5 Ways to Create Secret Codes and Passwords

Table of contents:

5 Ways to Create Secret Codes and Passwords
5 Ways to Create Secret Codes and Passwords

Video: 5 Ways to Create Secret Codes and Passwords

Video: 5 Ways to Create Secret Codes and Passwords
Video: Secret Codes That Unlock Hidden Phone Features 2024, May
Anonim

Codes are a way of changing a message so that its original meaning is hidden. Typically, this technique requires a book or code word. Encryption is a process that is applied to messages to hide or information. This process is the reverse of translating or interpreting messages. Codes and ciphers are a major part of the science of communication security, which is also known as cryptanalysis.

Step

Method 1 of 5: Using Simple Passwords and Codes (For Children)

Create Secret Codes and Ciphers Step 1
Create Secret Codes and Ciphers Step 1

Step 1. Write the words in reverse

Here's a simple way to encode messages so they can't be understood at a glance. Messages like “Meet me outside” are written in reverse, which becomes “Lumet uka id raul.”

This code is easy to interpret, but can be useful if you feel someone is trying to read your message

Create Secret Codes and Ciphers Step 2
Create Secret Codes and Ciphers Step 2

Step 2. Mirror the alphabet to half of the alphabet to encode the message

Write the letters A to M in one line on the paper. Continue the next alphabet (N-Z) just below this line, also on one line. Replace each letter in the message with the letter directly opposite it.

Using alphabetic reflection, the message “Hello” becomes “Unyb.”

Create Secret Codes and Ciphers Step 3
Create Secret Codes and Ciphers Step 3

Step 3. Try applying a grid password

Draw squares as in tic tac toe on a piece of paper. Write the letters A to I in the boxes, from left to right, top to bottom. In this example:

  • The first line consists of the letters A, B, C.
  • The second line consists of the letters D, E, F.
  • The last line consists of G, H, I.
Create Secret Codes and Ciphers Step 4
Create Secret Codes and Ciphers Step 4

Step 4. Create a second tic tac toe with dots

Draw another tic tac toe square next to the first one. Fill in the boxes with the letters J to R, similar to the first. Then, mark each box of each line with a period as follows:

  • In the first row, starting from the left, place a dot in the bottom right corner (letter I), in the bottom center side, (letter K), and in the bottom left corner (letter L)
  • In the second row, starting from the left, place a dot on the middle right side (the letter M), on the bottom center side (the letter N), and on the middle left side (the letter O).
  • In the third row, starting from the left, place a dot in the upper right corner (the letter P), in the upper center side (the letter Q), and in the upper left corner (the letter R).
Create Secret Codes and Ciphers Step 5
Create Secret Codes and Ciphers Step 5

Step 5. Write two big X's under each tile

These two X's will also be filled with letters to complete the square cipher. On the second X, place a dot in the open space around the cross section of the X so that there is a dot on each side of the center of the X. Then:

  • In the first X (not dotted), write an S above the X, a T on the left, a U on the right, and a V on the bottom.
  • On the second X, write W on the top side, X on the left, Y on the right, and Z on the bottom.
Create Secret Codes and Ciphers Step 6
Create Secret Codes and Ciphers Step 6

Step 6. Use the box surrounding the letters to write down the password

Squares (including dots) surrounding the letters are used instead of the letters themselves. Use this box passkey to encode and translate messages.

Create Secret Codes and Ciphers Step 7
Create Secret Codes and Ciphers Step 7

Step 7. Use a date password

Choose any date; You can use a personal date, such as a birthday or college graduation, or another date, such as Indonesia's independence day. Write down the numbers for the date, month, and year in order. Here's your numeric lock.

  • For example, if you use Indonesia's independence day, write it as 1781945.
  • If you've already agreed on a passcode date with someone, you can include a numeric lock hint in the coded message (e.g. Happy Birthday).
Create Secret Codes and Ciphers Step 8
Create Secret Codes and Ciphers Step 8

Step 8. Encrypt message with date lock

Write the message on a piece of paper. Underneath the message, write down one digit of the numeric lock for each letter in the message. When you reach the last digit of the date lock, repeat from the beginning. For example, if you use Indonesia's independence day (17/8/1945) as the key:

  • Message: I am hungry
  • Encoding:

    I am hungry

    1.7.8.1.9.4.5.1.

    Slide the letters according to the number key and generate…

  • Password message:B. Q. B. M. I. S. E. S.
Create Secret Codes and Ciphers Step 9
Create Secret Codes and Ciphers Step 9

Step 9. Use a secret language, for example Pig Latin

In Pig Latin, words starting with a consonant sound are replaced so that the sound is at the end of the word, and add "ay". This technique is more effective for words that start with many consonants. Words that start with a vowel can simply be affixed with “way” or “ay” at the end.

  • Examples of words that begin with a consonant: sapi = apisay; I = Akuway; also = ugajay; wet = asahbay; hello = hello
  • Examples of words that start with many consonants: worry = awatirkhay; standard = andarstay; pain = erynyay
  • Examples of words starting with vowels: cloud = awanay; delicious = delicious; ash = abuway;

Method 2 of 5: Cracking the Code

Create Secret Codes and Ciphers Step 10
Create Secret Codes and Ciphers Step 10

Step 1. Know the code limitations

Code books can be stolen, lost, or destroyed. Modern cryptanalytic and computer analysis techniques can often crack even powerful codes. However, code can condense long messages into one word, which can save a lot of time.

  • Codes can be used for pattern reading practice. This skill can be used when creating and cracking codes or ciphers.
  • Codes are usually used by close friends. A joke that only close friends understand can actually be thought of as a kind of "code". Try to code language with your close friends.
Create Secret Codes and Ciphers Step 11
Create Secret Codes and Ciphers Step 11

Step 2. Determine the purpose of code generation

Knowing the purpose of coding will ensure that your efforts are on target. If the purpose of coding is to save time, you can create some custom code words. If you're trying to encode detailed messages, it's a good idea to create a dictionary-like code book.

  • Select the phrase that appears frequently in the message that you want to encode. This is your main target to turn into a secret code.
  • The code can be further complicated by using several different codes that are rotated or combined. However, as more code is used, the number of code books required increases.
Create Secret Codes and Ciphers Step 12
Create Secret Codes and Ciphers Step 12

Step 3. Create your code book

Shorten common phrases, such as "Message received complete and clear," to something like "Roy." Specify alternative code words for each word you want to encode as well as common phrases in the message.

  • Sometimes, partial/partial code can disguise messages well. For example, if “dance” means “deliver” and “restaurant” means “museum” means “restaurant”, and “Roy” comes from the previous code.

    • Message:

      Regarding yesterday. I wanted to say, Roy. I'm going to dance to the restaurant as planned. Over and out.

    • Meaning:

      Regarding yesterday. I want to say, your message was received complete and clear. I'll take you to the museum as planned. Over and out.

Create Secret Codes and Ciphers Step 13
Create Secret Codes and Ciphers Step 13

Step 4. Apply the codebook to the message

Use the code words in your code book to encode messages. You can save time by replacing nouns (e.g. names and pronouns like me, she, you) as plain text. However, it all depends on your situation.

A two-part code uses two different code books to encode or decode a message. This type of code is much more robust than one-part code

Create Secret Codes and Ciphers Step 14
Create Secret Codes and Ciphers Step 14

Step 5. Use the key to encrypt the message, alternatively

Key messages, word groups, letters, symbols, or a combination thereof can be used to encode messages. The recipient of the message also needs a key phrase or key letter/symbol to decipher the message.

  • For example, with the keyword " SECRET ", each letter of the message will be converted to the number of letters between it and the letter of the associated keyword. For example,

    • Message:

      Hello

    • Encoding:

      /H/ distance

      Step 11. the letter of the key /S/

      /e/ is the same letter (zero) with key /E/

      /l/ berjara

      Step 9. the letter of the key /C/

      Etc…

    • Encoded message:

      11; 0; 9; 6; 10

Create Secret Codes and Ciphers Step 15
Create Secret Codes and Ciphers Step 15

Step 6. Translate the message

When you receive a coded message, use your code book or key phrases/keywords to translate it so it can be understood. It might be difficult at first, but as you get used to the code, it will become easier to crack it.

To strengthen your coding and coding skills, try getting your friends to create a group of amateur coders. Send messages to each other to improve your skills

Method 3 of 5: Studying Common Codes

Create Secret Codes and Ciphers Step 16
Create Secret Codes and Ciphers Step 16

Step 1. Apply the code that Mary, Queen of Scots used

When the political situation in Scotland was in turmoil, Mary, Queen of Scots, used symbols instead of common letters and words. Some of the features in Mary's code that you may find useful include:

  • Use simple shapes for frequently used letters, such as a circle in place of /A/. This saves time encoding messages.
  • Common symbols are used as part of the new code language; for example, Mary uses "8" as the code for the letter "Y." This can trick the code interpreter into thinking it's a number instead of a code symbol.
  • Unique symbols for common words. Mary used a unique symbol for the words "pray" and "courier", and both were used very often in her time. Using unique symbols to replace frequently used words and phrases saves time and adds complexity to code.
Create Secret Codes and Ciphers Step 17
Create Secret Codes and Ciphers Step 17

Step 2. Use a code phrase similar to that used by the military

Code phrases can abbreviate multiple meanings in a single phrase. In fact, many military alert conditions, such as the DEFCON system, are well-known to describe the state of defense readiness. Determine the appropriate code words/phrases in your daily life.

  • For example, instead of saying "I need to go to the toilet" when with friends, you can use the code word "Breakfast."
  • To let your friend know that their crush has entered the room, you can say the code phrase, "My cousin loves to play soccer too."
Create Secret Codes and Ciphers Step 18
Create Secret Codes and Ciphers Step 18

Step 3. Encode the message using the lock code book

Books are quite easy to get. If the book is set as a code lock, you can visit the bookstore or library after receiving the code to crack it.

  • For example, you could use Frank Herbert's book Dune, where the numeric code represents the page, line, and word count starting from the left.

    • Coded Messages:

      224.10.1; 187.15.1; 163.1.7; 309.4.4

    • Original Message:

      I'm hiding my words.

  • Books with the same title but different editions may have different page numbers. To make sure the right book is used as the key, include the publication information, such as edition, year of publication, and so on with your book key.

Method 4 of 5: Cracking Password

Create Secret Codes and Ciphers Step 19
Create Secret Codes and Ciphers Step 19

Step 1. Determine the suitability of using the password

Passwords use algorithms, which are processes or changes that are applied to messages consistently. This means that anyone who knows this password can crack it.

  • Complex passwords can confuse even a trained password expert. Sometimes the mathematical operations behind complex ciphers can be a powerful bulwark against everyday messages.
  • Many ciphers add keys, such as dates, to strengthen passwords. This key adjusts the output value by adding the day of the corresponding month (for example, on the 1st, all encodings are incremented by 1).
Create Secret Codes and Ciphers Step 20
Create Secret Codes and Ciphers Step 20

Step 2. Invert the algorithm to apply to the message

One of the simplest ciphers that can be applied is the ROT1 Password (sometimes referred to as the Caesar cipher). This name simply means that you advance each letter in the message to the next letter in the alphabet.

  • ROT1 Message:

    Hello

  • ROT1 Encoded:

    i; b; m; p

  • The Caesar cipher can be adjusted by advancing the number of different letters in the alphabet. Conceptually, ROT1 and ROT13 are basically the same.
  • Passwords can be very complex. Some passwords use coordinates, hours, and other numbers. Some passwords can only be cracked with the help of a computer.
Create Secret Codes and Ciphers Step 21
Create Secret Codes and Ciphers Step 21

Step 3. Encrypt the message

Use algorithms to encode messages. As the process of learning to code continues, your speed at cracking passwords will increase. Add on the algorithm to complicate it. As an example:

  • Include a change condition in your password, such as the day of the week. Determine the value for each day. Adjust the password to this value when encoding messages for the day.
  • Include the page number in your password message. Each related letter on the page acts as a key in the message, for example:

    • First message:

      7; 2; 3; 6; 3

    • Book Lock: A_girl (spaces don't count)

      /H/ distance

      Step 7. letter of /A/

      /e/ berjara

      Step 2. letters of /g/

      /l/ berjara

      Step 3. letters of /i/

      Etc…

    • Message with Customized Key:

      Hello

Create Secret Codes and Ciphers Step 22
Create Secret Codes and Ciphers Step 22

Step 4. Crack the password

You should get used to reading passwords when you're experienced enough, or at least it's easier to crack them. When you apply processes (algorithms) consistently, these habits will help you spot trends or gain intuition when working on this type of cipher system.

Amateur cryptography clubs are quite popular on the internet. Many of these clubs are free and teach the basics of modern coding

Method 5 of 5: Understanding Default Passwords

Create Secret Codes and Ciphers Step 23
Create Secret Codes and Ciphers Step 23

Step 1. Master Morse Code

Despite its code name, Morse is a type of cipher. The dots and dashes represent long and short electrical signals, which are used in place of letters in the alphabet. This method was used to communicate with electricity in the past (known as the telegraph). Some of the letters commonly used in Morse, denoted by long (_) and short (.) signals, include:

  • R; S; T; L:._.; _..; _;._..
  • A; E; O:._;.; _ _ _
Create Secret Codes and Ciphers Step 24
Create Secret Codes and Ciphers Step 24

Step 2. Take advantage of transposition ciphers

Many great people in history, such as the genius Leonardo da Vinci, wrote messages as they appear in the mirror. Therefore, this encoding method is commonly called "writing in the mirror." This type of password may seem difficult at first, but it will quickly be understood.

Transposition ciphers usually change the message or the arrangement of letters visually. The image of the message will be changed to hide its original meaning

Create Secret Codes and Ciphers Step 25
Create Secret Codes and Ciphers Step 25

Step 3. Convert the message to binary code

Binary is a computer language that uses the numbers 1 and 0. The combinations of 1 and 0 can be encoded and interpreted with a binary key, or by calculating the values represented by 1 and 0 for each letter in a message.

When the name "Matt" is encoded with binary code, the result is: 01001101; 01000001; 01010100; 01010100

Tips

  • Find a way to encode spaces between words as well as the words themselves. This will strengthen the code and make it more difficult to crack. For example, you can use letters (preferably E, T, A, O, and N) instead of spaces. These letters are called nil.
  • Learn different scripts, such as Runic, and generate encoding/interpretation for the recipient of the message. You can find them on the internet.

Recommended: