Codes are a way of changing a message so that its original meaning is hidden. Typically, this technique requires a book or code word. Encryption is a process that is applied to messages to hide or information. This process is the reverse of translating or interpreting messages. Codes and ciphers are a major part of the science of communication security, which is also known as cryptanalysis.
Step
Method 1 of 5: Using Simple Passwords and Codes (For Children)
Step 1. Write the words in reverse
Here's a simple way to encode messages so they can't be understood at a glance. Messages like “Meet me outside” are written in reverse, which becomes “Lumet uka id raul.”
This code is easy to interpret, but can be useful if you feel someone is trying to read your message
Step 2. Mirror the alphabet to half of the alphabet to encode the message
Write the letters A to M in one line on the paper. Continue the next alphabet (N-Z) just below this line, also on one line. Replace each letter in the message with the letter directly opposite it.
Using alphabetic reflection, the message “Hello” becomes “Unyb.”
Step 3. Try applying a grid password
Draw squares as in tic tac toe on a piece of paper. Write the letters A to I in the boxes, from left to right, top to bottom. In this example:
- The first line consists of the letters A, B, C.
- The second line consists of the letters D, E, F.
- The last line consists of G, H, I.
Step 4. Create a second tic tac toe with dots
Draw another tic tac toe square next to the first one. Fill in the boxes with the letters J to R, similar to the first. Then, mark each box of each line with a period as follows:
- In the first row, starting from the left, place a dot in the bottom right corner (letter I), in the bottom center side, (letter K), and in the bottom left corner (letter L)
- In the second row, starting from the left, place a dot on the middle right side (the letter M), on the bottom center side (the letter N), and on the middle left side (the letter O).
- In the third row, starting from the left, place a dot in the upper right corner (the letter P), in the upper center side (the letter Q), and in the upper left corner (the letter R).
Step 5. Write two big X's under each tile
These two X's will also be filled with letters to complete the square cipher. On the second X, place a dot in the open space around the cross section of the X so that there is a dot on each side of the center of the X. Then:
- In the first X (not dotted), write an S above the X, a T on the left, a U on the right, and a V on the bottom.
- On the second X, write W on the top side, X on the left, Y on the right, and Z on the bottom.
Step 6. Use the box surrounding the letters to write down the password
Squares (including dots) surrounding the letters are used instead of the letters themselves. Use this box passkey to encode and translate messages.
Step 7. Use a date password
Choose any date; You can use a personal date, such as a birthday or college graduation, or another date, such as Indonesia's independence day. Write down the numbers for the date, month, and year in order. Here's your numeric lock.
- For example, if you use Indonesia's independence day, write it as 1781945.
- If you've already agreed on a passcode date with someone, you can include a numeric lock hint in the coded message (e.g. Happy Birthday).
Step 8. Encrypt message with date lock
Write the message on a piece of paper. Underneath the message, write down one digit of the numeric lock for each letter in the message. When you reach the last digit of the date lock, repeat from the beginning. For example, if you use Indonesia's independence day (17/8/1945) as the key:
- Message: I am hungry
-
Encoding:
I am hungry
1.7.8.1.9.4.5.1.
Slide the letters according to the number key and generate…
- Password message:B. Q. B. M. I. S. E. S.
Step 9. Use a secret language, for example Pig Latin
In Pig Latin, words starting with a consonant sound are replaced so that the sound is at the end of the word, and add "ay". This technique is more effective for words that start with many consonants. Words that start with a vowel can simply be affixed with “way” or “ay” at the end.
- Examples of words that begin with a consonant: sapi = apisay; I = Akuway; also = ugajay; wet = asahbay; hello = hello
- Examples of words that start with many consonants: worry = awatirkhay; standard = andarstay; pain = erynyay
- Examples of words starting with vowels: cloud = awanay; delicious = delicious; ash = abuway;
Method 2 of 5: Cracking the Code
Step 1. Know the code limitations
Code books can be stolen, lost, or destroyed. Modern cryptanalytic and computer analysis techniques can often crack even powerful codes. However, code can condense long messages into one word, which can save a lot of time.
- Codes can be used for pattern reading practice. This skill can be used when creating and cracking codes or ciphers.
- Codes are usually used by close friends. A joke that only close friends understand can actually be thought of as a kind of "code". Try to code language with your close friends.
Step 2. Determine the purpose of code generation
Knowing the purpose of coding will ensure that your efforts are on target. If the purpose of coding is to save time, you can create some custom code words. If you're trying to encode detailed messages, it's a good idea to create a dictionary-like code book.
- Select the phrase that appears frequently in the message that you want to encode. This is your main target to turn into a secret code.
- The code can be further complicated by using several different codes that are rotated or combined. However, as more code is used, the number of code books required increases.
Step 3. Create your code book
Shorten common phrases, such as "Message received complete and clear," to something like "Roy." Specify alternative code words for each word you want to encode as well as common phrases in the message.
-
Sometimes, partial/partial code can disguise messages well. For example, if “dance” means “deliver” and “restaurant” means “museum” means “restaurant”, and “Roy” comes from the previous code.
-
Message:
Regarding yesterday. I wanted to say, Roy. I'm going to dance to the restaurant as planned. Over and out.
-
Meaning:
Regarding yesterday. I want to say, your message was received complete and clear. I'll take you to the museum as planned. Over and out.
-
Step 4. Apply the codebook to the message
Use the code words in your code book to encode messages. You can save time by replacing nouns (e.g. names and pronouns like me, she, you) as plain text. However, it all depends on your situation.
A two-part code uses two different code books to encode or decode a message. This type of code is much more robust than one-part code
Step 5. Use the key to encrypt the message, alternatively
Key messages, word groups, letters, symbols, or a combination thereof can be used to encode messages. The recipient of the message also needs a key phrase or key letter/symbol to decipher the message.
-
For example, with the keyword " SECRET ", each letter of the message will be converted to the number of letters between it and the letter of the associated keyword. For example,
-
Message:
Hello
-
Encoding:
/H/ distance
Step 11. the letter of the key /S/
/e/ is the same letter (zero) with key /E/
/l/ berjara
Step 9. the letter of the key /C/
Etc…
-
Encoded message:
11; 0; 9; 6; 10
-
Step 6. Translate the message
When you receive a coded message, use your code book or key phrases/keywords to translate it so it can be understood. It might be difficult at first, but as you get used to the code, it will become easier to crack it.
To strengthen your coding and coding skills, try getting your friends to create a group of amateur coders. Send messages to each other to improve your skills
Method 3 of 5: Studying Common Codes
Step 1. Apply the code that Mary, Queen of Scots used
When the political situation in Scotland was in turmoil, Mary, Queen of Scots, used symbols instead of common letters and words. Some of the features in Mary's code that you may find useful include:
- Use simple shapes for frequently used letters, such as a circle in place of /A/. This saves time encoding messages.
- Common symbols are used as part of the new code language; for example, Mary uses "8" as the code for the letter "Y." This can trick the code interpreter into thinking it's a number instead of a code symbol.
- Unique symbols for common words. Mary used a unique symbol for the words "pray" and "courier", and both were used very often in her time. Using unique symbols to replace frequently used words and phrases saves time and adds complexity to code.
Step 2. Use a code phrase similar to that used by the military
Code phrases can abbreviate multiple meanings in a single phrase. In fact, many military alert conditions, such as the DEFCON system, are well-known to describe the state of defense readiness. Determine the appropriate code words/phrases in your daily life.
- For example, instead of saying "I need to go to the toilet" when with friends, you can use the code word "Breakfast."
- To let your friend know that their crush has entered the room, you can say the code phrase, "My cousin loves to play soccer too."
Step 3. Encode the message using the lock code book
Books are quite easy to get. If the book is set as a code lock, you can visit the bookstore or library after receiving the code to crack it.
-
For example, you could use Frank Herbert's book Dune, where the numeric code represents the page, line, and word count starting from the left.
-
Coded Messages:
224.10.1; 187.15.1; 163.1.7; 309.4.4
-
Original Message:
I'm hiding my words.
-
- Books with the same title but different editions may have different page numbers. To make sure the right book is used as the key, include the publication information, such as edition, year of publication, and so on with your book key.
Method 4 of 5: Cracking Password
Step 1. Determine the suitability of using the password
Passwords use algorithms, which are processes or changes that are applied to messages consistently. This means that anyone who knows this password can crack it.
- Complex passwords can confuse even a trained password expert. Sometimes the mathematical operations behind complex ciphers can be a powerful bulwark against everyday messages.
- Many ciphers add keys, such as dates, to strengthen passwords. This key adjusts the output value by adding the day of the corresponding month (for example, on the 1st, all encodings are incremented by 1).
Step 2. Invert the algorithm to apply to the message
One of the simplest ciphers that can be applied is the ROT1 Password (sometimes referred to as the Caesar cipher). This name simply means that you advance each letter in the message to the next letter in the alphabet.
-
ROT1 Message:
Hello
-
ROT1 Encoded:
i; b; m; p
- The Caesar cipher can be adjusted by advancing the number of different letters in the alphabet. Conceptually, ROT1 and ROT13 are basically the same.
- Passwords can be very complex. Some passwords use coordinates, hours, and other numbers. Some passwords can only be cracked with the help of a computer.
Step 3. Encrypt the message
Use algorithms to encode messages. As the process of learning to code continues, your speed at cracking passwords will increase. Add on the algorithm to complicate it. As an example:
- Include a change condition in your password, such as the day of the week. Determine the value for each day. Adjust the password to this value when encoding messages for the day.
-
Include the page number in your password message. Each related letter on the page acts as a key in the message, for example:
-
First message:
7; 2; 3; 6; 3
-
Book Lock: A_girl (spaces don't count)
/H/ distance
Step 7. letter of /A/
/e/ berjara
Step 2. letters of /g/
/l/ berjara
Step 3. letters of /i/
Etc…
-
Message with Customized Key:
Hello
-
Step 4. Crack the password
You should get used to reading passwords when you're experienced enough, or at least it's easier to crack them. When you apply processes (algorithms) consistently, these habits will help you spot trends or gain intuition when working on this type of cipher system.
Amateur cryptography clubs are quite popular on the internet. Many of these clubs are free and teach the basics of modern coding
Method 5 of 5: Understanding Default Passwords
Step 1. Master Morse Code
Despite its code name, Morse is a type of cipher. The dots and dashes represent long and short electrical signals, which are used in place of letters in the alphabet. This method was used to communicate with electricity in the past (known as the telegraph). Some of the letters commonly used in Morse, denoted by long (_) and short (.) signals, include:
- R; S; T; L:._.; _..; _;._..
- A; E; O:._;.; _ _ _
Step 2. Take advantage of transposition ciphers
Many great people in history, such as the genius Leonardo da Vinci, wrote messages as they appear in the mirror. Therefore, this encoding method is commonly called "writing in the mirror." This type of password may seem difficult at first, but it will quickly be understood.
Transposition ciphers usually change the message or the arrangement of letters visually. The image of the message will be changed to hide its original meaning
Step 3. Convert the message to binary code
Binary is a computer language that uses the numbers 1 and 0. The combinations of 1 and 0 can be encoded and interpreted with a binary key, or by calculating the values represented by 1 and 0 for each letter in a message.
When the name "Matt" is encoded with binary code, the result is: 01001101; 01000001; 01010100; 01010100
Tips
- Find a way to encode spaces between words as well as the words themselves. This will strengthen the code and make it more difficult to crack. For example, you can use letters (preferably E, T, A, O, and N) instead of spaces. These letters are called nil.
- Learn different scripts, such as Runic, and generate encoding/interpretation for the recipient of the message. You can find them on the internet.