Free Essay

Freemasons Cipher

In:

Submitted By bcmranger
Words 1006
Pages 5
Brice Matthews
Dr. Linda Harned
Communication 1201-240
28 Aug 2015

Learning the Freemason's Cipher

Don't be threatened by the name, this is actually one of the most simple ways of writing a secret message, or cipher, that there is. Before we get into the specifics of the certain cipher I am going to be teaching you today, the first thing you need to know is the difference between the terms code and cryptography. Code is the broader term, which most of us are familiar with, simply meaning “a system of rules to convert information”. One of the earliest examples of code being the invention of language itself, because it allowed a form of communication to convert information. Today though, we are mostly going to be focused on cryptography. All cryptography is code but not all code is cryptography; codes can be a code of law, a code of conduct, or a dress code. It is simply a way of giving information in a way that is comprehensible. Cryptography is the use of ciphers and code to protect a message or secret. A cipher is a secret/disguised way of writing code. In order to effectively decode (a term we are all familiar with) a cipher, you need to possess the knowledge of the way it was originally ciphered. Ciphers can be kept solely in your mind and then spread through word of mouth, or written on a piece of paper or even implemented into mechanical device, which is then required to break the cipher, unless you can remember that information and store it. All ciphers can technically be deciphered without having any knowledge of the original cipher, although this requires a long process of recognizing patterns and also knowing the most common letters of the alphabet. The most common letters of the English alphabet are E, T, and A. This means that for any cipher using the English alphabet the 3 most common symbols will also be E, T, and A. The longer the message, the easier it is to crack, because more information and symbols are given to you to decode and find out the patterns. The shorter the cipher, the less symbols you are given, which means you can't find which ones are more frequent. The general idea works in all languages so it's vital to know if you are every trying to crack a cipher. The class of cipher we are going to be looking at today are mono-alphabetic substitution ciphers. This simply means each letter of the alphabet is replaced according to a visual key with another letter or symbol. The earliest wide spread use of this form of cryptography was the Caesar Shift Cipher, which Julius Caesar invented himself to conceal messages spread throughout the Roman Empire. A more recent but probably the most widely known form of this cipher is Morse code. Morse code is an Mono alphabetic Substitution because you are literally taking the letters of the alphabet and substituting them with symbols in the form of 36 different arrangements of dots and dashes, 26 of them being from the alphabet and the other 10 being the numbers 0-9.
[pic]
Today I am going to be teaching you a type of mono alphabetic substitution that goes by the name “the pigpen cipher”. It also goes by the name of the Freemason's cipher, due to the Freemasons use of it in the 18th century to make their records more private. Symbols from this cipher have also been found on many Freemason graves as secret messages for loved ones. They have been found engraved into the bricks of many old churches, such as Trinity Church in New York city. In the grave yard of the church there is a message written in Freemason's cipher that translates into “remember death”. During the civil war this code was used by some union prisons to communicate in secret through post or while in confederate prisons. Even though it sounds like a top secret form of communication it is actually amazingly easy to learn and is found today in many children books on secret codes and ciphers. There are many ways to arrange this cipher, and it has changed through the years many times, but what they all have in common is two shapes in which the whole alphabet fits inside of. The most common and widely used shapes are the tic-tac-toe shape (#), and an X shape, which are the shapes used by the Freemasons. Simply put, Instead of using letters to write your word, you are simply using the shapes the letters are inside of instead of the actual letter. It is important to note that the second letter in each separate slot will have a dot included with its character, the dot is vital for knowing whether the symbol represents the first or second number of that particular shape. Every single letter of the English language is represented by these two shapes so literally any word can be written, all numbers have to be written in word though. That's the simplest way to put it down in words, the best way to learn how to write this cipher is to see the cipher for yourself, because it is a physically visual cipher like we talked about before. I hope you have learned plenty about ciphers and the history behind them, enjoy writing secret messages to your friends and if you ever see a Freemason cipher out in public somewhere, you now know how to decode it. Here is a fully decoded Freemason's alphabet to help you see how the letters translate into the shapes of the tic-tac-toe grid and the X shown in the picture on the previous page.
[pic]

Works Cited

Sutherland, Denise, and Mark Koltko-Rivera. "Understanding the Freemason’s Cipher." - For Dummies. Cracking Codes & Cryptograms For Dummies Cheat Sheet, 5 Sept. 2012. Web. 28 Aug. 2015.

Unknown. "THE FREEMASON CIPHER."The Masonic Cipher. The Masonic Trowel, 22 Mar. 2004. Web. 28 Aug. 2015.

Similar Documents

Free Essay

Essay

...I used the exam question ‘edges’. The artist that I researched first was Emma Lundgren, I found her ‘future folkore’ work interesting. The materials that she used to make a piece were things like plastic Lego, cross stich and dalahorses. Her print inspired me to design styles for necklaces. I also researched an artist called Kathryn Del Barton, the unusual edges on her portrait work was really satisfying to study. Doing a painting inspired by one of her work then trying wire to show off the lines and edges used on the face and hands. Using wire with Kathryn’s work gave me inspiration in bending the wire to whatever shape and design I wanted to create. I figured out that wire would be a good link to my chosen necklace. Deciding to use organic shapes and materials, I decided to focus on shapes of bones. I used card to specify the basic shape. Then I decided to wrap around wire to give it a tighter shape. Then using the technique of ‘dry brushing’ I painted the section of bone that I wrapped wire around. Then focusing on the texture of bone, I decided to try put plaster on to add a bony texture to it. The plaster was successful, especially after dry brushing paint on to add colour, it made the piece look like bone. Dry brushing was something I hadn’t done before; this was something that my teacher recommended after hearing about my idea. I was exploring how to represent the bones in different ways, I first used only wire, then I used cardboard and wire, then I used cardboard wire...

Words: 375 - Pages: 2

Free Essay

Encryption

...ALGORITHMS OF ENCRYPTION This method will used two different type faces slightly differing in weight (boldness). it will broke up the ciphertext into 5 character groups, each of which would represent one character in his plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character). A=***** G=**BB* M=*BB** S=B**B* Y=BB*** B=****B H=**BBB N=*BB*B T=B**BB Z=BB**B C=***B* I=*B*** O=*BBB* U=B*B** D=***BB J=*B**B P=*BBBB V=B*B*B E=**B** K=*B*B* Q=B**** W=B*BB* F=**B*B L=*B*BB R=B***B X=B*BBB For example, our some secret message as above : To be or not to be that is the question. Whether ‘tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? To decipher, we just break the characters into groups of 5 and use the key above to find the plaintext message. M E E T M E B E tobeo rnott obeth atist heque stion Wheth ertis H I N D T H E G noble rinth emind tosuf ferth eslin gsand arrow Y M A F T E R S sofou trage ousfo rtune ortot akear msaga insta C H O ...

Words: 274 - Pages: 2

Premium Essay

Computer Science

...ICT-457 Network Security Sum-2013 HW-9 1. Provide the name of a link to 2 publicly available encryption software tools. http://export.stanford.edu/encrypt_ear.html https://www.cryptanium.com/?gclid=CLbz5Z7KlbgCFcU5QgodrC0APg 2. Explain the difference between symmetric and asymmetric key cryptography. Provide an example where each is used. Pg. 282/283. Those that use the same key to encrypt and decrypt are private (symmetric) key ciphers. Those that use different keys to encrypt and decrypt are public (asymmetric) key ciphers. Symmetric key cryptography cannot secure correspondence until after the two parties exchange keys. Asymmetric key cryptography uses a cipher with two separate keys. One is for encryption and one for decryption. Correspondents do not first have to exchange secret information to communicate securely. With asymmetric key cryptography, an opponent can intercept everything and still not be able to decipher the message. 3. Explain why having an entity’s public key alone does not allow someone to decrypt a message. Pg. 288. Because it is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. 4. Does a hash function ensure integrity or privacy? Explain your answer. Pg.309/310. Hash functions help to detect forgeries. They compute a checksum of a message and then combine it with a cryptographic function so that the result...

Words: 363 - Pages: 2

Free Essay

Information Assurance

...Encryption Standards for Web Browsers Joaquin Javier Brown American Military University For every operating system connected to the internet, there must be a web browser to navigate it. Given the amount of risks posed by viruses and other threats on the internet, measures must be taken to secure one’s computer against these threats. From the standpoint of a user many types of software can be implemented to prevent intrusions and detect them once they’ve occurred. In spite of this there is still an element of risk. To combat this from the side of the programmer, there has been a type of encryption that controls data flow from work stations to the internet. The level of this is encryption across most internet surfing tools is set at 128 bits of encryption. 128 bits of encryption is extremely difficult to crack. It works by utilizing 128 character comprised of ones and zeros. The reason this standard is chosen is that it strikes a balance between complexity and efficiency. It would take longer than the average human lifespan to crack, which essentially means the cracker stumbled upon the correct key within the span of half the possible combinations (Bradford). Though there are stronger types of encryption such as the one time pad, it bears to reason that having to replace the key after every single web page is loaded is inefficient. Though 128 bit encryption is indeed powerful, there are other encryption types available to the public which are even stronger. Advanced Encryption...

Words: 533 - Pages: 3

Free Essay

Zimmerman Telegram

...differently. Even though the Choctaw Codetalkers and Enigma Encryption Device were direct results of the failure of Zimmerman Telegram, the latter was used by the United States during the same period of World War 1. It is important to note here that there was already an encryption method which must have been ignored by the Germans. The One-Time Pad was already in use before the start of World War 1. This encryption method according to Nicholas G. McDonald in his Research Review explained that the one-time pad encryption algorithm was invented in the early 1900's, and has since been proven as unbreakable. The one time algorithm is derived from a previous cipher called Vernam Cipher, named after Gilbert Vernam. The Vernam Cipher was a cipher that combined a message with a key read from a paper tape or pad. The Vernam Cipher was not unbreakable until Joseph Mauborgne recognized that if the key was completely random the cryptanalytic difficultly would be equal to attempting every possible key. Another point worthy of mention is the mistake of sending the entire message in one transaction. As an Intelligence Officer I would have broken the message in shorter telegrams. The chances of intercepting all of the messages would have been very slim. McDonald, N. 2009 Past, Present, and Future Methods of Cryptography and Data Encryption: A Research Review University of...

Words: 276 - Pages: 2

Premium Essay

Network Security

...Commercial IT security solutions / products 1. Executive overview Three commercial IT security products are evaluated to solve the issue of cloud computing service security; including SmartCryptor, Trend Micro SecureCloud, and CloudPassage Halo. These three products were selected because they contain the similar features to protect the hacker or data lose on the cloud network. The features of their products are compared and contrasted to identify the most benefits to the users. I set the selection criteria including cost, features, how to use, security level, and company-fit. The CloudPassage Halo products shows the most powerful products, however, I found many features are duplicated to the network security features that may implemented together with the servers. The cost is considered high. I recommended the Trend Micro SecureCloud with powerful encryption algorithm (AES –standard) and be controlled by policy –driven KEY that can self-adjust to any organisation. The price is reasonable with their features. Moreover, in small company who uses the third-party cloud service, SmartCryptor is chosen as very budget (just $6/months), the use can add another level of security in file encryption and do not worry that others will access your file. To sum up, every products has their own advantage and disadvantage, the way of product selection should consider what we really need, the product feature is solve the problem, and the price should be reasonable. 2. Introduction Cloud...

Words: 2036 - Pages: 9

Premium Essay

Nt1310 Unit 1 Use Case Diagram

...Use Case Diagram: In this use case diagram we are used 2 actors and 5 use cases. Here the data owner and data consumer are the actors. And the remaining are use cases(upload files, attribute based key generation, secret key, master key, access data). How it works means, when the data owner wants to upload a file based on attributes in the form of encrypted data. Then only the file will be uploaded in the outsourced . and data consumer wants to access an outsourced file. The data consumer access some access policies then only he downloads the cipher text and it converts into a plaintext. Class diagram In the class diagram first the data owner wants to upload the file into the outsource decryption. The attributes of data owner are filename, file size, public key, secret key, master key the only the file will be uploaded in the cloud server. And the data owner consists of methods file upload(), file size(), key gen(),...

Words: 613 - Pages: 3

Free Essay

It460

...1. At a company, you are responsible for securing a network server utilized primarily for data storage and internal application sharing as well as for securing numerous desktop computers connected to the network. Describe the access control that you would put in place for each and explain why. The more valuable your data, the more effort you should put into securing your firm's network servers. The following areas will help to maintain a server on the network. Firewall: It's important to ensure your server's built-in firewall is running and that you are also using at least one level of network firewall. This may be something as simple as a firewall on the router attached to the server. Placing a server on a network without a firewall is like leaving the front door wide open. Once the firewall is running, the next step is to turn off every port you don't need. If you are not using the port, you don't need it open on the firewall. Hardening: Getting the firewall running is only a start. A critical step is "hardening" the system. This is the process of trimming the machine of every piece of software it doesn't need to complete its assigned task. Every single piece of software is going to have an exploit. You want to reduce the machine down to the necessities to increase the security. This means removing software from the server box. If, for example, the machine is an e-mail server, then delete all office productivity applications, the Web browser, even games and...

Words: 1826 - Pages: 8

Premium Essay

Data Encryption

...1. Which one of the following statements is most correct about data encryption as a method of protecting data? D. It requires careful key Management 2. Explanation (one paragraph with citations). When protecting data with encryption methods, it is essential to properly manage all encryption keys. “Unless the creation, secure storage, handling and deletion of encryption keys is carefully monitored, unauthorized parties can gain access to them and render them worthless”, “ And if a key is lost, the data it protects becomes impossible to retrieve” (securing enterprise, 2010). Therefore, it is mandatory to have the correct security precautions in place to protect encryption keys. It is important to make backups of any encryption keys, and also of any changes that are made, in case originals are lost or data needs to be restored (Magalhaes, 2007). “Ensure that the backups are recoverable and an effective disaster recovery plan that details the recovery of the keys from backup is in place” (Magalhaes, 2007). Also, “storing the decryption keys with the encrypted data is bad practice, for this reason the keys should not be stored on the tapes that contain the encrypted achieved data” (Magalhaes, 2007). Making sure that the encryption keys are only available to approved users, and are kept in well-guarded areas, will help secure them significantly (Magalhaes, 2007). Make sure to Escrow the keys with a trusted third party (Magalhaes, 2007). “Ensure that you have a way of...

Words: 381 - Pages: 2

Premium Essay

Compsec

...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...

Words: 360 - Pages: 2

Premium Essay

Crypt

...them to unreadable format. 2. Which should be transmitted across the network—the plaintext or the ciphertext? Why or Why not? Cipher text should be transmitted across the network to send the information from point A to point B due to confidentiality. Just in case if it get intercepted so they can’t understand the message. 3. What is a cipher? A cipher is a specific mathematical process used in encryption and decryption. 4. What is a key? It’s a random string of bits and it’s also the other thing that encryption and decryption requires. 5. What must be kept secret in encryption for confidentiality? A key must be kept secret in encryption for confidentiality. As long as the key is secret both parties still have their confidentiality. 6. What is a cryptanalyst? It’s someone who cracks encryption and it could be done by brute force key cracking. But as long as key is longer brute force key cracking will take longer time. 7. Complete the enciphering in Figure 3-2 of your textbook. Cipher text: r w l y p j k n f c s d 8. Which leaves letters unchanged—transposition or substitution ciphers? Transposition ciphers because it moves letter around the messages but letters itself doesn’t change. 9. Which leaves letters in their original positions—transposition or substitution ciphers? Substitution Cipher because in this one character is substituted with other character but order of character doesn’t...

Words: 256 - Pages: 2

Premium Essay

Week 1

...Executive Summary: Patton Fuller community hospital uses the clinical system, which is an integrated suite of healthcare applications that support various patient care like registration and scheduling; clinical orders, chart entries and reviews for physicians, nurses, emergency department personnel, and other care providers; systems for lab technicians, pharmacists, and radiologists; billing systems and insurers; and outpatient systems for the hospital’s outpatient clinics.System is built on a two-tier, client-server architecture, where the client is responsible for the presentation logic and application logic, and the server responsible for the data access logic and data storage. It allows multiple users across the network to share the server’s resources. Since the Hospital has to follow HIPPA compliance and regulation law, Patton-Fuller Community Hospital will need to make sure encryption rules are applied to their system and data is protected. Below is the symmetric and asymmetric encryption method to be used. 1) Public Key 2) Private Key 3) IPsec Public Key (Asymmetric): This encryption method will give pair of keys Message is encrypted using the public key and can only be decrypted by private key. Example RSA, Advanced Encryption Standard (AES) * RSA – It is a public key encryption method * It is a standard encryption method especially used for transmitting data over internet. * It is cost effective solution with hardware based encryption method...

Words: 295 - Pages: 2

Premium Essay

Nt1310 Unit 2 Assignment

...data integrity is guaranteed. Both answers are impeccably worthy. b) “Confidentiality” means that messages are not readable to outcasts. Then again, the attacker can simply modify bits and so forth and hence alter the messages. The receiver can't see this in the general case as ‘data integrity’ is not gave. Note: you could contend that obvious modifications can be recognized by a receiver, e.g. in the event that the approaching plain content is clearly babble. Nonetheless, this obliges that the collector has some former "thought" of what the plain content should resemble. This is surely not the situation for a general transmission of information in binary. A further point in the event that will be that rearranging a solitary bit in the “cipher” may influence numerous bits in the decoded plaintext. Subsequently, the recipient would really need to have an exceptionally exact idea and identification of wrong values in the plaintext. c) The possible ways to detect delays are: - Timestamps: Add timestamps to messages. The timekeepers of sender and beneficiary must be synchronized and the beneficiary needs to have an exceptionally solid thought of system defer between him and the sender. This methodology needs ‘data integrity’. - Sequence numbers and receiver specifically ACKing messages: this can help if the sender does the real location. This methodology needs ‘data integrity’. - Rotating keys: this to some degree complex methodology includes changing the encryption key each few...

Words: 739 - Pages: 3

Premium Essay

Nt1330 Unit 1 Assignment

...Encryption Hierarchy: - A hierarchical encryption is key management infrastructure. Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys. Asymmetric keys and symmetric keys can be stored outside of SQL Server in an Extensible Key Management (EKM) module. The following illustration shows that each layer of the encryption hierarchy encrypts the layer beneath it, and displays the most en configurations. The access to the start of the hierarchy is usually protected by a password. Symmetric encryption policy: - There are several ways to include hidden content in a message. In the beginning of cryptology, using invisible ink was a common method. That style of actually hiding is still in use today and called steganography. However, the term encryption today usually refers to the use of an algorithm that is transforming a readable message into an unreadable one. To decrypt that unreadable message you need to know two things. The algorithm used to scramble the message and the key. While there are algorithms that do not require a key, they are not considered secure anymore and their use should be avoided. In fact, any cryptographic algorithm that requires keeping the algorithm itself secret is considered weak and should not be used. The best way to identify a strong cryptographic algorithm is to take a published algorithm and look at how many cryptologists have tried to break it unsuccessfully. If the algorithm itself is known...

Words: 656 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1

...whether they are transformed in the same way (e.g., add or remove a randomly generated vector) or shuffled with the same order. To achieve this goal, we introduce a novel Blind Vector Transformation technique, under which each participant con- tributes a part of the vector transformation while any single one of the parties cannot recover the original vectors from the final transformation result. Therefore, with blind vector transformation, we could enable a party to match its interests with another's profile but, at the same time, to keep the interests as well as the profiles private.Matching protocol is based on paillier’s homomorphic encryption. Homomorphic encryption is a form of encryption that allows computations to be carried out on cipher text, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This is sometimes a desirable feature in modern communication system architectures. Homomorphic encryption would allow the chaining together of different services without exposing the data to each of those services. Homomorphic encryption schemes are malleable by design. This enables their use in cloud computing environment for ensuring the confidentiality of processed data. In addition the homomorphic property of various cryptosystems can be used to create many other secure systems, for example secure voting systems, collision-resistant hash functions, private information retrieval schemes, and many more. There...

Words: 1138 - Pages: 5