This instructable is filled with tons of cool codes and ciphers I'm sure all of you will enjoy.

For more awesome codes and cipher go to my website bestcodes.weebly.com
or visit bestcodesgame.weebly.com
to practice decoding

Also visit my other instructable "Movie Codes" or see them here at

http://bestcodes.weebly.com/movie-codes.html

## Step 1: A1Z26

A1Z26

The A1Z26 code is a very simple code. As you know there are 26 letters in the American alphabet so Z would equal 26 because it is the 26th letter in the alphabet.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

## Step 2: ASCII

ASCII

ASCII is a computer code that is similar to binary. Instead of using 1's and 0's like binary it uses the numbers from 1-256

A=65

B=66

C=67

D=68

E=69

F=70

G=71

H=72

I=73

J=74

K=75

L=76

M=77

N=78

O=79

P=80

Q=81

R=82

S=83

T=84

U=85

V=86

W=87

X=88

Y=89

Z=90

a=97

b=98

c=99

d=100

e=101

f=102

g=103

h=104

i=105

j=106

k=107

l=108

m=109

n=110

o=111

p=112

q=113

r=114

s=115

t=116

u=117

v=118

w=119

x=120

y=121

z=122

0=48

1=49

2=50

3=51

4=52

5=53

6=54

7=55

8=56

9=57

## Step 3: Atbash

Atbash

The Atbash code is just the alphabet backwards. For example A would equal Z.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Z Y X W V U T S R Q P O N M L K J I H G F E D C B A

## Step 4: Binary

Binary

The Binary code is a code that the computers recognize using only 1's and 0's. It is a very complicated code because they are different for lowercase and capital.

A 01000001

B 01000010

C 01000011

D 01000100

E 01000101

F 01000110

G 01000111

H 01001000

I 01001001

J 01001010

K 01001011

L 01001100

M 01001101

N 01001110

O 01001111

P 01010000

Q 01010001

R 01010010

S 01010011

T 01010100

U 01010101

V 01010110

W 01010111

X 01011000

Y 01011001

Z 01011010

a 01100001

b 01100010

c 01100011

d 01100100

e 01100101

f 01100110

g 01100111

h 01101000

i 01101001

j 01101010

k 01101011

l 01101100

m 01101101

n 01101110

o 01101111

p 01110000

q 01110001

r 01110010

s 01110011

t 01110100

u 01110101

v 01110110

w 01110111

x 01111000

y 01111001

z 01111010

0. 00110000

1. 00110001

2. 00110010

3. 00110011

4. 00110100

5. 00110101

6. 00110110

7. 00110111

8. 00111000

9. 00111001

! 00100001
@ 01000000

# 00100011

\$ 00100100

% 00100101

^ 01011110

& 00100110

* 00101010

( 00101000

) 00101001

- 00101101

_ 01011111

+ 00101011

= 00111101

; 00111011

: 00111010

" 00100010

' 00100111

` 01100000

~ 01111110

< 00111100

> 00111110

? 00111111

¿ 10111111

, 00101100

. 00101110

/ 00101111

{ 01111011

} 01111101

[ 01011011

] 01011101

€ 10101100

¶ 10110110

## Step 5: Braille

Braille

Braille is what blind people read. It is a series of raised dots that tell you what letter, number, or word it is.

## Step 6: Caesar Cipher

Caesar Cipher

The Caesar cipher is a code Julius Caesar invented when he mailed letters. He invented it so if his messenger was robbed of that letter and the robber wouldn't be able to read it. It is probably one of the most simple codes ever. It is 3 letters back so A would be X. The Rot Cipher is almost the same as the Caesar Cipher.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

## Step 7: Columnar Cipher

Columnar Cipher

The Columnar Cipher is a type of transposition cipher.

1. Get Keyword

2. If your keyword is Zebras, that is 6 letters. You would write 632415 because Z is the 6th highest letter in the word and E is the 3rd highest letter and so on

3. Then message under the numbers in rows of 6, because Zebra is a 6 letter word.

4. Write out 123456. Under the number write the letters from each column that match the numbers in the original line of numbers.

## Step 8: Combination Cipher

Combination Cipher

A Combination Cipher is a Cipher using 2 or more codes. For example if you wanted to make the best code ever, you could do Atbash, Caesar Cipher, Vigernere Cipher, and then A1Z26.

## Step 9: Dice Cipher

Dice Cipher

The Dice Cipher is not dice, it's just squares with dots in certain places.

## Step 10: Digraph Cipher

Digraph Cipher

The Digraph Cipher is kind of like the Vigenere Cipher. When you write a sentence you would write it in pairs of twos, li ke th is, and if there is a letter left over add an x to it. The pairs of letters will be the coordinates for the two letters. An example would be "IA MT RY IN GT OE XP LA IN TH IS" = "VG ZN EI VT TN BC KR YG VT GZ VO". To decipher it the decoded letters will be the coordinates.

## Step 11: Dorabella Cipher

Dorabella Cipher

The Dorabella was made by Edward Elgar on July 14, 1897 for his young friend Dora Penny. It is not confirmed a solved code.

## Step 12: Francis Bacons Substitution Cipher

Francis Bacons Substitution Cipher

One of Bacons best code was a code that used bold and regular fonts in a certain order to make a new letter. For example "code" would be something like this "FrancisBacon was a cool guy". After you see the sentence put all of the letters in to groups of 5, like this "Franc isBac onwas acool" leave out any extra letters. Once you have it like this you are ready to decode.

*= Regular Letter B= Bold Letter

A= *****

B=****B

C=***B*

D=***BB

E=**B**

F=**B*B

G=**BB*

H=**BBB

I=*B***

J=*B**B

K=*B*B*

L=*B*BB

M=*BB**

N=*BB*B

O=*BBB*

P=*BBBB

Q=B****

R=B***B

S=B**B*

T=B**BB

U=B*B**

V=B*B*B

W=B*BB*

X=B*BBB

Y=BB***

Z=BB**B

## Step 13: Grid Transposition Cipher

Grid Transposition Cipher

The Grid Transposition cipher is just another type of transposition cipher. First make a grid that can fit all of the letters, you can do that by taking the square root of the total number of letters, if it comes out as a decimals round up. If there are extra spaces add X's. Then you scatter the numbers in a random order. Then Match the coordinates onto the second grid. Best codes would come out as EDSEBSCTO. To decode it all you need to do is make another grid with the letters in the correct order. Finally Match the coordinates onto the correct grid.

## Step 14: Keyboard Code

Keyboard Code

The Keyboard Code is just the order of letters your keyboard.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Q W E R T Y U I O P A S D F G H J K L Z X C V B N M

## Step 15: Morse Code

Morse Code

Morse code was invented by Samuel Morse and was used in the early 1800's to message people in a telegram. It is a series of beeps that are short and long. For example _ is called a dash and it would be a long beep, and . would be dot and it would be a short beep.

## Step 16: Phone Code

Phone Code

The Phone code is really cool because not a lot of people know it. It is just the number the letter is on and then what number it is on that number. For example A is on 1st number on 2 so it would be 2 1

2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 7 7 7 8 8 8 9 9 9 9

1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 4 1 2 3 1 2 3 4

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

## Step 17: Pigpen Cipher

Pigpen Cipher

The Pigpen Cipher was created by the Freemasons so they could keep documents safe. It was also used by the confederate soldiers during the Civil War. It is called The Pigpen Cipher because the box's look like pigpens and the dots look like pigs. It seems complicated but it isn't really. The lines surrounding the letter and the dots within those lines are the symbols.

## Step 18: Rosicrucian Cipher

Rosicrucian Cipher

The Rosicrucian Cipher is almost exactly like the the Pigpen Cipher. The symbol that the letter is inside is the symbol that you put for that letter.

## Step 19: ROT Cipher

Rot Cipher

The Rot Cipher is when you take a letter and put it back or fourth to equal a different letter. An example of this would be -1 equals A=Z. +1 equals A+B It is Related to the Caesar Cipher.

This is a Print out of the Rot Cipher Wheel. Cut out the 2 circles leaving the inner circle NOT HOLLOW. Then you stick a tack or a paper clip through the middle of the inner wheel. Then you can spin it around to do your cipher.

## Step 20: Rout Cipher

Rout Cipher

The Rout Cipher is your message in a patter kind of like a word search. You make an arrow in the direction of the first two or three letters and then leave it to the other person to do the rest. To make is easier you can make an arrow all the way through.

## Step 21: Scytale

Scytale

The cylinder decodes for you!

To make a cylinder cipher you need long strip of paper and cylinder.

Wrap the paper around the cylinder so there are no parts of the cylinder showing.

You can temporarily tape down the edges to help you with this part. write your message across the cylinder (write 1 or 2 letters on each part of the strip) Then unwrap the paper from the cylinder.

You can't decode the cipher unless you have a cylinder the same diameter as the one it was made on.

## Step 22: Tap Codes

Tap Code

The Tap Code was used by Vietnam prisoners to communicate, usually by tapping on metal bars or walls. It is a combination of Morse Code and the Grid Code replacing K with a C or X. the dots (.) tell you what numbers to go to from top to side, and the dash's (/) tell you when to separate a word.

## Step 23: The Grid Code

The Grid Code

The Grid Code is a 5x5 grid. It is very simple.

## Step 24: Transposition Cipher

Transposition Cipher

Transposition Ciphers can be words written backwards for example (you are cool)=(uoy era looc). It could also be every pair or every 3 letters a pair of letters are swapped. An example of that would be (you are cool)=(oya uer oclo)

## Step 25: Vigenere Cipher

Vigenere Cipher

The Vigenere Cipher is a 26x26 grid of letters a-z. It is a more complicated cipher so I will have to try to demonstrate with explaining battle ship.

Directions

1. Choose a code word (any word. no numbers)

2. Write it like this (my code word will be "code") i m t r y i n g t o e x p l a i n h o w t o d o t h i s it doesn't matter if the code word cant fit evenly c o d e c o d e c o d e c o d e c o d e c o d e c o d e

3. Look at the grid and follow the row i and the column c to the intersection like in battle ship. the letter they intersect on is k. that is how you encode it. To decode it take the code letter in this case c and go until you find k. Then go up all the way so you will find i.

## Step 26: Wig Wag

Wig Wag

Wig Wag was used in the civil war to communicate during battles. It is pretty easy to do, you just have to remember that you don't have to write out all of some words.

<p>Codes and ciphers have always fascinated me, so i have one of my own.(crack it, the 1st number is the vertical)</p><p>23 24 11 33 14 44 23 11 33 13 43 </p><p></p>
<p>Hey! I cracked ur code!!! it says <em>Hi and thancs</em> but I would recommend using the grid code instead of the Tap code- cuz there are more letters!!!</p>
Hello. Most of your code are substitution or transposition codes. They are the easiest one to break. So yes in a sense it's a code since the information is not displayed as is, but they are not secure. The easiest way to break them is by frequency analysis. More over combining transposition codes do not increase the complexity of breaking the code.<br><br>You should have a look atcode using bigrams, trigrams, or using a key which length is at least as long as the message If you want something a bit more secure<br><br>Take care
<p>well, it's not that hard to invent your own code. i did:</p><p>4:3, 6:15, 6:4, 6:5</p>
How does your code work
<p>What does it mean?</p>
and not all of them are substitution
That's why in my comment i said &quot;most of you code&quot; and not &quot;all of your codes&quot; :-)
oops.
i have a few that use a key so...
I know some of them..thank for the additional infos..
if any if you guys are interested I've created another website that helps you practice code cracking.<br>Here is the link: <br>bestcodesgame.weebly.com
It seems so simple but complicated at the same time! Can't wait to try it!
<p>WHOA, this is excellent! I can't wait to try these codes out with my class to see who can crack them. Specifically, wig wag is the best name ever. </p>
<p>L33t! Scytale was my favorite. Thnxs for posting this ^</p>
Lol silly people
<p>Cool instructable cryptography and ciphers are fun - but one little thing bothered me</p><p>&quot;in the American alphabet&quot;</p><p>I speak English and would like to suggest a keyboard in Australia, Canada, England, , Belize, Trinidad &amp; Tobago etc...... and the USA are all the same. perhaps more care could be made to not include the entire English speaking world as American!</p><p>You did a great job in your instructable and i know you meant nothing by what you wrote.</p>
<p>I concur...I was born and raised in The United States, however, I have always regarded English, as Proper English. And our dialect is American English. There is a major difference. However I do see where the creator of this Instructable is going with his use of American, as this is what he knows to be English.</p><p>All that aside, I absolutely love the Code/Cipher Instructable. Good on ya!</p>
<p>I say English is English therefore it is the English alphabet....yanks nicked our language in the first place, least they could do is learn to use it correctly....Gaol is NOT Jail and judgement is spelt like that, NOT judgment....for examples ;-) Oxford is the body for deciding such things, NOT microsoft.</p>
<p>..like there is 'luminum in 'murka... and found perfectly normal over there.I think not that it should be named 'English'. Nice explanation of ciphers, though.</p>
<p>Good point! </p><p>Canada also has a Multilingual keyboard with a few French characters here and there. ;-)</p>
<p>It's too bad you didn't use the much more proper hexadecimal numbers for your ASCII. You only need 2 numbers to cover the full range of 256 (or FF) values of 8 bits. And 0 (or 00) is an actual value - an important one, too.</p>
<p>Over the last 8 years I have gotten a crash course in Braille. One of the interesting things about it is that it is much more than just an alphabet and number system. There is the concept of contracted Braille that takes individual letters and combinations of letters and uses them interchangeably for words. It is amazing the density of information that can be put into 6 cells.</p>
<p>The &quot;best&quot; codes dont have instructables for how to solve them</p>
<p>my good sit all the alchemists are jealous because this is gold:)</p>
<p>This is the greatest comment I have ever seen.</p>
A very nice collection. Seen most, but the route one is new. Seems a fun way to go, especially if you did it in a maze, then separated the maze so only those with the right one could solve it. Definitely going to have fun with that one.
<p>I see what you did there,</p><p> you have 26 steps, there being 26 letters in the alphabet</p>
This is a great general overview, but I do have one problem with it. You list ASCII as NOT being binary, and later list binary. If you notice, the binary represents the same numbers as ASCII because that IS how most computers communicate letters. Other than that, I would give more explanation on some of the methods, this reads a bit like a middle school report and less like an instructable. But, overall, good job.
<p>Wow this is some great information all in one place. Thanks!</p>
<p>VERY COOL!!!!.....</p>
<p>Nice job, but don't forget the venerable rot13 cipher.</p>
<p>+1 for ROT13 </p>
<p>As far as I understand and know the Caesar code is actually a shifted by 13 , not 3. I could be wrong though. The interesting about shifting by 13 instead is that your decryption and encryption steps are identical. </p>
<p>If you need your code to be human translatable, and done quickly, then transposing letters is the way to go. I've used simple ciphering off of an actual keyboard, using the position of the letter offset up (or down) from the true letter as the replacement. So, on US keyboards, apple would become q00o3.</p>
<p>Nice compilation of ciphering methods</p><p>Here are some programs I made for ciphering-https://drive.google.com/folderview?id=0B2ffwyRcquZTdFpTdkg5UWNHTnM&amp;usp=sharing</p><p>the files I made are named as codetool</p>
<p>code tool v1 is very complex. it replaces alphabet then reverses it. its similar to atbash</p><p>the code tool 2 works by converting alphabets to number then uses the method described in the photo-</p>
Yes. My code isnt here.
<p>Nice compilation of ciphering methods</p><p>Here are some programs I made for ciphering- <a href="https://drive.google.com/folderview?id=0B2ffwyRcquZTdFpTdkg5UWNHTnM&usp=sharing" rel="nofollow">https://drive.google.com/folderview?id=0B2ffwyRcqu...</a></p><p>the files I made are named as codetool</p>
Nice!
<p>thanx ... super ;-) </p>
<p>thanx</p>
<p>Much effort went to this good JOB thx m8</p>
<p>Unless I miss my guess the binary code for the alphabet and symbols here is just the binary equivalent of the ASCII code numbers for the same, if that helps anyone.</p>
<p>nice!! this may be useful for some game or trick</p><p>(btw.. that binary &quot;encoding&quot; is ASCII)</p>
Thanks. I have been working hard to learn all of these for a long time.
<p>You did a wonderful job on all the codes!</p>
Great! I have new ways of kind of crypting stuff
Great stuff, good read. Bit it's the English alphabet ;)
Cool, but a couple things,<br><br>ASCII is a key for converting binary into letters.<br><br>Binary is a key that represents numbers and has a simple way to read it.(Just read my instructable)

### About This Instructable

130,238views

695favorites

License:

Bio: bestcodes.weebly.com
More by zjawesome:
Add instructable to: