Fig. 8.—The fractional cipher.
Adopting this method the word CIPHER therefore appears as in [Fig. 9]. As numerals above 5 do not appear in this cipher any more than does the figure 0, they can be added at will to complicate the appearance of the cryptogram, as shown in [Fig. 10], where the same word is shown with the addition of meaningless numerals.
| 1 | 2 | 4 | 2 | 1 | 4 |
| 3 | 4 | 1 | 3 | 5 | 3 |
Fig. 9.—The word
“cipher.”
| 10 | 29 | 43 | 28 | 10 | 47 |
| 38 | 40 | 16 | 39 | 56 | 39 |
Fig. 10.—Complicated
fractional cipher.
The Sphinx
Now to turn to more scientifically constructed ciphers, such as have been employed by various Governments in correspondence with their ambassadors and secret servants.
The Sphinx Cipher, shown in [Fig. 11], is based upon a key-word of six or seven letters, previously arranged by the parties concerned A key-alphabet is written in full at the top of the plan, and against each letter of the key-word a complete alphabet is written as shown in the figure.
| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
| B | b | c | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a |
| A | c | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b |
| L | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b | c |
| F | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b | c | d |
| O | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b | c | d | e |
| U | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b | c | d | e | f |
| R | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z | a | b | c | d | e | f | g |