://zodiackiller.com/HalloweenCard.html.
[193] Tom Voigt. Z340 Cipher: High-Res Version (Color). The Zodiac Killer Forum, Accessed: March 27,
2024. 2007. url: https://www.tapatalk.com/groups/zodiackillerfr/z340-cipher-high-res-
version-color-t938.html.
[194] Tom Voigt. Zodiac Killer Letters and Ciphers–Codes, Cryptography. Accessed: March 27, 2024.
1999–. url: https://zodiackiller.com/Letters.html.
[195] Tom Voigt. Zodiac Killer News. Accessed: March 27, 2024. 2006–2021. url:
https://www.zodiackiller.com/Newscenter.html.

61

You might also like