This substitution cipher would read: ZYXWVUTSRQPONMLKJIHGFEDCBA. This second alphabet is often referred to as the “ciphertext. ”
As an easy example, using this cipher, the word “CAT” reads “ZYQ. ”
When reading messages in Bacon’s Code, pause every 5 letters to decode the letter. For example, the message “AAABAAABAAABABBABABB ABBBBAABBBABBBAABBABAABAA” reads “CELL PHONE” Encrypt messages in Bacon’s code online at: https://mothereff. in/bacon.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Find a substitution cipher generator online at: http://substitution. webmasters. sk/simple-substitution-cipher. php. Access another viable site at: http://rumkin. com/tools/cipher/substitution. php.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. X Y Z & B C D E # G H I J K $ M N O P Q R @ T U = W. Using this cipher, the message “HOW ARE YOU” would read “E$T XOB =$R. ” If this is your first time creating (or using) a substitution cipher, you might want to skip this step.
Once you’re familiar with the encryption process, start encoding longer phrases or sentences. Online cipher encryption sites can make encoding full paragraphs much easier.
For example, say that you’re using the ciphertext in which you replaced each letter of the alphabet by the letter 3 before it. The English phrase “OPEN DOOR” when encoded in your ciphertext would read: “LMBK ALLO. ”
For example, let’s say that you’re still using the ciphertext that replaces standard alphabet letters with the letter 3 before them. If your friend passes you a code that reads “ZLLI EXQ. IRKZE PLLK?” you can use the cipher alphabet to decrypt it. You’ll discover that the message says “COOL HAT. LUNCH SOON?”