Saturday, September 10, 2011

Make A Cipher: One Pig's Pen




How to Encrypt a Pig Pen Cipher

Step 1
Write down your PLAINTEXT message on a piece of paper. Then draw two tic-tac-toe grids and two big X's - alternating each grid as you draw them on your paper.


Step 2
In the last two grids, place a dot in each compartment.


Then, beginning with the first grid, fill in each compartment with a single letter of the alphabet.


Step 3
To draw the cipher letters, use the shape of the compartment, or the "pen," surrounding the letter itself.


DO NOT include the letter in the cipher.


Step 4
Once you have created the cipher, send the message to a friend. Before you send it, make sure your friend knows what the patterns are for the grids and letters.


To make the cipher more secure, try changing the letter and dot patterns inside the compartments.

How to Decrypt a Pig Pen Cipher

Step 1
Arrange the grids and letters on a piece of paper according to the KEY that breaks the cipher.


Draw the grids in the correct pattern and then fill in the different compartments, or pens, with the appropriate dots and letters.


Step 2
Begin decrypting the message by comparing the shape of each cipher letter with the shape of the grid compartments.


Once you find a match, write down the letter that the cipher represents. Continue until you have completed decrypting the entire message.

1 comments:

  1. Looking for a pigpen translation program where i can place in my own pigpen cypher and dycrypt or translate for print off.

    ReplyDelete

Share our post if you like it..

Related Posts Plugin for WordPress, Blogger...

IP info

hAckRich

Tags

study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) brutus-aet2.zip (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)

Hackrich

welcome

☁ Partners Link Cloud ☁