Codes and Ciphers continued.

Page 2

We could use Steganography. This is the act of actually hiding of a message to keep it secret. Whether it is encrypted or not does not matter so much if no-one knows it exists. This word comes from the Greek 'steganos' meaning 'covered' & 'graphein' meaning 'to write'.

Herodotus (484-425BC) seems to be about as far back as we have discovered early secret writings. He lived in the fifth century BC and he stated that the art of secret writing was what saved Greece from being conquered by Xerxes (520-465BC), the king of Persia.

Another example of Steganography is the microdot used in the second world war or invisible ink that can be made out of a mixture of 1oz of alum and a pint of vinegar and used to write on hard boiled eggs, or the 'milk' of the thithymallus plant. This dries invisible, but shows with gentle heating as does urine or many other carbon rich liquids.

Cryptography can be sub-divided into two branches. These are known as 'transposition' and 'substitution'. Transposition is effectively an anagram of the original word of message. This is quite a difficult thing to convert back if the process is done in a random way. For instance if a 35 letter message where to be scrambled in this way it would result in a 5x10ˆ31 possible different ciphers. This would take the entire population of earth, translating one possible cipher every second 1,000 times the lifetime of the universe to check every possible arrangement and in the process turn up many different possible and meaningful sentences. It would not only be impossible to unscramble, but also impossible to decide which one of the many unscramblings was the correct one.

Substitution is when each letter is changed for another in an organised way. The Caesar substitution cypher is one of the most well known. This shifts all the letters a certian amount of spaces, so if this was a move of 4, then A would become E and so on. With the discovery of language analysis, and general letter distribution, it became quite easy to decypher this type of encryption, however, it can be made more secure by using a Vigenère cypher. This is so named after the French person Blaise de Vigenère. He would use a grid with the letters moved over in each row by one more place than the previous row. He would then use a word or sentence to decide on which character the cypher text would use, thus each character would have a different row used to transpose the letter to its cypher equivalent.

The example below shows the word 'Hello' being encyphered using the key word 'Greeting' (this is not the best key to use as it has a double e in it. On a long message, it would be good to use a passage from a book or article). This results in the cyphertext of 'NVPPH'

Vigenere Square.
Basic Vigenere Cypher Square.

If you have any questions or would like to add something, contribute or suggest a correction about anything on this site or have any other related questions, you can e-Mail me at;

Questions To ask me general questions. I cannot guarantee to answer within a specified period of time or personally, but I will post your questions and answers to these on the contributions page from time to time.

Contributions If you have something you think would be useful to others and would like to share it here. Again I will post these, giving full credit to the author, on the contributions page

More content and detail is being added to this site all the time. Check back regularly to see what's new.


Some pictures while you wait


Bury Knowle Park, Headington, Oxford after a severe frost. A robin in a tree after a severe frost. A frosty field. Bury Knowle Park, Headington, Oxford after a severe frost. A blackbird in a tree after a severe frost. A fish nearly frozen.
Pictures taken on the 12th of December 2012, after a severe overnight frost hit most of England.







  • All pictures displayed on this site were taken by or are fully owned by me.
  • This site has been upgraded to use HTML5 and should be backward compatible with older browsers. If you think any pages are not displaying correctly contact the site author here.
  • This site uses Java script to maintain compatibility. To view this site correctly, you should allow scripts and ActiveX controls to run.
  • If you don't feel easy or competent changing the security settings and you are willing to trust that my site is not going to harm your computer, then add my site to your trusted sites zone. To stop the Script and ActiveX controls prompt from appearing everytime you access this page, you should also tick the option to 'Allow active content to run in files on My Computer' in the security section of the security tab of the Internet Options dialog box. This can be accessed from the tools menu.
  • Although I have upgraded this site to support the new HTML5, I am still a learner myself. If you have any tips you would like to share with me and the visitors to this site, I will gladly add your contributions to the contributions pages.

copyright 2012-2013 Stephen Edgington.