Documente Academic
Documente Profesional
Documente Cultură
Brad Pfranger
Math 280-07
Masonic Cipher
monoalphabetic substitution cipher. This form of encryption is a cipher and not a code,
even though it uses symbols instead of letters or numbers, because as Singh explains in
The Code Book, “technically, a code is defined as substitution at the levels of words or
phrases, whereas a cipher is defined as substitution at the level of letters (Singh, pg. 30).”
Fred Wrixon, author of Codes, Ciphers, Secrets, and Cryptic Communication, expands on
the definition offered by Singh by also stating it is a Geometric cipher. Wrixon explains
that this type of cipher family, including the Zig Zag cipher and the Rosicrucian cipher
came into existence during the seventeenth century, and utilizes geometric shapes to
encipher a plain text. Those shapes can be seen written across the top of the gravestone
below.
Pfranger 2
(Source: http://www.flickr.com/photos/evissa/614217307/)
The Masonic cipher gets its name from the Freemasons, who invented this cipher
and used it during the seventeen hundreds. The reason for the Masons creating this secret
writing was “to protect their business from public scrutiny (Wrixon, pg. 183).” The other
name for the cipher, Pigpen, apparently comes from the look of the ciphertext itself, as
people thought it resembled the shape of pigpens. Below is another sample of Masonic
(Source:
http://upload.wikimedia.org/wikipedia/en/thumb/e/ee/Thomas_Brierley_memorial.jpg/30
0px-Thomas_Brierley_memorial.jpg:
According to Wrixon, the cipher was extremely effective during the time when the
construct of the cipher was unknown. Cryptoanalysts did not know if they were looking
at a code or cipher, though the enciphering process was tremendously simple. Because of
the simplicity of the cipher and importance of the information involved, “as a result of
security breaches, most U.S. Masonic grand lodges no longer created written ciphers,
To encipher a plain text using the Masonic cipher, a cryptographer must first start
(Source: http://commons.wikimedia.org/wiki/File:Pigpen.png)
Next, the cryptographer would fill each of the twenty six spaces located in the geographic
(Source: http://commons.wikimedia.org/wiki/File:Pigpen.png)
Pfranger 5
The cryptographer has now constructed the cipher key. It is important that the recipient
have the same key as there are many possible variations. Actually, there are
After establishing the cipher key, the cryptographer can then encipher his or her
plain text. The plain text for this example will be:
To begin, the cryptographer will encipher the first letter of the text, ‘O.’ They will go to
the cipher key, find the location of ‘O’ and replace the letter in the sentence with the
Next, they would find the letter ‘N’ in the cipher key and do the same as was done with
The cryptographer would continue finding the letters in the cipher key and replacing the
letters in the text with the corresponding symbols. Punctuation and spacing would also
Now the cryptographer has completed enciphering the message which is ready to send.
Pfranger 6
The receiver would do the reverse to find the intended message. What would a
cryptoanalyst do to break this cipher having received it without the cipher key? Simon
Singh says the best way to find the meaning since it is merely a monoalphabetic cipher, is
Though the Pigpen cipher has been abandoned by the Freemasons, it is still a
subject of interest to amateurs. It can be found, not only in history books, but also as a
fun activity in children’s books, like Chris Sasaki’s Detective Notebook: Secret Agent
Codes. There are also many websites dedicated to the Masonic cipher, even one by
author Simon Singh, which not only explains the history, but also allows the browser to
The Masonic cipher is moving into its fourth century of use, and though it is not
regarded as an elite way of writing in secret, it can still generate plenty of fun for anyone
Works Cited
Singh, Simon. “The Pigpen Cipher.” The Black Chamber. July 2009.
<http://www.simonsingh.net/The_Black_Chamber/pigpenWithMenu.html>
Sasiki, Chris. “Detective Notebook: Secret Agent Codes.” Barnes and Noble, Inc. July
2009.
<http://search.barnesandnoble.com/Detective-Notebook/Chris-
Sasaki/e/9781402713996>
Singh, Simon. The Code Book. New York: Anchor Books, 1999
Wrixon, Fred B. Codes, Ciphers, Secrets and Cryptic Communication. New York: Black
Dog & Leventhal Paperbacks, 2005.