How To Make Secret Messages | The Odyssey Online
Start writing a post
Entertainment

How To Make Secret Messages

Hide your secrets with ciphers.

57
How To Make Secret Messages
Spectrose

We humans have always enjoyed our secrets. Some of us purchase specially-tinted screens to hide what we do on our phone or in our car. Our voices hush to whispers when we talk about our personal affairs. There are even diaries with special locks to conceal the stories of our daily lives. Perhaps the most secretive technique we humans have come up with is cryptography.

Cryptography is the practice of masking a message into a garbled mess that can only be deciphered with some additional information that ideally only the recipient knows. Our computers and phones encrypt all of our messages so that even if a hacker intercepts it, it would be useless. Encryption is not a product of the modern world. It has been around for at least 3000 years.

The ancient Greeks and Romans used simple ciphers to hide their messages. The most famous is the Caesar cipher, an encryption technique Julius Caesar used to hide his messages. A Caesar cipher shifts the letters of a message back by a constant amount. The word “Julius” becomes “Mxolxv” with a key shift of 3. 3 letters back from M is J, 3 letters back from x is u, etc.

This type of cipher is easy enough to figure out given enough time. If a message is long enough, code breakers can analyze the letter frequency to decrypt the Caesar cipher. If a “t” appears as frequently as the letter “e” does in the English language, then “e” was probably substituted with “t.” A more sophisticated cipher was needed. The Vigenère cipher was the solution.

In this cipher, letters do not always match one to one with another letter. The letter “e” could be replaced by “d” or “z” depending on its position. To account for position, a key word and a table of Caesar ciphers is used.

Suppose you want to encrypt the message “defend.” We will use the word “fly” as the key word. To start, we must “expand” the key word to equal the number of letters in the message. To do this, we simply repeat the letters of the word “fly” in order until we have the same number of letters in the word “defend.”

Message: DEFEND

Key: FLYFLY

In the following table, you can look up the letter of your encrypted text by finding the intersection of the row with the key letter and column with the message letter (or vice versa). We can see that “d” from the message and “f” from the key intersect at “i,” so this is the first letter of our encrypted message. We continue doing this for the remaining five letters. When we do this, our encrypted message is “ipdjyb.”

Notice how this method of encryption allows the letter “e” to be encrypted as both “p” and “j.” To decrypt the message, we simply do the reverse of encryption

Encrypted Message: IPDJYB

Key: FLYFLY

We look for the letter in row that contains the first letter of the expanded key: “f.” We continue along the row until we run into the first letter of the encrypted message: “i.” Finally, we go upward to the letter in the column, which is our decrypted letter “d.” We continue this for the remaining 5 letters.


This is quite tedious, so use a computer to make this process faster. Follow this link to encrypt and decrypt Vigenère ciphers without all the laborious work of referencing the table. Even though all Vigenère ciphers are encrypted and decrypted using the same table, the recipient must know the key word in order to decipher the message. Computers do cheapen this cipher because they have the capacity to try every word in the English language as a key until they decrypt something resembling a human message. Encryption techniques have since become far more complex in the war between code makers and code breakers. The turf of this war is now all on cyberspace, but using the old manual forms on encryption may still have a use: passing notes in class that a teacher cannot read.

Report this Content
This article has not been reviewed by Odyssey HQ and solely reflects the ideas and opinions of the creator.
Chandler Bing

I'm assuming that we've all heard of the hit 90's TV series, Friends, right? Who hasn't? Admittedly, I had pretty low expectations when I first started binge watching the show on Netflix, but I quickly became addicted.

Without a doubt, Chandler Bing is the most relatable character, and there isn't an episode where I don't find myself thinking, Yup, Iam definitely the Chandler of my friend group.

Keep Reading...Show less
eye roll

Working with the public can be a job, in and of itself. Some people are just plain rude for no reason. But regardless of how your day is going, always having to be in the best of moods, or at least act like it... right?

1. When a customer wants to return a product, hands you the receipt, where is printed "ALL SALES ARE FINAL" in all caps.

2. Just because you might be having a bad day, and you're in a crappy mood, doesn't make it okay for you to yell at me or be rude to me. I'm a person with feelings, just like you.

3. People refusing to be put on hold when a customer is standing right in front of you. Oh, how I wish I could just hang up on you!

Keep Reading...Show less
blair waldorf
Hercampus.com

RBF, or resting b*tch face, is a serious condition that many people suffer from worldwide. Suffers are often bombarded with daily questions such as "Are you OK?" and "Why are you so mad?" If you have RBF, you've probably had numerous people tell you to "just smile!"

While this question trend can get annoying, there are a couple of pros to having RBF.

Keep Reading...Show less
legally blonde
Yify

Another day, another Elle Woods comment. Can’t us blondes get through the day without someone harping at us over the typical stereotypes about who we are? I never understood why a person was judged based upon the hair color they were born with, or the hair color they choose to have (unless you dye your hair blue like Kylie Jenner, I’m still trying to understand why that’s a trend). Nevertheless, as it should be assumed, not everyone is the same. Not all blondes like bright colors and Lilly Pulitzer, and not all blondes claim to identify with Marilyn Monroe. I think the best suggestion to give to people before they make such radical claims is to stop judging a book by its cover. Or in this case, stop judging a blonde by her hair color.

Keep Reading...Show less
Entertainment

A Year At JMU As Told By 'Bob's Burgers'

The world's greatest university meets the world's greatest show.

1738
Bob's Burgers
collegian.com

A year at JMU promises many great adventures. The journey of becoming a duke and learning what being a duke is all about is really exciting and a lot of fun. Of course, we all know that James Madison University is the greatest university in Virginia (perhaps even the entire country). There are many events and moments at JMU that are cherished and remembered by all dukes.

Keep Reading...Show less

Subscribe to Our Newsletter

Facebook Comments