Useful Tips

How to create a secret code or cipher

Frozen Welcome Pai Anai Iptografiya Sai Ikihauvay! Regardless of whether you write notes to your friends in the classroom or try to comprehend cryptography (the science of codes and ciphers) for fun, this article can help you learn some basic principles and create your own way of encoding private messages. Read step 1 below to get started!

Some people use the words “code” and “cipher” to mean the same concepts, but those who are serious about this issue know that these are two completely different concepts. Secret code is a system in which every word or phrase in your message is replaced by another word, phrase or series of characters. A cipher is a system in which each letter of your message is replaced by a different letter or symbol.

Standard Codes

  1. 1 Create your own code book. Any complete code requires a code book. Think of words or phrases that replace the words or phrases you need, then bring them all together in a code book so you can share it with your super secret friends.
  2. 2 Create your message. Using a book of code, carefully and carefully write a message. Please note that connecting your code with a cipher will make your message even more secure!
  3. 3 Translate your message. When your friends receive the message, they will need to use their copy of the code book to translate the message. Make sure they know that you are using a dual protection method.

Code book

  1. 1 Select a book. When using a code book, you will create a code that indicates the place of the words in the book. If you want to increase the chances that any of the words you need will be in the code book, then use dictionaries or great travel guides. You need to have a large number of words used in the book and relate to different topics.
  2. 2 Translate the words of your message into numbers. Take the first word of your message and find it somewhere in the book. Then write down the page number, line number and word number. Write them together to replace the word you want. Do this operation for each word. You can also use this technique to encrypt phrases if your code book can provide you with the phrase you want.
    • So, for example, the word on page 105, the fifth line down, the twelfth in a row will become 105512, 1055.12 or something similar.
  3. 3 Send the message. Give the encrypted message to your friend. Tom will need to use the same book to translate the message back.

Police coding

  1. 1 Choose the most popular phrases. This type of code works best when you have a set of phrases that you use most often. It can be anything from a simple “He is cute!” To something more serious, for example, “I can’t meet right now.”
  2. 2 Prepare a code for each of the phrases. You can use an analogue of police coding and assign each phrase a number or several letters or use other phrases (as they do in hospitals). For example, you can say “1099” instead of “This line is being tapped” or you can say “I’m thinking about going fishing this weekend.” Using numbers is easier to write, but using phrases looks less suspicious.
  3. 3 Remember the code. This type of encoding works best if you can keep in mind all the phrases, although having a book of code for security will never hurt!

Date Based Encryption

  1. 1 Select a date. For example, it will be Steven Spielberg's birthday on December 16, 1946. Write this date using numbers and slashes (12/18/46), then remove the lines to get the six-digit number 121846, which you can use to send the encrypted message.
  2. 2 Assign a number to each letter. Imagine the message “I like the movies of Steven Spielberg.” Under the message you write your six-digit number again and again until the very end of the sentence: 121 84612184 612184 6121846 121846121.
  3. 3 Encrypt your message. Write the letters from left to right. Move each letter of the plain text by the number of units indicated below it. The letter “M” is shifted by one unit and becomes “H”, the letter “H” is shifted by two units and becomes “P”. Please note that the letter "I" is shifted by 2 units, for this you need to jump to the beginning of the alphabet, and it becomes "B". Your final message will be “Нёё хфегбущг йніфя чукгссё тсююексеб".
  4. 4 Translate your message. When someone wants to read your message, all he needs to know is what date you used for encoding. To transcode, use the reverse process: write a digital code, then return the letters in the opposite order.
    • Encoding with a date has the added benefit of having a date that can be absolutely any. You can also change the date at any time. This makes updating the cipher system much easier than using other methods. Be that as it may, it is better to avoid such famous dates as May 9, 1945.

Number Encryption

  1. 1 Choose a secret number with your friend. For example, the number 5.
  2. 2 Write your message (without spaces) with this number of letters in each line (do not worry if the last line is shorter). For example, the message “My cover is open” would look like this:
    • Mine
    • spawned
    • yeras
    • indoor
  3. 3 To create a cipher, take the letters from top to bottom and write them down. The message will be “Myikokererrypyatrtao”.
  4. 4 To decrypt your message, your friend should calculate the total number of letters, divide it by 5 and determine if there are incomplete lines. After that, he / she writes these letters in columns, so that there are 5 letters in each row and one incomplete line (if any), and reads the message.

Graphic cipher

  1. 1 Draw the signs “pound” and “+”. On a piece of paper, create the base of your cipher. It will look like # and + (rotate the plus sign so that it looks like a rhombus, not a square).
  2. 2 Place the letters in the cells. These shapes have cells between the lines. Fill these cells with two letters of the alphabet. Arrange the letters randomly and do not use the same letter twice.
    • Any recipient of the message will need to have the same copy of the base of the cipher with letters in order to read your message.
  3. 3 Write down your code. Take the first letter of your message. Find it at the base of the cipher. Look at the lines that are around her. Draw the same lines as the lines that form the cells at the base of the cipher. If the letter you are writing is the second in the cell, add a dot to the lines. Perform this operation for each letter of the message.

Caesar's permutation

  1. 1 Create your cipher alphabet. Caesar's cipher moves the alphabet and then replaces the letters with their new number in order. This makes the code more difficult to crack if you change the layout regularly. For example, a 3rd permutation cipher will mean that A becomes E, B becomes Yu, C becomes I, etc. If you want to write “Meet tomorrow at the station”, the message will look like “Yaapnvfavyoy eeyapne ke opekuyoyo”.
    • There are many options for changing the alphabetical order before creating the code. This makes the cipher more reliable.
  2. 2 Record your message. Having an assistant like a decoding circle can make it easier if you can prepare one that suits your code.
  3. 3 Translate the message. The person decrypting your code needs to know only a number in order to correctly restore the alphabet. Change it regularly, but make sure you can safely pass on to the recipient what will be the new shift number of the alphabet.

Confused language

  1. 1 Identify words that begin with vowels. If there are any, just add “ay” at the end of the word. For example, “ear” will become “ear”, “arch” will become “arch” and “insult” will become “insult”.
  2. 2 Identify words that begin with a consonant. If there are any, then transfer the first letter of the word to the end and add “ah.” If at the beginning of a word there are two (or more) consonants, rearrange them at the end and add “ay”.
    • For example, “corpse” will become “uptray,” “gram” will become “ammgray,” and “thought” will become “think.”
  3. 3 Speak in a confused language. A confused language works best if it is spoken quickly, but it will take some preparation time. Do not stop practicing!

Sound code

  1. 1 Create your own sound code. This code will work as well as Morse code. You will need to assign a rhythmic sound code to each letter or individual word. Choose the rhythms you can remember.
  2. 2 Teach your code to others. The code should always be in memory, so teach the code to everyone with whom you plan to use it.
  3. 3 Tap your message. Use your fingers, the end of a pencil, or other tool to convey your message. Try to be secretive. You do not need anyone to guess that you are communicating.

Gibberish language

  1. 1 Learn to speak the Garabar language. Garabar language is a language game like a confused language, but it sounds more complicated. A short explanation - you need to add a "-tag" (or any equivalent) before each vowel in the syllable. This is much trickier than it actually sounds! You will need practice to master this code perfectly.
  • Hide your code in a place that only the sender and receiver know about. For example, unscrew any pen and put your code inside it, assemble the pen back, find a place (for example, a pencil stand) and tell the recipient the place and type of pen.
  • Encrypt spaces as well to confuse the code even more. For example, you can use the letters (E, T, A, O, and H work best) instead of spaces. They are called dummies. S, b, b, and th will look too obvious dummies for experienced code crackers, so do not use them or other prominent characters.
  • You can create your own code by rearranging the letters in words in random order. “Dig yemn in the park” - “Wait for me in the park.”
  • Always send codes to agents on your part.
  • When using Turkish Irish, you don’t need to specifically use “eb” before the consonant. You can use "IE", "br", "from" or any other inconspicuous combination of letters.
  • When using positional encoding, feel free to add, delete, and even rearrange letters from one place to another to make decryption even more difficult. Make sure your partner understands what you are doing, or all of this will be pointless to her / him. You can split the text into parts so that there are three, four or five letters in each, and then swap them.
  • To rearrange Caesar, you can rearrange the letters to any number of places you want, forward or backward. Just make sure that the permutation rules are the same for each letter.
  • Always destroy decrypted messages.
  • If you use your own code, do not make it too complicated so that others can not figure it out. It may be too complicated to decrypt even for you!
  • Use morse code. This is one of the most famous codes, so your interlocutor will quickly understand what it is.

Warnings

  • If you write the code inaccurately, this will make the decoding process more difficult for your partner, provided that you do not use code variations or ciphers specially created to confuse the decoder (with the exception of your partner, of course).
  • Confused language is best used for short words. With long words, it is not so effective because extra letters are much more noticeable. The same thing when using it in speech.