Introduction: The Art of Sending Secret Messages

Picture of The Art of Sending Secret Messages

Information seems to have lost its value. It is sent about carelessly, caution thrown to the the wind. People think they might be taking excellent precautions, but few things are safe. Phone lines can be tapped, emails hacked, and mail intercepted. At some point in time you will need to give someone a message and there can be no chance of someone else getting their hands on it. This instructables will go in-depth into how to code, cipher, and disguise any messages that can't be compromised.

Step 1: An Introduction to Ciphers

Picture of An Introduction to Ciphers

 Let me clear up a common misconception. When most people say writing in code, what they really mean is writing using a cipher. A code is when a symbol, word, or phrase is used to stand for a different word, phrase, or sentence. A cipher is were each letter in a word is represented with a different letter or symbol. For an example, the first picture shows the simplest cipher there is.

 Each letter has a number. A is 1, B is 2, etc. If I wanted to say hello, it would turn into 8(h)-5(e)-9(l)-9(l)-15(o). If you want to decipher 1-16-16-12-5, you would match the numbers to the letters and see that it means apple. This cipher is so simple that I don't recommend using it for deceiving anyone but small children, and even they might figure it out. This one is just to introduce you the idea.

When learning these ciphers, get a some pen and paper and try using each cipher. Doing them will make them stick in your memory and make sure that you fully understand each cipher.

Step 2: Caesar Cipher

Picture of Caesar Cipher

The Caesar cipher, also known as the shift cipher, is a great cipher that has a decent amount of security and is very simple. Before you start coding your message you need to make a coder. You can make a coding wheel like in the picture above. Here's how to make one.

   1. Cut out a circle of construction paper or something thicker if you want.
   2. Write the alphabet along the outside of the circle so that it takes up the entire outside edge.
   3. Cut out another circle that is small enough to fit inside the first circle and not cover up any of the alphabet.
   4. Write the alphabet along the outside of the second circle so that it takes up the entire outside edge, and so that the letters on the second circle match up with the letters on the first.
   5. Attach the second circle to the middle of the first circle with one of those pins that you push through paper and then flatten the two ends so that it stays in place.

So know you have your coding wheel you need to know how to use it. First spin the middle wheel so that A on the outside matches with B on the inside, B with C, C with D, and so on. Let's say the message you want to code is "Go to the store in five minutes." On the outside wheel, find the letter in the message, then write down the letter that matches them in the second wheel. "Go to the store in five minutes" becomes "fn sn sgd rsnqd hm ehud lhmtdr."

To decode the message, you do the complete opposite. Find the coded letters in the second wheel and match them with the first. You can see why they call it a shift cipher. You're basically shifting the alphabet over. Because shifting the alphabet only one space down is a semi-obvious thing to do, you can shift the alphabet as much as you want. You could make B U, C V, D W, like in the picture.

Before you send a message like this, make sure that you and whoever you are contacting have agreed on how many times you are shifting the alphabet. It won't work if the coder shifts it twice and the decoder shifts it thrice.

Also, if you don't want to go through the hassle of making a coder, you can wright out the alphabet and write the shifted alphabet underneath it.

Security Level- Low.  This cipher is good for messages that aren't that important, things you just want to make a bit more complicated to figure out. It will deter the casual observer and beginner snoop, but there are only 26 ways a message can be coded. If someone cares enough, all they have to do is try each combonation until they decode your message.

Step 3: Masonic Cipher

Picture of Masonic Cipher

The Masonic cipher, also known as the pigpen cipher, is another easy, yet low security way to code messages. In this cipher, each letter is replaced with a symbol. There are many variations to this cipher, but I am only going to explain the most basic one. In the image above you can see how the letters are arranged in the four different groupings. 

To code a message, you find the letter in your message and draw the symbol that goes with it. A would be a corner open on the top left side, E would be a square, S is a v shape facing upwards, and so on. To decode a message you use your key, the first image, to match the symbols with the letter.

Security level- Low. This cipher can be cracked by anyone who knows about this style of cipher.

 Here are some links to different variations of the masonic cipher.
http://symboldictionary.net/?p=2632
http://www.dummies.com/how-to/content/challenging-masonic-ciphers-to-solve.html
http://www.themasonictrowel.com/education/others_files/the_masonic_cipher/the_masonic_cipher.htm

Step 4: Playfair Cipher

Picture of Playfair Cipher

The Playfair cipher is my personal favorite. It is relatively simple to understand, and it is very secure. In the previous ciphers, each letter had a symbol or letter that stood for it. This cipher codes letters in pairs, making it much harder to crack.

The first step in using the Playfair cipher is preparing your message. Let's say it's, "I will be at the clock in five minutes."
-Get rid of all punctuation and spacing. Put the letters in pairs of two. You should have, "iw il lb ea tt he cl oc ki nf iv em in ut es"

-If you have any double letters, like tt, you need to put an X between them. It should look like this, "iw il lb ea tx th ec lo ck in fi ve mi nu te s"

-If you have a letter at the end that is by itself, add an X to make it a pair. Your code now looks like, "iw il lb ea tx th ec lo ck in fi ve mi nu te sx"

-If you have any J's in your message, replace them with an I. There are no J's in this message, so it doesn't matter.

Now you nee to make the coding square.
-Choose a word or phrase that you want to be you keyword. The longer it is the more secure your code will be. Let's say your keyword is "instructables". 

-Write your keyword into a 5x5 grid without repeating any letters. Then fill in the rest of the alphabet, excluding the letter J. It should look like this.
I  NSTR
UCABL
EDFGH
KMOPQ
VWXYZ        

It's finally time to code your message! You want take each pair of letters individualy, find them on the letter block, and use these three rules to code your message.

1.If the two letters on different rows and columns (diagonal from each other) imagine that the two letters form the opposite corner of a box. Write down the letters that are in the opposite corner. It is important the order you write them in. Whatever letter is first in the original pair of numbers, the new coded letter that is in the same row as it( in the corner of the imaginary box) will go first. If that didn't make sense, the first picture may help.

2.If the letters are on the same row, write down the letter that is to the immediate right of your original letter. If your letter is at the edge of the alphabet square, you need to wrap around the box and write the first letter in that row. Again, the order of the coded letters should be in the same order as the original letters. If that didn't make sense, the second picture may help.

3. If the letters are in the same column, write down the letters immediately below your original letter. if your letter is at the bottom of the alphabet square, you will need to write the letter that is at the top of that column. Again, keep the coded letters in the same order as the original letters. If that didn't make sense, the third picture may help.

IW becomes NV. IL becomes RU. LB becomes UL.  VE becomes IK, and so on and so forth. The entire message when coded should be, "nvrufusyrgduaqumnsesikknciigas"

To decode the message go through the steps of coding, only this time, when letters are on the same row write the letter to the left, and when letters are on the same column write the letter above it. Basically do the inverse operation.

Remember, for your friend to understand your message he needs to know the key word. You can have an agreed upon keyword before hand, or if you want something a little more complicated, keep reading.

For this to work you need to write the date along with the coded message. First, choose twelve books that you and you friend both have access to. Assign each book a number. If the date is 7/17/12, then you go the the seventh book, the seventeenth page, and the twelfth word. That will be the keyword to solve the cipher.

Security Level- High. Unless your messages are being intercepted by someone with cipher cracking computer programs, your message will be safe.

Step 5: Columnar Transposition

Picture of Columnar Transposition

The Columnar Transposition is another great cipher that is easy to code, and is difficult to decode. 

This cipher works by writing your message into columns and then rearranging them.

First you need you choose a keyword. When you choose a keyword I would suggest using the method I described at the end of the last page. Let's use the word, "fancy" as the keyword. The message that you will code is, "Meet me at next midnight."

The number of columns you have is decided by the length of the code word. Fancy has five letters, so you have five columns. Now you write your message across the columns, starting another row when you reach the end of your columns just like in the picture. If the last line of your message didn't fill the last row, you would fill it in with random letters.

Next you need to assign each column a number. Again, this is decided by the keyword. Number the letters by ow close they are to the beginning of the alphabet. A is 1, C is 2, just like in the picture. Align the keyword and its numbers above the columns if you haven't already. 

The number above each column determines which order it is written in. This turns you message into, "eatitnihmexnetmgmedt"

To decode the message, first dived the message into columns. You know how many columns there are because you have the keyword. You that the first group of five letters is column 1, the next one 2, and so on. Then you just need to reorder the columns according to the keyword.

Security Level-High. This code can be cracked with the right knowledge and a lot of time, but as long as you guard your keyword, you should be safe.

Step 6: Invisible Ink

Picture of Invisible Ink

What better way to keep a message safe then to make it invisible? You've all probably heard of the old invisible ink with lemon juice, but I'll include it anyways.

First you want to pour some lemon juice into a small bowl and add a few drops of water. Take a cotton swab and dip it in the mixture. Use your swab to write out your message on the paper. When ever the swab starts to get dry dip it in the lemon juice. if you want to be really sneaky, use a cipher to code the message.

When the lemon juice dries, the message will be invisible. To make it reappear, hold it to a heat source, like a light bulb.

A blank piece of paper is a little suspicious, so you should write something on top of it. Because you have an invisible message and a obvious message, you have several ways to be devious.

First, you can write in plain English some misleading information to fool anyone who intercepts your message. You could write a series of random letters, making someone think there is some kind of code when there really isn't. You your enemies are smart, you write some misleading information coded with a cipher. The difficulty of the cipher you choose depends on how smart your enemies are.

Step 7: Dead Drops

Picture of Dead Drops

The most surefire way to not let your enemies know what your messages say is to hide the message itself from them. I'm going to be describing a few different methods for hiding physical messages, and how to deliver them to your allies.

 Dead drops were used a lot during the Cold War when spies were sharing information. Basically, one spy would hide some documents, usually disguised, somewhere in a city. Another spy, who had been given directions to said dead drop,  would come by after the other spy had left and pick up the documents. The documents could be disguised as trash and put in plane sight, or it could be in a hidden spot in an envelope.

An easy way to hide a small message is with a pen. As you can see in the second picture you just take apart the pen, roll the message around the inner tube, and put the pen back together. Preferably you want to use a pen that isn't see through  for obvious reasons.

Hide your message in a carved out book, an empty pop can, an old box, a hollowed out phone. Hide it in a dumpster, in a tree, under a bench, by a gutter; the possibilities are literally endless! Whatever way you hide your dead drop, make sure you take the necessary precaution so that your documents aren't ruined by weather.

 


Step 8: Electronic Dead Drop

Picture of Electronic Dead Drop

Earlier I said that if you send an email, someone can hack it, and that is true. However, there is a way to use email to send messages to someone with virtually no chance of detection.

First, make an email account. Don't use your real name or information to create it. Now, give the password and username to the person you want to talk with. 

To send him a message, write an email, but then save it as a draft instead of sending it. When your friend logs on, he'll be able to see the message and send one to you.

If you friend is compromised, all you have to do is log on to the email and delete everything.

Step 9: Conclusion

Hopefully you now have the skills to send secure messages with secrecy. Remember these few points as you go about your exciting spy life.

-Always use a cipher to code your messages
-Never assume that your phone calls, emails, or daily conversations are secure
-The best way to keep information from your enemies is to not let them know your sending a message.

This is my first instructables. i hope you learned something and please vote for me in the Spy Challenge.

Comments

RogelioN (author)2015-05-05

Thanks a lot for the info. I have one question though, how many years would the lemon ink stay on the paper (working)???. Thanks!

kperrucci (author)2015-02-07

"The rule of thumb is - if the site is free, YOU are the product." I never thought of that. That's a really awesome comment.

RaNDoMLeiGH (author)2012-08-31

Another "online dead drop" idea you might work out for your friends, family, or cohorts is to find a website or forum that isn't terribly well monitored. You might, for instance, find a YouTube or Flickr account that has some content and is open for comments. There are a lot of blogs out there that would also serve this purpose.

Visit that site and leave a comment, hopefully not too obviously out of context.

Any free sites, such as Google Docs, Yahoo mail, etc are going to be in the business of collecting, cross-referencing, and selling your information, so if you set up a fake account, make sure you only visit it from public computers. Not just your computer over public wi-fi, because your computer can still be identified.

They log *everything* and Google will roll right over and hand stuff over to the po-po without thinking twice about your privacy. The rule of thumb is - if the site is free, YOU are the product.

Ian01 (author)2012-06-10

"If you friend is compromised, all you have to do is log on to the email and delete everything."
Unless your friend changes the password first! This is equivalent to sharing an online notebook account (such as Simplenote). I recommend using individual accounts and actually sending messages back and forth. You can keep them from being read by anyone but the intended recipient, and keep others from sending messages in your name, by using public-key encryption.

Hazard™ (author)Ian012012-06-12

It's true that your friend could change the password if he got caught, thats why you would need to act fast. I can't attest personally the security of the sites you mentioned, but I think there is probably someone somewhere who could hack it.

Ian01 (author)Hazard™2012-07-03

I mentioned one site, and I made no claim about its security. What I meant is that no site can possibly compromise information you put into it if you encrypt that information before you put it in.

heathbar64 (author)2012-05-25

very nice. I like codes (cyphers) I really like the idea in this ible https://www.instructables.com/id/Make-your-own-wallet-sized-Enigmatm-like-Machine/ also for symplicity the idea of wrapping a strip of paper around a broom handle or such. You don't have to remember a code.

Hazard™ (author)heathbar642012-05-30

Thanks, I'm glad that you liked it. Originally I was going to add a few more ciphers but some were really complicated and it was hard to choose which ones were the best.

About This Instructable

62,725views

79favorites

License:

Bio: No one of consequence.
More by Hazard™:Swords and Shields and Tunics Oh My! Links for Most of Your Dagorhir NeedsCracking Single Dial Combination LocksThe Stinger, Enemy of Small Mammals Everywhere
Add instructable to: