4
Pigpen cipher 1 Pigpen cipher The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram. [1] The pigpen cipher (sometimes referred to as the masonic cipher, Freemason's cipher, or Rosicrucian cipher) [2] [1] is a geometric simple substitution cipher which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid. Security The use of symbols is no impediment to cryptanalysis, and this system is identical to that of other simple monoalphabetic substitution schemes. Due to the simplicity of the cipher, it is often included in children's books on ciphers and secret writing. [3] History The exact origin of the cipher is uncertain, [4] but records of this system have been found which go back to at least the 18th century. Variations of this cipher were used by both the Rosicrucian brotherhood [4] and the Freemasons, though the latter used it so often that the system is frequently called the Freemason's cipher. They began using it in the early 18th century to keep their records of history and rites private, and for correspondence between lodge leaders. [1] [5] [6] Tombstones of Freemasons can also be found, which use the system as part of the engravings. One of the earliest stones in Trinity Church Cemetery in New York City, which opened in 1697, contains a cipher of this type which deciphers to "Remember death". George Washington's army had documentation about the system, with a much more randomized form of the alphabet. And during the American Civil War, the system was used by Union prisoners in Confederate prisons. [4] Variants The core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged. One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of the alphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. Another variation of this last one is called the Newark Cipher, which instead of dots uses one to three short lines which may be projecting in any length or orientation. This gives the illusion of a larger number of different characters than actually exist. [7] Another system, used by the Rosicrucians, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third. [2] [4] When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented. [1] [4] More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns, [3] or a completely randomized set of letters.

CIFRADOS

Embed Size (px)

Citation preview

Page 1: CIFRADOS

Pigpen cipher 1

Pigpen cipher

The pigpen cipher uses graphical symbolsassigned according to a key similar to the above

diagram.[1]

The pigpen cipher (sometimes referred to as the masonic cipher,Freemason's cipher, or Rosicrucian cipher)[2] [1] is a geometricsimple substitution cipher which exchanges letters for symbols whichare fragments of a grid. The example key shows one way the letterscan be assigned to the grid.

Security

The use of symbols is no impediment to cryptanalysis, and this systemis identical to that of other simple monoalphabetic substitutionschemes. Due to the simplicity of the cipher, it is often included inchildren's books on ciphers and secret writing.[3]

History

The exact origin of the cipher is uncertain,[4] but records of this system have been found which go back to at least the18th century. Variations of this cipher were used by both the Rosicrucian brotherhood[4] and the Freemasons, thoughthe latter used it so often that the system is frequently called the Freemason's cipher. They began using it in the early18th century to keep their records of history and rites private, and for correspondence between lodge leaders.[1] [5] [6]

Tombstones of Freemasons can also be found, which use the system as part of the engravings. One of the earlieststones in Trinity Church Cemetery in New York City, which opened in 1697, contains a cipher of this type whichdeciphers to "Remember death". George Washington's army had documentation about the system, with a much morerandomized form of the alphabet. And during the American Civil War, the system was used by Union prisoners inConfederate prisons.[4]

VariantsThe core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged.One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonlyused system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of thealphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the secondeach have one dot, and letters from the third each have two dots. Another variation of this last one is called theNewark Cipher, which instead of dots uses one to three short lines which may be projecting in any length ororientation. This gives the illusion of a larger number of different characters than actually exist.[7]

Another system, used by the Rosicrucians, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". SoABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on thesecond, and STU VWX YZ on the third.[2] [4] When enciphered, the location of the dot in each symbol (left, center,or right), would indicate which letter in that pen was represented.[1] [4] More difficult systems use a non-standardform of the alphabet, such as writing it backwards in the grid, up and down in the columns,[3] or a completelyrandomized set of letters.

Page 2: CIFRADOS

Pigpen cipher 2

ExampleUsing the example key in the above image, the message "X marks the spot" is rendered in ciphertext as:

In popular culture

Variation of the Freemason cipher used in thecomputer game Assassin's Creed II

The Pigpen cipher has been used in several works of popular cultureincluding Dan Brown's 2009 novel The Lost Symbol, both in the bookitself, and also to provide a puzzle in the artwork of the U.S. version ofthe bookjacket. The Trap, a 2009 nominee for Lancashire Children'sBook of the Year, uses a variation of the Pigpen cipher.[8]

In the computer game Assassin's Creed II, the cipher is used in thehidden glyph puzzle number 10, titled "Apollo". Here the cipher is oneof many hidden messages tucked away in paintings and photos ofhistoric events or people. Though not essential to the play of the game,the encrypted messages, some of which also use Morse Code andbinary code, provide clues to the game's back-story.

Notes[1] Wrixon, pp. 182–183[2] Barker, p. 40[3] Gardner[4] Pratt, pp. 142–143[5] Kahn, 1967, p.~772[6] Newton, 1998, p. 113[7] Glossary of Cryptography[8] Wray, Sarah (2008). Trap. Faber & Faber. pp. 130–131. ISBN 9780571239214.

References• Barker, Wayne G., ed (1978). The History of Codes and Ciphers in the United States Prior to World War I.

Aegean Park Press. ISBN 0894120263.• Gardner, Martin (1972). Codes, ciphers and secret writing. ISBN 0-486-24763-9.• Kahn, David (1967). The Codebreakers. The Story of Secret Writing. Macmillan.• Kahn, David (1996). The Codebreakers. The Story of Secret Writing. Scribner. ISBN 0684831309.• Newton, David E. (1998). "Freemason's Cipher". Encyclopedia of Cryptology. ISBN 0-87436-772-7.• Pratt, Fletcher (1939). Secret and Urgent: The story of codes and ciphers. Aegean Park Press. ISBN 0894122614.• Shulman, David; Weintraub, Joseph (1961). A glossary of cryptography. Crypto Press. pp. 44.• Wrixon, Fred B. (1998). Codes, Ciphers, and other Cryptic & Clandestine Communication. Black Dog &

Leventhal Publishers, Inc.. ISBN 1579120407.

Page 3: CIFRADOS

Pigpen cipher 3

External links• The Elian Script (http:/ / www. ccelian. com/ ElianScriptFull. html) is a similar grid-based cipher, used as art.• Online Pigpen cipher tool (http:/ / www. civilwarsignals. org/ cipher/ pigpencipher. html) for enciphering small

messages.• Cipher Code True Type Font (http:/ / fontstruct. com/ fontstructions/ show/ 447940)• FF Text Converter (http:/ / ff-solutions. com/ text-converter/ #text-pigpenCipher) converts text in pigpen cipher

and more.

Page 4: CIFRADOS

Article Sources and Contributors 4

Article Sources and ContributorsPigpen cipher  Source: http://en.wikipedia.org/w/index.php?oldid=430652067  Contributors: Alansohn, Anomie, AnonMoos, Apathetic duck, Archtktn, Atratus, CCCElian, Cacimar, CalmerWaters, Causa sui, Chrislk02, Cimon Avaro, DavidCary, Davidgothberg, Deconstructhis, DerHexer, Donreed, Dubhe.sk, Elonka, FFraenz, Grye, Hmains, JakeTununda, Keilana, Lexicon,Lmblackjack21, Lokicarbis, MSJapan, Matt Crypto, Mhageman, Mrklingon, Mugishaernestisaac, Neophytesage, Peter Ellis, Ptcamn, R'n'B, SarekOfVulcan, Sortior, Stijn Calle, Synergy,ThaddeusSholto, Ultimatedevr, Waltbucher, WegianWarrior, Zef, 57 ,مالسإلا ردب anonymous edits

Image Sources, Licenses and ContributorsImage:Pigpen cipher key.svg  Source: http://en.wikipedia.org/w/index.php?title=File:Pigpen_cipher_key.svg  License: Public Domain  Contributors: AnomieImage:A-pigpen-message.png  Source: http://en.wikipedia.org/w/index.php?title=File:A-pigpen-message.png  License: Public Domain  Contributors: Original uploader was Matt Crypto aten.wikipediaImage:Ac2 cipher key.png  Source: http://en.wikipedia.org/w/index.php?title=File:Ac2_cipher_key.png  License: Public Domain  Contributors: Skier Dude, TJRC, Ultimatedevr

LicenseCreative Commons Attribution-Share Alike 3.0 Unportedhttp:/ / creativecommons. org/ licenses/ by-sa/ 3. 0/