Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Pigpen cipher
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Type of substitution cipher}} {{anchor|}} [[File:Pigpen cipher key.svg|thumb|The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram.<ref name=wrixon-182>Wrixon, pp. 182–183</ref>]] The '''pigpen cipher''' (alternatively referred to as the '''masonic cipher''', '''Freemason's cipher''', '''Rosicrucian cipher''', '''Napoleon cipher''', and '''tic-tac-toe cipher''')<ref name=barker>Barker, p. 40</ref><ref name=wrixon-27>Wrixon, p. 27</ref> is a geometric [[simple substitution]] [[cipher]], which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid. ==Insecurity== The Pigpen cipher offers little [[cryptographic]] security. It differentiates itself from other simple [[monoalphabetic substitution]] ciphers solely by its use of symbols rather than letters, the use of which fails to assist in curbing [[cryptanalysis]]. Additionally, the prominence and recognizability of the Pigpen leads to it being arguably worthless from a security standpoint. Knowledge of Pigpen is so ubiquitous that an interceptor might not need to actually ''break'' this cipher at all, but merely ''decipher'' it, in the same way that the intended recipient would. Due to Pigpen's simplicity, it is very often included in children's books on ciphers and secret writing.<ref name="Gardner">Gardner</ref> ==History== The cipher is believed to be an ancient cipher<ref>Bauer, Friedrich L. "Encryption Steps: Simple Substitution." Decrypted Secrets: Methods and Maxims of Cryptology (2007): 43.</ref><ref>Newby, Peter. "Maggie Had A Little Pigpen." Word Ways 24.2 (1991): 13.</ref> and is said to have originated with the [[Hebrew language|Hebrew]] [[rabbi]]s.<ref>Blavatsky, Helena Petrovna. The Theosophical Glossary. Theosophical Publishing Society, 1892, p. 230</ref><ref>Mathers, SL MacGregor. The Kabbalah Unveiled. Routledge, 2017, p. 10</ref> Thompson writes that, “there is evidence that suggests that the [[Knights Templar]] utilized a pig-pen cipher” during the [[Crusades|Christian Crusades]].<ref>Thompson, Dave. "Elliptic Curve Cryptography." (2016)</ref><ref>MacNulty, W. K. (2006). Freemasonry: symbols, secrets, significance. London: Thames & Hudson, p. 269</ref> Parrangan & Parrangan write that it was used by an individual, who may have been a Mason, “in the 16th century to save his personal notes.”<ref>Parrangan, Dwijayanto G., and Theofilus Parrangan. "New Simple Algorithm for Detecting the Meaning of Pigpen Chiper Boy Scout (“Pramuka”)." International Journal of Signal Processing, Image Processing and Pattern Recognition 6.5 (2013): 305–314.</ref> In 1531 [[Cornelius Agrippa]] described an early form of the Rosicrucian cipher, which he attributes to an existing Jewish [[Kabbalah|Kabbalistic]] tradition.<ref>Agrippa, Henry Cornelius. "Three Books of Occult Philosophy, or of." JF (London, Gregory Moule, 1650) (1997): 14–15.</ref> This system, called "The Kabbalah of the Nine Chambers" by later authors, used the [[Hebrew Alphabet|Hebrew alphabet]] rather than the [[Latin alphabet]], and was used for religious symbolism rather than for any apparent cryptological purpose.<ref>Agrippa, Cornelius. "Three Books of Occult Philosophy", http://www.esotericarchives.com/agrippa/agripp3c.htm#chap30</ref> On the 7th July 1730, a French Pirate named [[Olivier Levasseur]] threw out a scrap of paper written in the pigpen cipher, allegedly containing the whereabouts of his treasure which was never found but is speculated to be located in Seychelles. The exact configuration of the cipher has also not been determined, an example of using different letters in different sections to further complicate the cipher from its standard configuration. Variations of this cipher were used by both the [[Ancient Mystical Order Rosae Crucis|Rosicrucian]] brotherhood<ref name=pratt>Pratt, pp. 142–143</ref> and the [[Freemasonry|Freemasons]], though the latter used the pigpen cipher so often that the system is frequently called the Freemason's cipher. Hysin claims it was invented by Freemasons.<ref>Hynson, Colin. "Codes and ciphers." 5 to 7 Educator 2006.14 (2006): v–vi.</ref> They began using it in the early 18th century to keep their records of history and rites private, and for correspondence between lodge leaders.<ref name=wrixon-27/><ref>Kahn, 1967, p.~772</ref><ref>Newton, 1998, p. 113</ref> Tombstones of Freemasons can also be found which use the system as part of the engravings. One of the earliest stones in [[Trinity Church Cemetery]] in [[New York City]], which opened in 1697, contains a cipher of this type which deciphers to "Remember death" (cf. "[[memento mori]]"). [[George Washington]]'s army had documentation about the system, with a much more randomized form of the alphabet. During the [[American Civil War]], the system was used by [[Union (American Civil War)|Union]] prisoners in [[Confederate States of America|Confederate]] prisons.<ref name=pratt/> ==Example== Using the Pigpen cipher key shown in the example below, the message "<code>X marks the spot </code>" is rendered in ciphertext as <div align="center">[[File:A-pigpen-message.svg|320px|An example pigpen message]]</div> ==Variants== The core elements of this system are the grid and dots. Some systems use the X's, but even these can be rearranged. One commonly used method orders the symbols as shown in the above image: grid, grid, X, X. Another commonly used system orders the symbols as grid, X, grid, X. Another is grid, grid, grid, with each cell having a letter of the alphabet, and the last one having an "&" character. Letters from the first grid have no dot, letters from the second each have one dot, and letters from the third each have two dots. Another variation of this last one is called the Newark Cipher, which instead of dots uses one to three short lines which may be projecting in any length or orientation. This gives the illusion of a larger number of different characters than actually exist.<ref>''Glossary of Cryptography''</ref> Another system, used by the [[Rosicrucians]] in the 17th century, used a single grid of nine cells, and 1 to 3 dots in each cell or "pen". So ABC would be in the top left pen, followed by DEF and GHI on the first line, then groups of JKL MNO PQR on the second, and STU VWX YZ on the third.<ref name=barker/><ref name=pratt/> When enciphered, the location of the dot in each symbol (left, center, or right), would indicate which letter in that pen was represented.<ref name=wrixon-182/><ref name=pratt/> More difficult systems use a non-standard form of the alphabet, such as writing it backwards in the grid, up and down in the columns,<ref name="Gardner"/> or a completely randomized set of letters. The Templar cipher is a method claimed to have been used by the [[Knights Templar]] and uses a variant of a [[Maltese Cross]].<ref>{{Cite web|url=http://freemasonry.bcy.ca/texts/templars_cipher.html|title=Purported Templars cipher|last=McKeown|first=Trevor W.|website=freemasonry.bcy.ca|access-date=2016-11-07}}</ref> This is likely a cipher used by the Neo-Templars ([[Freemasonry|Freemasons]]) of the 18th century, and not that of the religious order of the Knights Templar from the 12th-14th centuries during the [[Crusades]].<ref>{{cite book|author=Guénon, René|translator-last1=Fohr|translator-first1=Henry D.|translator-last2=Bethell|translator-first2=Cecil|translator-last3=Allen|translator-first3=Michael|authorlink=René Guénon|title=Studies in Freemasonry and the Compagnonnage|publisher=Sophia Perennis|isbn=978-0900588518|year=2004|page=237}}</ref> Some websites showing the Knights Templar cipher deviate from the original order of letters. Based on the Freemasons Document,<ref>{{Cite web|url=http://freemasonry.bcy.ca/texts/templars_cipher.html|title=Purported Templars cipher|last=McKeown|first=Trevor W.|website=freemasonry.bcy.ca|access-date=2016-11-07}}</ref> the 1st, 3rd, 4th and 5th crosses assign the letters in clock-wise order starting at the top, the 2nd cross assigns the letters in a left, right, top, bottom order while the final cross assigns the letters in a bottom, top, right left order. [[File:Knights-templar-letters-horizontal.svg|732px|Knights Templar Alphabet based on Grand Lodge of British Columbia and Yukon Freemasons description]] === Club Penguin Code === The Club Penguin Code,<ref name=":0">Despite being called a code in official materials, the Club Penguin Code is actually a cipher.</ref> also known as the Tic-Tac-Toe code,<ref name=":0" /> the PSA cipher, and the EPF cipher, is a cipher created by online composer and artist Chris Hendricks (known online as Screenhog) for the online game [[Club Penguin]]. Designed for use by the in-universe group Elite Penguin Force, (EPF, formerly known as Penguin Secret Agency, or PSA) the cipher leans more heavily into the style of Tic-Tac-Toe. It is represented with three grids, which each represent nine letters of the alphabet arranged left to right, top to bottom; one blank, for letters A-I, one with the letter X in each space, for letters J-R, and one with the letter O in each space, for letters S-Z, plus an additional character. This last character is used as a signature for the in-universe leader of the EPF, known as the Director. [[File:ClubPenguinSecretCode.svg|frameless|732x732px]] The need for a unique code came from Hendricks wishing to distance Club Penguin related materials from anything regarding Freemason or [[New World Order conspiracy theory|New World Order]] conspiracy theories. He said in a video uploaded to his [[YouTube]] channel:<ref>{{Cite AV media |url=https://www.youtube.com/watch?si=dK4EuTO4yS5qLE5n&t=452&v=GhU-OgJLgGA&feature=youtu.be |title=Secrets of the Club Penguin PSA Code |date=2019-09-11 |last=Chris Hendricks |access-date=2024-12-04 |via=YouTube}}</ref><blockquote>I just didn't want Club Penguin being associated in videos like "''So, Club Penguin, right? 'Fun and safe virtual world for kids?' I guess they forgot to put mind control in their advertisements! I have hard-hitting exclusive proof that Club Penguin is using the exact same code that the Illuminati use!''" [...] Now, I grant you, the odds of a video like that actually gaining any traction is pretty slim, but would you take that chance? I didn't. I instead looked at the code and said "This looks a lot like Tic-Tac-Toe! What if we just copied it three times, kept the first one blank, the second one with X's, and the third one with O's? That's twenty-seven spaces. It'll cover the whole alphabet and give us something unique that's not conspiracy theory friendly." So that's what we did, and that was that.</blockquote> ==Notes== {{Reflist}} ==References== * {{cite book|title=The History of Codes and Ciphers in the United States(USA) Prior to World War I|editor=Barker, Wayne G.|year=1978|publisher=[[Aegean Park Press]]|isbn=0-89412-026-3}} * {{cite book|author=Gardner, Martin|author-link=Martin Gardner|title=Codes, ciphers and secret writing|year=1972|publisher=Courier Corporation |isbn=0-486-24761-9|url-access=registration|url=https://archive.org/details/codescipherssecr00gard_0}} * {{cite book|author=Kahn, David|author-link=David Kahn (writer)|title=The Codebreakers. The Story of Secret Writing|publisher=Macmillan|year=1967}} * {{cite book|author=Kahn, David|author-link=David Kahn (writer)|title=The Codebreakers. The Story of Secret Writing|publisher=[[Charles Scribner's Sons|Scribner]]|year=1996|isbn=0-684-83130-9}} * {{cite book|author=Newton, David E.|chapter=Freemason's Cipher|title=Encyclopedia of Cryptology|url=https://archive.org/details/encyclopediaofcr0000newt|url-access=registration|year=1998|publisher=Bloomsbury Academic |isbn=0-87436-772-7}} * {{cite book|author=Pratt, Fletcher|title=Secret and Urgent: The story of codes and ciphers|year=1939|isbn=0-89412-261-4|publisher=[[Aegean Park Press]]}} *{{cite book|title=A glossary of cryptography|author1=Shulman, David |author2=Weintraub, Joseph |year=1961|publisher=Crypto Press|pages=44}} * {{cite book|title=Codes, Ciphers, and other Cryptic & Clandestine Communication|author=Wrixon, Fred B.|isbn=1-57912-040-7|year=1998|publisher=Black Dog & Leventhal Publishers, Inc.}} ==External links== {{Commons category|Pigpen cipher}} * [http://www.civilwarsignals.org/cipher/pigpencipher.html Online Pigpen cipher tool] for enciphering small messages. * [https://planetcalc.com/7842/ Online Pigpen cipher tool] for deciphering small messages. * [http://fontstruct.com/fontstructions/show/447940 Cipher Code True Type Font] * [http://www.atlasobscura.com/articles/morbid-monday-the-tomb-of-james-leeson Deciphering An Ominous Cryptogram on a Manhattan Tomb] presents a Pigpen cipher variant * [http://www.ccelian.com Elian script-often considered a variant of Pigpen.] {{Cryptography navbox | classical}} {{DEFAULTSORT:Pigpen Cipher}} [[Category:Classical ciphers]] [[Category:Masonic symbolism]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Anchor
(
edit
)
Template:Cite AV media
(
edit
)
Template:Cite book
(
edit
)
Template:Cite web
(
edit
)
Template:Commons category
(
edit
)
Template:Cryptography navbox
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)