NOTE: All examples on this page that use standard encoding will show an example of the encoding being used, with the plaintext reading:
"This is an example of..." (followed by whatever the encoding type is). When the substitution uses different characters from ASCII or imagery the decoder will simply be shown, unless additional context or instructions for the substitution are required.
The images and examples on this page were accumlated over many years and sources weren't always identified. If you were responsible for the creation of one of these images or know who is, please contact me and I'll provide attribution. Thank you!
20-8-9-19 9-19 1-14 5-24-1-13-16-12-5 15-6 1 15-14-5 26 20-23-5-14-20-25
19-9-24 5-14-3-15-4-9-14-7
A very simple encoding in which the letter "a" is represented as the value "1", the letter "b" is represented as the value "2", and so on until the letter "z" is represented as the value "26".
A musical cipher that uses distinct notes and timings to represent values. The letter "e" is the easiest way to quickly identify this cipher, as the zig-zag notation is less commonly seen.
A simple substitution using a 3 wide by 4 tall pixelation encoding.
A phonetic, direct, and/or numeric substitution cipher based on the Armenian language.
American Standard Code for Information Interchange (ASCII) is used to map 8-bit values to printable and control characters. Both decimal and hex values are listed below as well as the resultant character. Characters in square brackets indicate control characters.
Used only for numerical representations, but may be used to double-encode ciphers which have numerical equivalents (e.g. A1-Z26 encoding).
BAABA AABBB ABAAA BAAAB ABAAA BAAAB AAAAA ABBAA AABAA BABAB AAAAA ABABB ABBBA ABABA AABAA ABBAB AABAB BAABA AABBB AABAA AAAAB AAAAA AAABA ABBAB ABBAA ABAAA AAAAA ABBAA AAABA ABAAA ABBBA AABBB AABAA BAAAAÂ
Uses five characters (nominally "a" and "b", but also represented in binary on modern systems as "0" and "1") to encode each letter.
BAABB AABBB ABAAA BAABA ABAAA BAABA AAAAA ABBAB AABAA BABBB AAAAA ABBAA ABBBB ABABB AABAA ABBBA AABAB BAABB AABBB AABAA AABAA BABBB ABBBB AAAAA ABBAB AAABB AABAA AAABB AAAAB AAAAA AAABA ABBBA ABBAB ABAAA AAAAA ABBAB AAABA ABAAA ABBBB AABBB AABAA BAAABÂ
An expanded version of the Baconian Cipher that maintains all letters.Â
Also known as "Night Writing" or "Sonography", designed for communicating in French. This was also the inspiration for Braille (which simplified the approach).
Does not encode uppercase/lowercase differently, but does include punctuation.
Does encode uppercase/lowercase differently, but does not include punctuation.
Can be constructed of a six-by-six grid with the top and bottom split to make repeating patterns, similar to how a Pigpen cipher is created.
For example, note that the top half of each row (such as 0-5) is all the same: short/short/long/long, while the bottom half of each column (such as 1, 7, D, J, P, and V) are also the same: short/long/short/long.
VGhpcyBpcyBhbiBleGFtcGxlIG9mIEJhc2U2NCBlbmNvZGluZw==
This cipher involves taking triplets of 8 bits and converting them into quadruplets of 6 bits, then mapping the resultant value back to 8 bit representations that are in the printable character range. This is generally easiest to visualize rather than describe (see below). As the encoding relies upon a consistent triplet of 8 bits, any "missing" data that is needed is padded with a special additional character ('='), which results in the trademark trailing equals sign in many Base64 encodings. While strictly speaking Base64 is a type of encryption, it is one for which the decryption key (the lookup table, below) is publicly disclosed; as such, it is not suitable for any applications requiring confidentiality of information.Â
Used to send telegraph communications, and also known as International Telegraph Alphabet 2 (ITA2, or just IA2). Two distinct tables are used, one for letters and one for figures/symbols, and there are control characters to jump back and forth between the tables. Each value is represented in binary (telegraph dash/dot).
Sending a value of "11111" specifies to jump to the letters interpretation (top line in the table below, starting with "A") and a value of "11011" specifies to jump to the figures/symbols interpretation (second line in table down below, starting with "-").
When reading the encoder/decoder image the values go from top to bottom, so for instance "B" is "10011" while "G" is "01011".
An example of an encoded message using the Baudot Cipher (the smaller dots indicate alignment with three positions below and two positions above the line they define):
Language used in Lego Bionicles.
Language used in Lego Bionicles.
A variant on Pigpen that eliminates the need for the secondary "X"-based shapes.
-[--->+<]>-.[---->+++++<]>-.+.++++++++++.+[---->+<]>+++.-[--->++<]>-.++++++++++.+[---->+<]>+++.[->+++<]>+.+++++++++++++.-[->+++++<]>-.+[->+++<]>++.[--->+<]>+.--[->+++<]>-.++++++++++++.+++.----.-------.--[--->+<]>-.+++++[->+++<]>.---------.[--->+<]>--.+[->++<]>.---[----->+<]>-.+++[->+++<]>++.++++++++.+++++.--------.-[--->+<]>--.+[->+++<]>+.++++++++.
An encoding and programming language that only uses 8 characters, which makes it visually unique and easily identifiable. Don't try doing this one by hand... use an online interpreter (such as this one) because it can be 100+ characters to represent one value.
Aopz pz hu lehtwsl vm h jhlzhy jopwly lujyfwapvu.
This cipher essentially takes the A1-Z26 cipher and adds or subtracts from the value then converts it back... or it could be viewed as rotating characters by a fixed amount. For example, a shift of 1 would be "a" --> "b", "b" --> "c" (and so on), while a shift of 3 would be "a" --> "d", "b" --> "e" (and so on, as shown below). Caesar ciphers are a subset of rotational ciphers and can be easily represented as the classic decoder wheel. By convention case is preserved in Caesar ciphers and punctuation/numbers are not encoded.
This was used in Maxwell Grant's 1934 story "Chain of Death" about The Shadow, and is the actual cipher used between the members of Crime Incorporated. The characters are joined together left and right to obscure the character positions.
Example of the encoding in action:
This was used in Maxwell Grant's 1934 story "Chain of Death" about The Shadow, and is the decoy cipher used to make the correspondence between the members of Crime Incorporated seem innocent.
This cipher is based upon a figure rotating around a central pole and occupying 8 positions (up, up/right, right, down/right, down, down/left, left, and up/left in order), after which the figure is changed. This can be observed by looking at the progression of A through H. When that rotation pattern would cause repeating (such as the figure used for I/J) only four positions are thus used (beacuse the full inversion is identical to the original position). This can be observed by looking at the profession of I/J through M. Variations on this maintain the "right" nib for letters (such as "K" below which have dropped it).
Sometimes used as a direct substitution.
Handles values up to 9999, with each position's unique value (thousands, hundreds, tens, and ones) being combined to create a unique shape.
Identical to the Baudot Cipher but with colors to make it seem more complex. Included here just for completeness.
Sometimes used as a direct substitution.
Based on Greek numbering but uses Cyrillic characters rather than dedicated numbers.
Uses a base 25 system, so each place is a factor of 25 rather than 10.
From the Sherlock Holmes story "The Adventure of the Dancing Men" by Sir Arthur Conan Doyle.
Used in power line control systems, encodes values from 0 to 126 with 10 pulses of electricity (represented as + and -) which are then directly mapped to ASCII values (see ASCII, above).
A designed font to condense writing for digital efficiency using five dots vertically, similar to the Baudot Cipher. Letters are merged together to make word shapes. It does, however, have a dedicated font available.
Note: If anyone has a version of this without the floating dots in the top right corner they'd be willing to share please contact me.
Source of lore unknown for this one.
Used in alchemy/occult documents.
Source unknown
Clearer version of the symbols:
This is a variation of the classic autokey cipher. Each symbol has a numerical value. The first character is converted into (A=0, Z=25). Each subsequent letter is represented as the previous value plus the same encoding of the current character, wrapping around at 26 --> 0, then represented by the corresponding value.
For example, the string "ABCDEF" would end up being represented with the symbols for "0,1,3,6,10,15" instead of "0,1,2,3,4,5" via:
A.....  First character, A=0, so:    0
.B....  Previous is 0, B=1, so 0+1:   1
..C...  Previous is 1, C=2, so 1+2:   3
...D..  Previous is 3, D=3, so 3+3:   6
....E.  Previous is 6, E=4, so 6+4:  10
.....F. Â Previous is 10, F=5, so 10+5:Â 15
Decryption
To decode a message, the first symbol's value is translated directly into a character (0='A', 1='B', and so on). For the remaining letters, you subtract the previous symbol's numerical value. If the result is less than zero, you add 26. Then that number is converted into a character as before.
One of the substitution ciphers employed in the Game Theory ARG.
From a document originally in German, origin/source unknown. From same document as the musical notes cipher and the triangle cipher.
;46) 6) 5* 8¢59.08 ‡1 ;48 3‡0†2?3 -6.48(Â
From Edgar Allan Poe's "The Golden Beetle"
Three variants joined (Zwack, Wieshaupt, and DeMolay).
Fmpmfpmfffmm mfffmm mmmppp mppfpfmmmppmpfmpmfmpp ppfmpf mmm ppmmppfmmfmmmmmmfmmpp mffppp Pmpmppppppppffm MmfppfmpmmppÂ
Readily identifiable by the use of only three characters (f/m/p).
When formed into words and sentences, every other character is mirrored vertically, with the first character in a sentence typically pointing down. They can be read and written left-right or top-bottom. The top form for the letters is used on ZDR, and the lower (square shapes) are used on Zebes.
Credit for image and additional information on MetroidFandom
Simply a mirror placed next to common depictions of numbers to create shapes that might look different, but directly readable once recognized.
Unknown source. Each letter is encoded as a series of notes which are designed to work together as melodic rather than the disjointed approach that can result from single notes being used per letter.
Also called semaphore flags.
Also called semaphore flags.
Source unknown.
Three variations are used, all shown below. The letters "E", "H", "V", and "W" are omitted in the latter two variants.
Used to represent words as numbers by where they occur on a dialpad of a telephone. Straight encoding uses one number for each letter, and thus can lead to ambiguities (e.g. "728" could translate to "pat", "rat", or "sat"). T9 encoding uses each digit the number of times that would be required to reach an index, e.g. "2" for "A", "22" for "B", and "222" for "C". When using T9 encoding spaces are not represented and individual characters are separated by spaces (e.g. "CAT" becomes "222 2 8" instead of "22228").
Visual layouts are used to denote letters and each unique shape (a "V" shape or portion of a nine-box square, each with or without dots) represents a single letter. Two variants are used. The traditional version uses the square splits first, then the "X" splits at the end, as such:
The alternate version uses the "X" split after each square split rather than at the end, as such:
Example showing standard variant characters:
Alternate version:
And another alternate version:
|// \\ / /| / /| | |/| \ ||/ | |\| |\|\ |\/ \ ||/| ||\ /| |\/ | /| \\ |\|\ / |\|\ \ || ||/| |/ \Â
Alternate version of Klingon from Star Trek, sometimes called the "Mandel" Klingon.
A 34 character substitution cipher designed for Star Wars, including multiple double-character replacement letters. Each character is represented as the letter above the name and the English equivalent (e.g. the first character is named "Aurek" and represents the letter "a"). Certain letter combinations are reduced (e.g. "Nen" is used in place of "Nern" followed by "Grek").
A simplified version is also used in some cases, which uses just direct character substitution to maintain a 26 character alphabet.
Uses two distinct positional heights.
Another variation on the Pigpen Cipher, which drops "j" and "v" (or rather uses "i" for "j" as well, and "u" for "v").