HOME

TheInfoList



OR:

The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher)Barker, p. 40Wrixon, p. 27 is a geometric simple substitution
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.


Insecurity

The Pigpen cipher offers little
cryptographic Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
security. It differentiates itself from other simple monoalphabetic substitution ciphers solely by its use of symbols rather than letters, the use of which fails to assist in curbing
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
. Additionally, the prominence and recognizability of the Pigpen leads to it being arguably worthless from a security standpoint. Knowledge of Pigpen is so ubiquitous that an interceptor might not need to actually ''break'' this cipher at all, but merely ''decipher'' it, in the same way that the intended recipient would. Due to Pigpen's simplicity, it is very often included in children's books on ciphers and secret writing.Gardner


History

The cipher is believed to be an ancient cipher and is said to have originated with the
Hebrew Hebrew (; ''ʿÎbrit'') is a Northwest Semitic languages, Northwest Semitic language within the Afroasiatic languages, Afroasiatic language family. A regional dialect of the Canaanite languages, it was natively spoken by the Israelites and ...
rabbi A rabbi (; ) is a spiritual leader or religious teacher in Judaism. One becomes a rabbi by being ordained by another rabbi—known as ''semikha''—following a course of study of Jewish history and texts such as the Talmud. The basic form of t ...
s. Thompson writes that, “there is evidence that suggests that the
Knights Templar The Poor Fellow-Soldiers of Christ and of the Temple of Solomon, mainly known as the Knights Templar, was a Military order (religious society), military order of the Catholic Church, Catholic faith, and one of the most important military ord ...
utilized a pig-pen cipher” during the Christian Crusades. Parrangan & Parrangan write that it was used by an individual, who may have been a Mason, “in the 16th century to save his personal notes.” In 1531 Cornelius Agrippa described an early form of the Rosicrucian cipher, which he attributes to an existing Jewish
Kabbalistic Kabbalah or Qabalah ( ; , ; ) is an esoteric method, discipline and school of thought in Jewish mysticism. It forms the foundation of mystical religious interpretations within Judaism. A traditional Kabbalist is called a Mekubbal (). Jewi ...
tradition. This system, called "The Kabbalah of the Nine Chambers" by later authors, used the
Hebrew alphabet The Hebrew alphabet (, ), known variously by scholars as the Ktav Ashuri, Jewish script, square script and block script, is a unicase, unicameral abjad script used in the writing of the Hebrew language and other Jewish languages, most notably ...
rather than the
Latin alphabet The Latin alphabet, also known as the Roman alphabet, is the collection of letters originally used by the Ancient Rome, ancient Romans to write the Latin language. Largely unaltered except several letters splitting—i.e. from , and from � ...
, and was used for religious symbolism rather than for any apparent cryptological purpose. On the 7th July 1730, a French Pirate named
Olivier Levasseur __NOTOC__ Olivier Levasseur (1688, 1689, or 1690 – 7 July 1730), was a French pirate, nicknamed ''La Buse'' ("The Buzzard") or ''La Bouche'' ("The Mouth") or () in his early days for the speed and ruthlessness with which he always attacked ...
threw out a scrap of paper written in the pigpen cipher, allegedly containing the whereabouts of his treasure which was never found but is speculated to be located in Seychelles. The exact configuration of the cipher has also not been determined, an example of using different letters in different sections to further complicate the cipher from its standard configuration. Variations of this cipher were used by both the
Rosicrucian Rosicrucianism () is a spirituality, spiritual and cultural movement that arose in early modern Europe in the early 17th century after the publication of several texts announcing to the world a new Western esotericism, esoteric order. Rosicruc ...
brotherhoodPratt, pp. 142–143 and the
Freemasons Freemasonry (sometimes spelled Free-Masonry) consists of fraternal groups that trace their origins to the medieval guilds of stonemasons. Freemasonry is the oldest secular fraternity in the world and among the oldest still-existing organizati ...
, though the latter used the pigpen cipher so often that the system is frequently called the Freemason's cipher. Hysin claims it was invented by Freemasons. They began using it in the early 18th century to keep their records of history and rites private, and for correspondence between lodge leaders. Tombstones of Freemasons can also be found which use the system as part of the engravings. One of the earliest stones in
Trinity Church Cemetery The parish of Trinity Church (Manhattan), Trinity Church has three separate cemetery, burial grounds associated with it in the New York City borough of Manhattan. The first, Trinity Churchyard, is located in Lower Manhattan at 74 Trinity Place, n ...
in
New York City New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
, which opened in 1697, contains a cipher of this type which deciphers to "Remember death" (cf. "
memento mori (Latin for "remember (that you have) to die")
").
George Washington George Washington (, 1799) was a Founding Fathers of the United States, Founding Father and the first president of the United States, serving from 1789 to 1797. As commander of the Continental Army, Washington led Patriot (American Revoluti ...
's army had documentation about the system, with a much more randomized form of the alphabet. During the
American Civil War The American Civil War (April 12, 1861May 26, 1865; also known by Names of the American Civil War, other names) was a civil war in the United States between the Union (American Civil War), Union ("the North") and the Confederate States of A ...
, the system was used by Union prisoners in Confederate prisons.


Example

Using the Pigpen cipher key shown in the example below, the message "X marks the spot " is rendered in ciphertext as


Variants

The core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged. One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of the alphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. Another variation of this last one is called the Newark Cipher, which instead of dots uses one to three short lines which may be projecting in any length or orientation. This gives the illusion of a larger number of different characters than actually exist. Another system, used by the
Rosicrucians Rosicrucianism () is a spirituality, spiritual and cultural movement that arose in early modern Europe in the early 17th century after the publication of several texts announcing to the world a new Western esotericism, esoteric order. Rosicruc ...
in the 17th century, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third. When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented. More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns, or a completely randomized set of letters. The Templar cipher is a method claimed to have been used by the
Knights Templar The Poor Fellow-Soldiers of Christ and of the Temple of Solomon, mainly known as the Knights Templar, was a Military order (religious society), military order of the Catholic Church, Catholic faith, and one of the most important military ord ...
and uses a variant of a
Maltese Cross The Maltese cross is a cross symbol, consisting of four " V" or arrowhead shaped concave quadrilaterals converging at a central vertex at right angles, two tips pointing outward symmetrically. It is a heraldic cross variant which develope ...
. This is likely a cipher used by the Neo-Templars (
Freemasons Freemasonry (sometimes spelled Free-Masonry) consists of fraternal groups that trace their origins to the medieval guilds of stonemasons. Freemasonry is the oldest secular fraternity in the world and among the oldest still-existing organizati ...
) of the 18th century, and not that of the religious order of the Knights Templar from the 12th-14th centuries during the
Crusades The Crusades were a series of religious wars initiated, supported, and at times directed by the Papacy during the Middle Ages. The most prominent of these were the campaigns to the Holy Land aimed at reclaiming Jerusalem and its surrounding t ...
. Some websites showing the Knights Templar cipher deviate from the original order of letters. Based on the Freemasons Document, the 1st, 3rd, 4th and 5th crosses assign the letters in clock-wise order starting at the top, the 2nd cross assigns the letters in a left, right, top, bottom order while the final cross assigns the letters in a bottom, top, right left order.


Club Penguin Code

The Club Penguin Code,Despite being called a code in official materials, the Club Penguin Code is actually a cipher. also known as the Tic-Tac-Toe code, the PSA cipher, and the EPF cipher, is a cipher created by online composer and artist Chris Hendricks (known online as Screenhog) for the online game Club Penguin. Designed for use by the in-universe group Elite Penguin Force, (EPF, formerly known as Penguin Secret Agency, or PSA) the cipher leans more heavily into the style of Tic-Tac-Toe. It is represented with three grids, which each represent nine letters of the alphabet arranged left to right, top to bottom; one blank, for letters A-I, one with the letter X in each space, for letters J-R, and one with the letter O in each space, for letters S-Z, plus an additional character. This last character is used as a signature for the in-universe leader of the EPF, known as the Director. The need for a unique code came from Hendricks wishing to distance Club Penguin related materials from anything regarding Freemason or New World Order conspiracy theories. He said in a video uploaded to his
YouTube YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
channel:
I just didn't want Club Penguin being associated in videos like "''So, Club Penguin, right? 'Fun and safe virtual world for kids?' I guess they forgot to put mind control in their advertisements! I have hard-hitting exclusive proof that Club Penguin is using the exact same code that the Illuminati use!''" ..Now, I grant you, the odds of a video like that actually gaining any traction is pretty slim, but would you take that chance? I didn't. I instead looked at the code and said "This looks a lot like Tic-Tac-Toe! What if we just copied it three times, kept the first one blank, the second one with X's, and the third one with O's? That's twenty-seven spaces. It'll cover the whole alphabet and give us something unique that's not conspiracy theory friendly." So that's what we did, and that was that.


Notes


References

* * * * * * * *


External links


Online Pigpen cipher tool
for enciphering small messages.
Online Pigpen cipher tool
for deciphering small messages.
Cipher Code True Type Font

Deciphering An Ominous Cryptogram on a Manhattan Tomb
presents a Pigpen cipher variant
Elian script-often considered a variant of Pigpen.
{{DEFAULTSORT:Pigpen Cipher Classical ciphers Masonic symbolism