Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Pigpen cipher

From Wikipedia, the free encyclopedia
Type of substitution cipher
The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram.[1]

Thepigpen cipher (alternatively referred to as themasonic cipher,Freemason's cipher,Rosicrucian cipher,Napoleon cipher, andtic-tac-toe cipher)[2][3] is a geometricsimple substitutioncipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

Insecurity

[edit]

The Pigpen cipher offers littlecryptographic security. It differentiates itself from other simplemonoalphabetic substitution ciphers solely by its use of symbols rather than letters, the use of which fails to assist in curbingcryptanalysis. Additionally, the prominence and recognizability of the Pigpen leads to it being arguably worthless from a security standpoint. Knowledge of Pigpen is so ubiquitous that an interceptor might not need to actuallybreak this cipher at all, but merelydecipher it, in the same way that the intended recipient would.

Due to Pigpen's simplicity, it is very often included in children's books on ciphers and secret writing.[4]

History

[edit]

The cipher is believed to be an ancient cipher[5][6] and is said to have originated with theHebrewrabbis.[7][8] Thompson writes that, “there is evidence that suggests that theKnights Templar utilized a pig-pen cipher” during theChristian Crusades.[9][10]

Parrangan & Parrangan write that it was used by an individual, who may have been a Mason, “in the 16th century to save his personal notes.”[11]

In 1531Cornelius Agrippa described an early form of the Rosicrucian cipher, which he attributes to an existing JewishKabbalistic tradition.[12] This system, called "The Kabbalah of the Nine Chambers" by later authors, used theHebrew alphabet rather than theLatin alphabet, and was used for religious symbolism rather than for any apparent cryptological purpose.[13]

On the 7th July 1730, a French Pirate namedOlivier Levasseur threw out a scrap of paper written in the pigpen cipher, allegedly containing the whereabouts of his treasure which was never found but is speculated to be located in the Seychelles. The exact configuration of the cipher has also not been determined, an example of using different letters in different sections to further complicate the cipher from its standard configuration.

Variations of this cipher were used by both theRosicrucian brotherhood[14] and theFreemasons, though the latter used the pigpen cipher so often that the system is frequently called the Freemason's cipher. Hysin claims it was invented by Freemasons.[15] They began using it in the early 18th century to keep their records of history and rites private, and for correspondence between lodge leaders.[3][16][17] Tombstones of Freemasons can also be found which use the system as part of the engravings. One of the earliest stones inTrinity Church Cemetery inNew York City, which opened in 1697, contains a cipher of this type which deciphers to "Remember death" (cf. "memento mori").

In 1852,Major Logue, an Irish western Australian pastoralist, used the pigpen cipher in his diary to discreetly admit his involvement in the shooting and killing of at least 19Yamatji people, anAboriginal Australian tribe. Logue wrote that some cattle went missing in 16 March 1852, so he "SHOT THREE OF THEM FOR IT". In 24 March he wrote that the “natives at Mr Burgess’ had been stealing sheep AND THAT THE WHITE FELLOWS HAD SHOT SEVERAL OF THEM FOR IT.” On 4 April he was among a group of armed men who set out to find “natives who had taken the cattle”. By his own account he was part of groups who shot and killed at least 19 Yamatji people around what is now calledEllendale,Walkaway and theGreenough River.[18]

George Washington's army had documentation about the system, with a much more randomized form of the alphabet. During theAmerican Civil War, the system was used byUnion prisoners inConfederate prisons.[14]

Example

[edit]

Using the Pigpen cipher key shown in the example below, the message "X marks the spot" is rendered in ciphertext as

An example pigpen message

Variants

[edit]

The core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged. One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of the alphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. Another variation of this last one is called the Newark Cipher, which instead of dots uses one to three short lines which may be projecting in any length or orientation. This gives the illusion of a larger number of different characters than actually exist.[19]

Another system, used by theRosicrucians in the 17th century, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third.[2][14] When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented.[1][14] More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns,[4] or a completely randomized set of letters.

The Templar cipher is a method claimed to have been used by theKnights Templar and uses a variant of aMaltese Cross.[20] This is likely a cipher used by the Neo-Templars (Freemasons) of the 18th century, and not that of the religious order of the Knights Templar from the 12th-14th centuries during theCrusades.[21] Some websites showing the Knights Templar cipher deviate from the original order of letters. Based on the Freemasons Document,[22] the 1st, 3rd, 4th and 5th crosses assign the letters in clock-wise order starting at the top, the 2nd cross assigns the letters in a left, right, top, bottom order while the final cross assigns the letters in a bottom, top, right left order.

Knights Templar Alphabet based on Grand Lodge of British Columbia and Yukon Freemasons description

Notes

[edit]
  1. ^abWrixon, pp. 182–183
  2. ^abBarker, p. 40
  3. ^abWrixon, p. 27
  4. ^abGardner
  5. ^Bauer, Friedrich L. "Encryption Steps: Simple Substitution." Decrypted Secrets: Methods and Maxims of Cryptology (2007): 43.
  6. ^Newby, Peter. "Maggie Had A Little Pigpen." Word Ways 24.2 (1991): 13.
  7. ^Blavatsky, Helena Petrovna. The Theosophical Glossary. Theosophical Publishing Society, 1892, p. 230
  8. ^Mathers, SL MacGregor. The Kabbalah Unveiled. Routledge, 2017, p. 10
  9. ^Thompson, Dave. "Elliptic Curve Cryptography." (2016)
  10. ^MacNulty, W. K. (2006). Freemasonry: symbols, secrets, significance. London: Thames & Hudson, p. 269
  11. ^Parrangan, Dwijayanto G., and Theofilus Parrangan. "New Simple Algorithm for Detecting the Meaning of Pigpen Chiper Boy Scout (“Pramuka”)." International Journal of Signal Processing, Image Processing and Pattern Recognition 6.5 (2013): 305–314.
  12. ^Agrippa, Henry Cornelius. "Three Books of Occult Philosophy, or of." JF (London, Gregory Moule, 1650) (1997): 14–15.
  13. ^Agrippa, Cornelius. "Three Books of Occult Philosophy",http://www.esotericarchives.com/agrippa/agripp3c.htm#chap30
  14. ^abcdPratt, pp. 142–143
  15. ^Hynson, Colin. "Codes and ciphers." 5 to 7 Educator 2006.14 (2006): v–vi.
  16. ^Kahn, 1967, p.~772
  17. ^Newton, 1998, p. 113
  18. ^Allam, Lorena; Collard, Sarah; Archibald-Binge, Ella; Evershed, Nick; Ball, Andy (4 August 2025)."The killing code: strange symbols in a WA settler's diaries lay bare frontier atrocities".The Guardian Australia. Archived fromthe original on 3 August 2025.
  19. ^Glossary of Cryptography
  20. ^McKeown, Trevor W."Purported Templars cipher".freemasonry.bcy.ca. Retrieved2016-11-07.
  21. ^Guénon, René (2004).Studies in Freemasonry and the Compagnonnage. Translated by Fohr, Henry D.; Bethell, Cecil; Allen, Michael. Sophia Perennis. p. 237.ISBN 978-0900588518.
  22. ^McKeown, Trevor W."Purported Templars cipher".freemasonry.bcy.ca. Retrieved2016-11-07.

References

[edit]

External links

[edit]
Wikimedia Commons has media related toPigpen cipher.
Ciphers
by family
Polyalphabetic
Polybius square
Square
Substitution
Transposition
Other
Codes
Steganography
Cryptanalysis
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Pigpen_cipher&oldid=1321086024"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp