72. By GALUPOLY.
LKMEGDIMJ, LHFABCGNKEF, LSNJJDI, LBMNKCJ, LBMEFJP MJR
LBTNIG GMVN RDSSDAXTK RNADLBNEDJI SCE AEFLKCIEMLBNE.
73. By SABIO.
WILD PANGRAMS RDMB ALCW EFFRRD HLFEM INJW. HAKNLLO
QLNTNW. INJW TFFRRD NIIRD UGUGVWG, WJGORTX RDMB
PAYWV XDOMAT ROZAVD.
74. By GINHUTS.
OLDMADE OVID SLATILK, ZLOMLX VWXYB, WERK SLMB LERVI,
NLI CLRO EVRS GKTV OTAHB ADGV TVWEY, YBLTO LISWR
RLDEWLEB.
75. By CIPHERMIT.
ABZYC DXXZBF, GYZBHVDX SZBHC, SGYBZTH VRZBS JKZBVXQ
FBZUB YDWZBY, WXZBYF, BZTRV WZBF, RDHCEBYMRZBS, FZBIB,
YBZHF, HBMEVZB; MRZBS YBVYZBIBF QZBXC.
76. By A. D. CODER.
ABCDEFB GHICD CJKLIC MNHHSJ OPCIQG MNJRBD PLFGSPLBR,
EILQ KICDTSCIR KICJRAC HL PLDRSJ GOFBBSIDQCNR.
77. By ROVING VIC.
MOCKMOCK ZPLY KPYO RSRI-RSRI FIPTSU FLIPFLIP. NERTS-NERTS
WICHWICH, SHPYSHPY TCYL, SILLSILL, MREX UPMD XRT.
APTS-ACTS WEPMWERM OLIREZU WPTRE MHIL.
78. By AMSCO.
ABWKGLWB ELTFTELHEG, SENGLMTUG FTELSABWKGLTF, LGBTGXGU
KHLCTHK DHTF BTOG HFATFH DGKESLTU.
79. By M. G. M.
ABCDECBFA, GHDIJKLF, HFBMD, NLHMO IEDHOBF OPPMGHR,
SMPDBIDBO UR VPHD, OMHGUMEONB, SPMDILFFEA.
80. By SIMPLICIUS.
VKJPE PBSCKZ RLHRTGM HJALCGSBR TLCG; RKPHCLRHM
NLMHGJCGAAKMBM; LIUJCGM NJCMJBH KQ CKZGPHM.
81. By KRIPTOBENS.

DYFR SWCX VHZS WMLB TMLB CZYO PHUT WKHT, JKOS
MOSY PHOB, NHTK IKAR AMLW WHCU, DUKT! LMSR LYZV
ECMQ XKOS, DMOT VHNK, VMLB, PUCK! VHDK YZKO, GHLB
UYVS! WHAT BOYS, YOUR LUCK!

82. By PHONEY.
ABCDE FEGHI, GEJBI; KLBGI MDCEH NDEST IEKRD DREIN
UMELV. TLHNR RGHBD HLWJI SRMHN, VESTI JHEKB, XBDJI
LDENB YRDIB; PDRGV ZRDSI, BKLWNI OEDJF WYBEN. CEGOF
EOLBM.
83. By ARROWHEAD.
ABCDEF GHIJK, LMN OPQR, STU VWXY. ZWHTAJ, FBIDEB
PEWCUH VHAXMP, HJQD BHXEJ XHUTA, EQGIF GTJE IHWREJMP.
84. By THE GRIFFIN.
TWDOIUESMA DMPOIREXYK TRXAWEKMLI XRYMUOLSED AMIEXKUGNO
MUTRYOLSDH YMKAGRXEIO GZPRKAESOY WHTOXZGDMA TDEHBXMIWS.
85. By SOUR PUSS.
OYESK PACHYDERMS AOPFL UXFD MHZOY XFBR PLMBS OZPL.
ZUFPLBAGH LBYCF QZDYPX YDLM GZQFBD ADLYJ RZUD.
86. By LIVEDEVIL.
PREVIOUSLY BDACL YOEL YFOCG, FLHCY, EHJJPOVLB GHKRCL,
UCOFMJ APCR EONQ MOIQCHBAPJ.
87. By NEOTERIC.
RXUGUZLQTVFR, CNSQRLQTVFR OTDALN RB MVFTQQRX QSTQ.
TFXUTSLCGSFZJ FTVXLVQNZ FTOSQ GUFLVOU DRTQDRX TRF.
88. By ZERO.
KROLGDB FURZGV ZDWFK BRXWKV VSULQW DORQJ GLUW WUDFN.
VZDUWKB FXEDQ MXQLRU MXELODQWOB ZLQV.
89. By JOKEL.
JPLX VUNKOM MLKDUB FUGHVP VKHCX VUPD FWHMVP; LQUMDPBV,
VWJKPLMNB; ULKFUGIKB, QKDHGP; VUXPLCMJ, AMJPVUD.
90. By LEE ANDER.
CLOUDY BERG-SLHVEC BECTR, UI BECT, FVRAKMY MGRAK-HVEC
BUDNR-VRGL BUZCLI EY BDAAEDA. NEKYDNLC; GEESE PUNFUY;
BETT ESTDNLC.

91. By TRYIT.
LSYKCTLSTRYITAB, MCDSLMLE, ZSRBWLX IUOLSC UWLAC BMTUZYLAB
YRUYHU GTKVBC KPMDSCASWUWVD PLANKX UCLM WSKCHBXU WVUBCB
VUITSRPLBD STUMBLER JSLP BHLMDVXU.
92. By DIZZY.
ABCDEFG, DZEIBJK LMFDBCN, MNTLYEA PRZBGSF TSBIURP
IECLSBJ, UKFIZBS, PNFLARB; EVLKZRO PWELMBK VTXPLNZ
TPXOBZG.
93. By ZANYCODAB.
ODZNERITFNM VNDRR BNOFDSK PNIODRHE EVMCDTIS EVANZTOS
FNQRZO HCRI PVEOHE. RZROHIK, URFRES CNISLVZTF AZSBE
HGAZNLS. QNCTK OZRUNI ASFRGSE GTERLVITEO.
94. By I. D. CIPHER.
JBMDVKJVMBTD AWTHVQBLTQV VGLBQWFXH FXBJWTHVQNM VCWYBLGX.
BDGWCDWKZ, DKWYFWKMB RNMBJCDPCY, GZCBQWFDP.
95. By NEON.
CDFGH, JHKLM NPQLR, SDTVW XMZDW PATVF LRXBV CDTWE
QRIGH. TKHFO XRDIP NHILW EFDQL, JMUVW MRPES, VHFAW
NRAPW.
96. By TWISTO.
FJKXZA, ETXZQ, ZCHUQP QPZUF, ZLLKUPTW QBTJPZ EDGN,
PQZM BTJMN QPZDU, MTUIWXJ ZXGJUW ZPFEWU DUQBTW
IBTQUWHJX.
97. By NUMERO.
BCBDBEBFC GHIBEK UGVBQW BRWPF OPFQR STDGPBQ -- EFHIKA
YBQWYTZW BLGUGZR LKFQCGZUZGTHCYKZI.
98. By WHIZZ BANG.
PGZPAPBPGZP? AZFHIDEPXOA AFISTP YOEN BPYC PBFISX PJDOBK
PKLPOT. BWXDYOPA AFEYWI LOIN BFKTDEOP TWRI WFDI. BWLF
BLPZR ESPAD HZDJOBWK ZWHPKI.
99. By INVICTUS.
PDOKX ZEVR MOLTA. MPNDR-NEX NPKWTM FACHX PSGTLUR
PGPGEVU CPUFAD. CZBPAQEUTCV TAMR TAOLPG BPVUC. HAEUWD
KONRUYC RBENZCMR MVEYOR.

CHAPTER XI
Simple Substitution with Complexities

Concerning the numberless variations and complications which have been applied to the simple substitution cipher, our discussion here will have to be along general lines, with perhaps a brief mention of some analytical principle. Decryptment, for the most part, involves no principles other than those already discussed, and can only be demonstrated on very long texts. All such ciphers, however, will yield readily to the “probable word method,” and the student, in considering each case, should not lose sight of the one method which applies equally to all.