Picture of Spy tech - Practical Codes
This instructable is intended to demonstrate practical codes that are many times harder to crack than the codes you normal find in newspapers and puzzle books. This is the real deal - codes that have been used by real-life spies during such high risk times as WWII. These are for a variety of situations, from keeping your club house a secret to keeping your formula for rocket fuel safe.

Listed below is a short glossary of terms, should you need it:

A method of concealment in which entire words or phrases are substituted for other words or phrases. Example: dog = hideout. This means that most of what people call "codes" are not really codes, but ciphers (see below). Everything in this instructable is a cipher, except for the book code as noted in step 4. However, since everyone is used to hearing the word "code," I will use it interchangeably with "cipher" throughout this instructable.

A method of concealment in which individual letters are substituted or transposed (switched around). Example: Agent = tnega (Agent backwards). Pig Latin is also a cipher.

A method of encryption in which the letters in the alphabet are replaced directly. This means that everywhere an S appears in your message, it would be substituted with, for instance, M. This is generally a weak type of encryption.

This means that a letter could have more than one meaning. So every time an S appears in your message, the first time it might get replaced with an E, the next time with a W, then a D, and so on. Every cipher in this instructable is poly-alphabetic.

A key is what is needed to decode a message. It may be a word known only to you and your partner (such as the Playfair cipher in step 2), the settings of rotors for the Enigma machine in step 3, or a title of a book for the book code in step 5

Brute force attack
This is when someone tries to break a code by just trying every single possible combination, one at a time, until they get something that makes sense. The average person can break a mono-alphabetic cipher this way, but anything more complicated will likely need a computer.

Your message before it is encrypted. (readable)

The message after it is encrypted (unreadable)
shogunskot9 months ago

How about using "text speak" for the message? Honestly I probably couldn't read the typical 15-year-olds text message anyway!

HRU? Yo hu u b wit 2nit? Ur gr8 bf or ur bro? RUOK?

KwartzKitten10 months ago

I can't help but feel that using a phonetic code would make cracking a cipher far more difficult.

bowmaster5 years ago
"2. Break coded messages into groups of 4 letters.

I took this to the next level. Instead of making every group four letters, add fake word lengths and punctuation.
makes it even harder but i have an idea that wrkos lkie so you put the frist lteter, and the lsat letetr in teihr aissgned palces tehn put the ohter lteters jmubeld up in a rnadom odrer if you can't read this then it probly means you have dyslexia
hee hee hee
orry-say ut-bay i-ay ead-ray it-ay

Lets see ou-yay read that
I did, it was easy.
thats the one problem with piglatin. (anybody can read it)
Some people can't translate it fast enough when it's spoken.
me and my friends used to speak in it no problem.
Then you aren't some people, you are most people.
I read that no problem.
I wonder how long it took you to type that.
about 3 minutes, i had to think of how i could jumble the letters, and to make sure that i had the right ones in the word
account3r25 years ago
When I made a code on ms word, i made sure to wipe out the file for good when i was done!
Can you make this easier?
SniperofGod6 years ago
is it on gromit's left ear? or is that just a yellowish speck?
Nah, it doesn't work like that. It doesn't effect one specific part, it's embedded in the entire file.

I've seen the "yellow speck" method on things like Zest puzzles and in Lost TV show hints (Blue eyed girl has brown eyes and you zoom in on her eyes to find a secret message) and it's really cool but this is a little different kind of cool.

In this case it wouldn't be noticeable to the eye. If it was (because the message was to big) the entire image (not just a speck) would degrade a little.
Oh, allright. Thank you very much. This is definitely an interesting code. So, assuming that you are trying to send this message to someone (say the instructable robot), and you want them to figure it out, but obviously no-one else, how does that person decrypt it?
rfmonaco5 years ago
Error in encoding per two sites:
Should be .. qe ik ha pm hu eq qc dz cn fk dy
Kaiven5 years ago
ooohhh... I get it! Very cool! I can't believe this doesn't have more views.
What about RSA?
maeve6 years ago
There is another really good book by Herbie Brennan called code breaker, I think. It gives loads of examples of different codes, like yours. It also gave ways of cracking almost every code imaginable. I think your instructable is really good, it shows you know A LOt about differnent codes and ciphers, and secret ways to hide messages. I think the most ingenious method ever used was back millenia ago: On a man/woman's shaven head, they would tatoo a message. Once the hair grew back, they would send the messanger to the reciever. The messanger would pass under enemy radar. Once they reached their destination, their head was again shaved to reveal the message. Cool eh? By the way, do you know why morse code is called a code? It's a cipher, isn't it?
bdblock946 years ago
I tried decoding your playfair cipher but I think you have some errors in it
Isshinryu (author)  bdblock946 years ago
Thank you for your comment - I just tried to decipher it, and it seemed to be working. May I ask at what part the deciphered message stopped making sense? Perhaps I need to buff up the section on decoding.