Other popular pigpen cipher structures include the letter X, where one alphabetic letter sits in each axis' right angle corner. So for example, H would be Π, V would be > and so on. We connect brands with parents. Pigpen Cipher. Make the Right Choice for Your Needs. For example, if the letter "A" is in the top left hand corner of the crosshatch, it will be represented by the. The cipher has an interesting history: although its true origins are unknown, it has been used by many groups. This week, we’ll explore something a little more fun; using the Pigpen Cipher which uses alien-like symbols to share messages with people in the know. wikiHow's. R    The pigpen cipher is a specific type of written code that uses a variety of symbols made from spatial constructs to represent letters of an alphabet, rather than replacing one alphabetic letter with another, versus traditional ciphers. The pigpen cipher (alternately referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid 1. A    Now have a go at writing some secret code! [1][14] More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns,[4] or a completely randomized set of letters. And during the American Civil War, the system was used by Union prisoners in Confederate prisons. Freemasonry: symbols, secrets, significance. M    V    Pigpen cipher decoder. The example key shows one way the letters can be assigned to the grid. Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia. The use of symbols instead of letters is no impediment to cryptanalysis, and this system is identical to that of other simple monoalphabetic substitution schemes. This gives the illusion of a larger number of different characters than actually exist.[18]. Tech's On-Going Obsession With Virtual Reality. So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third. One of the easiest ciphers to start with is the secret code called the Pig Pen Code or Pigpen Cipher. This article has been viewed 87,719 times. C    Parrangan, Dwijayanto G., and Theofilus Parrangan. Also, try remembering the code and mixing it up with another code to make it even more sophisticated. One of the earliest stones in Trinity Church Cemetery in New York City, which opened in 1697, contains a cipher of this type which deciphers to "Remember death" (cf. First you write out the whole alphabet in two grids, as shown: Each letter is represented by the part of the "pigpen" that surrounds it. The Templar cipher is a method claimed to have been used by the Knights Templar. This can be hard, but it makes it much more difficult for other people to solve and use the code. How This Museum Keeps the Oldest Functioning Computer Running, 5 Easy Steps to Clean Your Virtual Desktop, Women in AI: Reinforcing Sexism and Stereotypes with Tech, From Space Missions to Pandemic Monitoring: Remote Healthcare Advances, The 6 Most Amazing AI Advances in Agriculture, Who Owns the Data in a Blockchain Application - and Why It Matters, Viable Uses for Nanotechnology: The Future Has Arrived, Business Intelligence: How BI Can Improve Your Company's Processes. Draw two grids of 3×3 = 9 squares and two sets of diagonals crossed over. 5 Common Myths About Virtual Reality, Busted! [2][14] When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented. A pigpen cipher is a simple and common type of substitution code. George Washington's army had documentation about the system, with a much more randomized form of the alphabet. While those who have never encountered it may find it baffling, be aware that some might recognize this type of code instantly. The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher)[2][3] is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. Please consider making a contribution to wikiHow today. International Journal of Signal Processing, Image Processing and Pattern Recognition 6.5 (2013): 305-314. The Pigpen Cipher. The pigpen cipher (alternately referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. Once you have written your code into a new list, destroy the original key with the grids. Perhaps you have a secret message or just want a fun way to send messages to your friends. The Pigpen code (also sometimes called the Freemason's or Rosicrician cipher) is quite easy to catch on to. Did you decipher our secret message?! Pigpen Cipher. Privacy Policy In fact, they used it so much, that it is … Don’t leave your key out in the open. In a grid where A and B are in the top left hand corner. K    S    Be sure that only your friends know the code, and that you can trust them. Each symbol from the crosshatch grid should be shaped like a closed, two-sided or three-sided rectangle. It uses a variant of a Maltese Cross.[19]. Scroll down to the end to find the answer! The Pigpen cipher is a really old code that is really fun to write. Or another is grid, grid, grid, with each cell having a letter of the alphabet and the last one having an “&” character. The individual that holds these keys has the ability to understand which letters represent corresponding symbols, as these symbols are drawn representations of individual key structure pieces. L    E    So here’s how to write a secret message using Pig Pen: Don’t miss our best content straight to your inbox! J    The pigpen cipher is a specific type of written code that uses a variety of symbols made from spatial constructs to represent letters of an alphabet, rather than replacing one alphabetic letter with another, versus traditional ciphers. This article was co-authored by our trained team of editors and researchers who validated it for accuracy and comprehensiveness. Please help us continue to provide you with our trusted how-to guides and videos for free by whitelisting wikiHow on your ad blocker. You can fill them with numbers, punctuation (!, ?, &) or leave them blank. Don't write the letter "E" too many times otherwise it will make it easier for the unauthorized eyes to guess what it is. In the first 9 box grid you put the letters A to I. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. In this variation letters from the first grid have no dot, the second each have one dot and the third grid have two dots. Tell us in the comments below! The example key shows one way the letters can be assigned to the grid. "Codes and ciphers." Another system, used by the Rosicrucians, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". Are These Autonomous Vehicles Ready for Our World? How can passwords be stored securely in a database? Your master code sheet should look like this. It was also used by the confederate soldiers during the Civil War. You put a dot in the four corners of the grid spaces. One of the easiest ciphers to start with is the secret code called the Pig Pen Code or Pigpen Cipher. This font family looks strange to a normal English person but it’s not that much complex as it looks like.. Your support helps wikiHow to create more in-depth illustrated articles and videos and to share our trusted brand of instructional content with millions of people all over the world. Agrippa, Cornelius. [12] This system, called "The Kabbalah of the Nine Chambers" by later authors, used the Hebrew alphabet rather than the Latin alphabet, and was used for religious symbolism rather than for any apparent cryptological purpose.[13]. Straight From the Programming Experts: What Functional Programming Language Is Best to Learn Now? Q    In this version, you will have extra spaces. - Renew or change your cookie consent, Masonic Cipher, Freemason Cipher, Rosicrucian Cipher, Optimizing Legacy Enterprise Software Modernization, How Remote Work Impacts DevOps and Development Trends, Machine Learning and the Cloud: A Complementary Partnership, Virtual Training: Paving Advanced Education's Future, MDM Services: How Your Small Business Can Thrive Without an IT Team. In the second 9 box grid you put the letters J to R, and in the inner corner or middle of the inner line of each box you put a dot. [1] G    Decrypted Secrets: Methods and Maxims of Cryptology (2007): 43. How Blockchain Could Change the Recruiting Game, C Programming Language: Its Important History and Why It Refuses to Go Away, INFOGRAPHIC: The History of Programming Languages, 5 SQL Backup Issues Database Admins Need to Be Aware Of, 3 Defenses Against Cyberattack That No Longer Work, Cybersecurity: The Big, Profitable Field Techies Are Overlooking, Slow Dancing With Technology: Debugging, the Programmer and the Machine. 6 Cybersecurity Advancements Happening in the Second Half of 2020, 6 Examples of Big Data Fighting the Pandemic, The Data Science Debate Between R and Python, Online Learning: 5 Helpful Big Data Courses, Behavioral Economics: How Apple Dominates In The Big Data Age, Top 5 Online Data Science Courses from the Biggest Names in Tech, Privacy Issues in the New Big Data Economy, Considering a VPN? Want to connect with parents? The exact origin of the cipher is unknown. P    Due to the simplicity of the cipher, it is often included in children's books on ciphers and secret writing. {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/b\/ba\/Write-in-Pigpen-Code-Step-1-Version-4.jpg\/v4-460px-Write-in-Pigpen-Code-Step-1-Version-4.jpg","bigUrl":"\/images\/thumb\/b\/ba\/Write-in-Pigpen-Code-Step-1-Version-4.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-1-Version-4.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/2\/26\/Write-in-Pigpen-Code-Step-2-Version-4.jpg\/v4-460px-Write-in-Pigpen-Code-Step-2-Version-4.jpg","bigUrl":"\/images\/thumb\/2\/26\/Write-in-Pigpen-Code-Step-2-Version-4.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-2-Version-4.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/f\/f2\/Write-in-Pigpen-Code-Step-3-Version-4.jpg\/v4-460px-Write-in-Pigpen-Code-Step-3-Version-4.jpg","bigUrl":"\/images\/thumb\/f\/f2\/Write-in-Pigpen-Code-Step-3-Version-4.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-3-Version-4.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/e\/e4\/Write-in-Pigpen-Code-Step-4-Version-2.jpg\/v4-460px-Write-in-Pigpen-Code-Step-4-Version-2.jpg","bigUrl":"\/images\/thumb\/e\/e4\/Write-in-Pigpen-Code-Step-4-Version-2.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-4-Version-2.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/e\/e1\/Write-in-Pigpen-Code-Step-5.jpg\/v4-460px-Write-in-Pigpen-Code-Step-5.jpg","bigUrl":"\/images\/thumb\/e\/e1\/Write-in-Pigpen-Code-Step-5.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-5.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/9\/95\/Write-in-Pigpen-Code-Step-6.jpg\/v4-460px-Write-in-Pigpen-Code-Step-6.jpg","bigUrl":"\/images\/thumb\/9\/95\/Write-in-Pigpen-Code-Step-6.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-6.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/f\/f3\/Write-in-Pigpen-Code-Step-7.jpg\/v4-460px-Write-in-Pigpen-Code-Step-7.jpg","bigUrl":"\/images\/thumb\/f\/f3\/Write-in-Pigpen-Code-Step-7.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-7.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/f\/f9\/Write-in-Pigpen-Code-Step-8.jpg\/v4-460px-Write-in-Pigpen-Code-Step-8.jpg","bigUrl":"\/images\/thumb\/f\/f9\/Write-in-Pigpen-Code-Step-8.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-8.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/d\/d2\/Write-in-Pigpen-Code-Step-9.jpg\/v4-460px-Write-in-Pigpen-Code-Step-9.jpg","bigUrl":"\/images\/thumb\/d\/d2\/Write-in-Pigpen-Code-Step-9.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-9.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/4\/44\/Write-in-Pigpen-Code-Step-10.jpg\/v4-460px-Write-in-Pigpen-Code-Step-10.jpg","bigUrl":"\/images\/thumb\/4\/44\/Write-in-Pigpen-Code-Step-10.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-10.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/7\/74\/Write-in-Pigpen-Code-Step-11.jpg\/v4-460px-Write-in-Pigpen-Code-Step-11.jpg","bigUrl":"\/images\/thumb\/7\/74\/Write-in-Pigpen-Code-Step-11.jpg\/aid91440-v4-728px-Write-in-Pigpen-Code-Step-11.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"