
The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher)
[Barker, p. 40][Wrixon, p. 27] is a geometric
simple substitution cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.
Insecurity
The Pigpen cipher offers little
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
security. It differentiates itself from other simple
monoalphabetic substitution ciphers solely by its use of symbols rather than letters, the use of which fails to assist in curbing
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
. Additionally, the prominence and recognizability of the Pigpen leads to it being arguably worthless from a security standpoint. Knowledge of Pigpen is so ubiquitous that an interceptor might not need to actually ''break'' this cipher at all, but merely ''decipher'' it, in the same way that the intended recipient would.
Due to Pigpen's simplicity, it is very often included in children's books on ciphers and secret writing.
[Gardner]
History
The cipher is believed to be an ancient cipher and is said to have originated with the
Hebrew
Hebrew (; ''ʿÎbrit'') is a Northwest Semitic languages, Northwest Semitic language within the Afroasiatic languages, Afroasiatic language family. A regional dialect of the Canaanite languages, it was natively spoken by the Israelites and ...
rabbi
A rabbi (; ) is a spiritual leader or religious teacher in Judaism. One becomes a rabbi by being ordained by another rabbi—known as ''semikha''—following a course of study of Jewish history and texts such as the Talmud. The basic form of t ...
s. Thompson writes that, “there is evidence that suggests that the
Knights Templar
The Poor Fellow-Soldiers of Christ and of the Temple of Solomon, mainly known as the Knights Templar, was a Military order (religious society), military order of the Catholic Church, Catholic faith, and one of the most important military ord ...
utilized a pig-pen cipher” during the
Christian Crusades.
Parrangan & Parrangan write that it was used by an individual, who may have been a Mason, “in the 16th century to save his personal notes.”
In 1531
Cornelius Agrippa described an early form of the Rosicrucian cipher, which he attributes to an existing Jewish
Kabbalistic
Kabbalah or Qabalah ( ; , ; ) is an esoteric method, discipline and school of thought in Jewish mysticism. It forms the foundation of mystical religious interpretations within Judaism. A traditional Kabbalist is called a Mekubbal ().
Jewi ...
tradition. This system, called "The Kabbalah of the Nine Chambers" by later authors, used the
Hebrew alphabet
The Hebrew alphabet (, ), known variously by scholars as the Ktav Ashuri, Jewish script, square script and block script, is a unicase, unicameral abjad script used in the writing of the Hebrew language and other Jewish languages, most notably ...
rather than the
Latin alphabet
The Latin alphabet, also known as the Roman alphabet, is the collection of letters originally used by the Ancient Rome, ancient Romans to write the Latin language. Largely unaltered except several letters splitting—i.e. from , and from � ...
, and was used for religious symbolism rather than for any apparent cryptological purpose.
On the 7th July 1730, a French Pirate named
Olivier Levasseur
__NOTOC__
Olivier Levasseur (1688, 1689, or 1690 – 7 July 1730), was a French pirate, nicknamed ''La Buse'' ("The Buzzard") or ''La Bouche'' ("The Mouth") or () in his early days for the speed and ruthlessness with which he always attacked ...
threw out a scrap of paper written in the pigpen cipher, allegedly containing the whereabouts of his treasure which was never found but is speculated to be located in Seychelles. The exact configuration of the cipher has also not been determined, an example of using different letters in different sections to further complicate the cipher from its standard configuration.
Variations of this cipher were used by both the
Rosicrucian
Rosicrucianism () is a spirituality, spiritual and cultural movement that arose in early modern Europe in the early 17th century after the publication of several texts announcing to the world a new Western esotericism, esoteric order. Rosicruc ...
brotherhood
[Pratt, pp. 142–143] and the
Freemasons
Freemasonry (sometimes spelled Free-Masonry) consists of fraternal groups that trace their origins to the medieval guilds of stonemasons. Freemasonry is the oldest secular fraternity in the world and among the oldest still-existing organizati ...
, though the latter used the pigpen cipher so often that the system is frequently called the Freemason's cipher. Hysin claims it was invented by Freemasons. They began using it in the early 18th century to keep their records of history and rites private, and for correspondence between lodge leaders.
[ Tombstones of Freemasons can also be found which use the system as part of the engravings. One of the earliest stones in ]Trinity Church Cemetery
The parish of Trinity Church (Manhattan), Trinity Church has three separate cemetery, burial grounds associated with it in the New York City borough of Manhattan. The first, Trinity Churchyard, is located in Lower Manhattan at 74 Trinity Place, n ...
in New York City
New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
, which opened in 1697, contains a cipher of this type which deciphers to "Remember death" (cf. "").
George Washington
George Washington (, 1799) was a Founding Fathers of the United States, Founding Father and the first president of the United States, serving from 1789 to 1797. As commander of the Continental Army, Washington led Patriot (American Revoluti ...
's army had documentation about the system, with a much more randomized form of the alphabet. During the American Civil War
The American Civil War (April 12, 1861May 26, 1865; also known by Names of the American Civil War, other names) was a civil war in the United States between the Union (American Civil War), Union ("the North") and the Confederate States of A ...
, the system was used by Union prisoners in Confederate prisons.[
]
Example
Using the Pigpen cipher key shown in the example below, the message "X marks the spot
" is rendered in ciphertext as
Variants
The core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged. One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of the alphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. Another variation of this last one is called the Newark Cipher, which instead of dots uses one to three short lines which may be projecting in any length or orientation. This gives the illusion of a larger number of different characters than actually exist.
Another system, used by the Rosicrucians
Rosicrucianism () is a spirituality, spiritual and cultural movement that arose in early modern Europe in the early 17th century after the publication of several texts announcing to the world a new Western esotericism, esoteric order. Rosicruc ...
in the 17th century, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third.[ When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented.][ More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns,] or a completely randomized set of letters.
The Templar cipher is a method claimed to have been used by the Knights Templar
The Poor Fellow-Soldiers of Christ and of the Temple of Solomon, mainly known as the Knights Templar, was a Military order (religious society), military order of the Catholic Church, Catholic faith, and one of the most important military ord ...
and uses a variant of a Maltese Cross
The Maltese cross is a cross symbol, consisting of four " V" or arrowhead shaped concave quadrilaterals converging at a central vertex at right angles, two tips pointing outward symmetrically.
It is a heraldic cross variant which develope ...
. This is likely a cipher used by the Neo-Templars (Freemasons
Freemasonry (sometimes spelled Free-Masonry) consists of fraternal groups that trace their origins to the medieval guilds of stonemasons. Freemasonry is the oldest secular fraternity in the world and among the oldest still-existing organizati ...
) of the 18th century, and not that of the religious order of the Knights Templar from the 12th-14th centuries during the Crusades
The Crusades were a series of religious wars initiated, supported, and at times directed by the Papacy during the Middle Ages. The most prominent of these were the campaigns to the Holy Land aimed at reclaiming Jerusalem and its surrounding t ...
. Some websites showing the Knights Templar cipher deviate from the original order of letters. Based on the Freemasons Document, the 1st, 3rd, 4th and 5th crosses assign the letters in clock-wise order starting at the top, the 2nd cross assigns the letters in a left, right, top, bottom order while the final cross assigns the letters in a bottom, top, right left order.
Club Penguin Code
The Club Penguin Code,[Despite being called a code in official materials, the Club Penguin Code is actually a cipher.] also known as the Tic-Tac-Toe code, the PSA cipher, and the EPF cipher, is a cipher created by online composer and artist Chris Hendricks (known online as Screenhog) for the online game Club Penguin. Designed for use by the in-universe group Elite Penguin Force, (EPF, formerly known as Penguin Secret Agency, or PSA) the cipher leans more heavily into the style of Tic-Tac-Toe. It is represented with three grids, which each represent nine letters of the alphabet arranged left to right, top to bottom; one blank, for letters A-I, one with the letter X in each space, for letters J-R, and one with the letter O in each space, for letters S-Z, plus an additional character. This last character is used as a signature for the in-universe leader of the EPF, known as the Director.
The need for a unique code came from Hendricks wishing to distance Club Penguin related materials from anything regarding Freemason or New World Order conspiracy theories. He said in a video uploaded to his YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
channel:I just didn't want Club Penguin being associated in videos like "''So, Club Penguin, right? 'Fun and safe virtual world for kids?' I guess they forgot to put mind control in their advertisements! I have hard-hitting exclusive proof that Club Penguin is using the exact same code that the Illuminati use!''" ..Now, I grant you, the odds of a video like that actually gaining any traction is pretty slim, but would you take that chance? I didn't. I instead looked at the code and said "This looks a lot like Tic-Tac-Toe! What if we just copied it three times, kept the first one blank, the second one with X's, and the third one with O's? That's twenty-seven spaces. It'll cover the whole alphabet and give us something unique that's not conspiracy theory friendly." So that's what we did, and that was that.
Notes
References
*
*
*
*
*
*
*
*
External links
Online Pigpen cipher tool
for enciphering small messages.
Online Pigpen cipher tool
for deciphering small messages.
Cipher Code True Type Font
Deciphering An Ominous Cryptogram on a Manhattan Tomb
presents a Pigpen cipher variant
Elian script-often considered a variant of Pigpen.
{{DEFAULTSORT:Pigpen Cipher
Classical ciphers
Masonic symbolism