By using a reflected alphabet, the message “Hello” would instead become “Uryyb. “[4] X Research source

The first row is made up of the letters A, B, C. The second is made up of D, E, F. The last row is made up of G, H, I. [5] X Research source

In the first row, starting on the left, place a dot in the lower right corner (letter I), on the bottom middle side (letter K), and in lower left corner (letter L). In the second row, starting on the left, place a dot on the middle right side (letter M), on the bottom middle side (letter N), and on the middle left side (letter O). In the second row, starting on the left, place a dot in the upper right corner (letter P), on the top middle side (letter Q), and in the upper left corner (letter R). [6] X Research source

In the first (undotted) X shape, write S in the top of the X, T on the left side, U on the right, and V on the bottom. In the second X shape, write W in the top of the X, X on the left side, Y on the right, and Z on the bottom. [7] X Research source

For example, if you were to use George Washington’s birthday (2/22/1732), you would write it as 2221732. If you’ve already agreed to use a date shift cipher with someone, you can accompany enciphered messages with a clue (like “Washington”) for the number key. [9] X Research source

Message: I’m hungry Enciphering:I. m. h. u. n. g. r. y2. 2. 2. 1. 7. 3. 2. 2Shift letters according to the number key, as in… Coded message: K. O. J. V. U. J. T. A[10] X Research source

Consonant initial examples: pig = igpay ; me = emay ; too = ootay ; wet = etway ; hello = ellohay Consonant cluster initial examples: glove = oveglay ; shirt = irtshay ; cheers = eerschay Vowel initial examples: explain = explainway ; egg = eggway ; ends = endsay ; eat = eatay[11] X Research source

Codes serve as good pattern identification practice. This skill can be put to use when encoding, decoding, enciphering, or deciphering messages. Codes are naturally used between close friends. Inside jokes could be thought of as a kind of “code. " Try developing your code language with your best friends.

Select common phrases that occur in the messages you want to encode. These are prime targets to be condensed in a code word. Codes can be further complicated by using several different codes in rotation or combination. However, the more codes used, the more code books necessary for decoding. [13] X Research source

Sometimes, partial code can obscure a message sufficiently. For example, if “walk” means “tango” and “museum” means “restaurant” and the previously used code word “Roy” holds its value, Message: About yesterday. I wanted to say, Roy. I’ll tango to the restaurant as planned. Over and out. Meaning: About yesterday. I wanted to say, reading you loud and clear. I’ll walk to the museum as planned. Over and out. [14] X Research source

Two-part codes apply two different code books to encode or decode a message. These are much stronger than one-part codes.

For example, with the key word “SECRET,” each letter of your message would convert to the number of letters between it and the corresponding letter of the key word. As in, Message: Hello Encoding:/H/ is 11 letters away from the key /S//e/ is the same (zero) as the key /E//l/ is 9 letters away from the key /C/And so on. . . Coded Message: 11; 0 ; 9 ; 6 ; 10

The use of simple shapes for high frequency letters, like Mary’s use of a circle for the letter /A/. This saves time while encoding. Common symbols used as part of the new code language, like Mary’s use of “8” as code for the letter “Y. " These can confuse code breakers who might interpret this as a number and not a code symbol. Unique symbols for common words. In Mary’s day, “pray” and “bearer” received unique symbols, but these were more common then than they are today. Still, using symbols for frequent words and phrases saves time and adds complexity. [19] X Research source

For example, instead of saying “I’ve got to run to my locker” among your friends, you might use the code word “Sloppy. " To let your friends know that the person you want to date has entered the room, you might say the code phrase, “My cousin Bruce likes hockey, too. "

For example, you might decide on using Frank Herbert’s Dune, with code numbers representing the page, line, and number word starting from the left. Encoded Message: 224. 10. 1 ; 187. 15. 1 ; 163. 1. 7 ; 309. 4. 4 Decoded Message: I’m hiding my words.

Complex ciphers can puzzle even trained cryptanalysts. Sometimes the math behind complex ciphers can prove a suitable defense for hiding everyday messages. Many cryptographers add a key, like the date, to strengthen ciphers. This key adjusts the output values by the corresponding number of the day of the month (on the first, all output values would be changed by one). [23] X Research source

ROT1 Message: Hello ROT1 Enciphered: i ; f ; m ; m ; p Caesar Ciphers can be modified to rotate forward a number of different letters of the alphabet. In concept, ROT1 and ROT13 are essentially the same. Ciphers can be incredibly complex. Some require the use of coordinates, times, and other values as well. Some cipher process may require the use of a computer.

Include a rotating condition to your cipher, like the day of the week. For each day of the week, assign a value. Adjust your cipher by this value when encrypting a message on that day. Include a page number with your enciphered message. Each corresponding letter of that page will serve as a key for the message, as in, 1st Deciphered Message: 7 ; 2 ; 3 ; 6 ; 3 Book Key: A_girl (spaces aren’t counted)/H/ is 7 letters away from /A//e/ is 2 letters away from /g//l/ is 3 spaces away from /i/And so on. . . Key Adjusted Message: Hello[25] X Research source

R ; S ; T ; L : . _.  ; _. .  ; _ ; . _. . A ; E ; O : . _ ; .  ; _ _ _[27] X Research source

The name “Matt” would encipher to binary as: 01001101 ; 01000001 ; 01010100 ; 01010100. [30] X Research source