Puzzle & Novelty Ciphers
Cryptographically weak. Historically fascinating. One predicted binary computing by 300 years.
Not every cipher was designed to win wars or protect state secrets. Some were tools of secret societies, some were intellectual exercises, and one was the difference between isolation and survival for prisoners of war. This hall honors ciphers whose significance lies not in their cryptographic strength but in their human story.
Bacon's remarkable insight (1605): Francis Bacon encoded his alphabet using only two symbols — A and B — arranged in groups of five. This is binary encoding. Shannon's information theory (1948) and digital computing both rest on exactly this idea. Bacon described it 343 years before the first digital computer ran.
Geometric symbols derived from two grids and two X-patterns represent the 26 letters. Used by Freemasons for lodge records, appearing in gravestones, letters, and documents across three centuries. George Washington's brothers used it. It's a monoalphabetic substitution cipher — broken by frequency analysis in minutes.
Sir Francis Bacon encoded the alphabet as 5-bit binary sequences (A=AAAAA, B=AAAAB…). Used steganographically: hide messages in printed text by using two slightly different typefaces — italic for B, normal for A. Cryptographically trivial. Historically profound: this is binary encoding, described 343 years before digital computing.
A 5×5 Polybius grid encoded as taps on walls, pipes, and floors. No materials. No equipment. American POWs in Korea and Vietnam used it to communicate between cells, coordinate resistance, and maintain command structure. Senator John McCain described it as essential to survival at the Hanoi Hilton.
The Zodiac Killer's 340-character cipher baffled the FBI, NSA, and amateur codebreakers for 51 years. In 2020, David Oranchak, Sam Blake, and Jarl Van Eycke finally cracked it — revealing a homophonic substitution with irregular transposition.
The Tap Code's real value: Every guard who knew the pattern could intercept tap code messages. The system was not cryptographically secure. But that wasn't the point. The Tap Code's value was human — it maintained communication, solidarity, and command structure among men in solitary confinement. Sometimes a cipher's purpose is not secrecy. It's connection.