Puzzle & Novelty Ciphers
Cryptographically weak. Historically fascinating. One predicted binary computing by 300 years.
Not every cipher was designed to win wars or protect state secrets. Some were tools of secret societies, some were intellectual exercises, and one was the difference between isolation and survival for prisoners of war. This hall honors ciphers whose significance lies not in their cryptographic strength but in their human story.
Looking for the museum's open mysteries? The major unsolved historical exhibits that once crowded this hall — Voynich, Beale, Dorabella, and Kryptos — now live together in Hall XII: Unsolved Ciphers, where the museum can present them as active research problems rather than novelty pieces.
Bacon's remarkable insight (1605): Francis Bacon encoded his alphabet using only two symbols — A and B — arranged in groups of five. This is binary encoding. Shannon's information theory (1948) and digital computing both rest on exactly this idea. Bacon described it 343 years before the first digital computer ran.
Geometric symbols derived from two grids and two X-patterns represent the 26 letters. Used by Freemasons for lodge records, appearing in gravestones, letters, and documents across three centuries. George Washington's brothers used it. It's a monoalphabetic substitution cipher — broken by frequency analysis in minutes.
Sir Francis Bacon encoded the alphabet as 5-bit binary sequences (A=AAAAA, B=AAAAB…). Used steganographically: hide messages in printed text by using two slightly different typefaces — italic for B, normal for A. Cryptographically trivial. Historically profound: this is binary encoding, described 343 years before digital computing.
A 5×5 Polybius grid encoded as taps on walls, pipes, and floors. No materials. No equipment. American POWs in Korea and Vietnam used it to communicate between cells, coordinate resistance, and maintain command structure. Senator John McCain described it as essential to survival at the Hanoi Hilton.
The Zodiac Killer's 340-character cipher baffled the FBI, NSA, and amateur codebreakers for 51 years. In 2020, David Oranchak, Sam Blake, and Jarl Van Eycke finally cracked it — revealing a homophonic substitution with irregular transposition.
A 105-page bound manuscript in Roman letters, Greek letters, and abstract symbols. Sat unsolved in an East German archive for 250 years. In 2011 a USC/Uppsala team — Kevin Knight, Beata Megyesi, Christiane Schaefer — cracked it with statistical attacks borrowed from machine translation. The plaintext: initiation rites of an 18th-century German oculist secret society.
The 1994 claim that equidistant letter sequences in Hebrew Genesis encode prophecies of modern events. Refuted statistically in 1999: the same method finds identical “predictions” in Moby-Dick and War and Peace. A rigorous lesson in multiple comparisons, the Texas Sharpshooter Fallacy, and why “pattern found” never equals “pattern significant.”
The Tap Code's real value: Every guard who knew the pattern could intercept tap code messages. The system was not cryptographically secure. But that wasn't the point. The Tap Code's value was human — it maintained communication, solidarity, and command structure among men in solitary confinement. Sometimes a cipher's purpose is not secrecy. It's connection.