Worthie Sir John:—Hope, that is ye best comport of ye afflictyd, cannot much, I fear me, help you now. That I wolde saye to you, is this only: if ever I may be able to requite that I do owe you, stand not upon asking of me. ’Tis not much I can do; but what I can do, bee verie sure I wille. I knowe that, if dethe comes, if ordinary men fear it, it frights not you, accounting it for a high honour, to have such a rewarde of your loyalty. Pray yet that you may be spared this soe bitter, cup. I fear not that you will grudge any sufferings; only if it bie submission you can turn them away, ’tis the part of a wise man. Tell me, an if you can, to do for you any thinge that you would have done. The general goes back on Wednesday. Restinge your servant to command.

R. T.

Now this letter was written according to a preconcerted cipher. Every third letter after a stop was to tell. In this way Sir John made out—“Panel at east end of chapel slides.” On the following even, the prisoner begged to be allowed to pass an hour of private devotion in the chapel. By means of a bribe, this was accomplished. Before the hour had expired, the chapel was empty—the bird had flown.

An excellent plan of indicating the telling letter or words is through the heading of the letter. “Sir,” would signify that every third letter was to be taken; “Dear Sir,” that every seventh; “My dear sir,” that every ninth was to be selected. A system, very early adopted, was that of having pierced cards, through the holes of which the communication was written. The card was then removed, and the blank spaces filled up. As for example:—

My dear X.—[The] lines I now send you are forwarded by the kindness of the [Bearer], who is a friend. [Is not] the message delivered yet [to] my brother? [Be] quick about it, for I have all along [trusted] that you would act with discretion and dispatch.

Yours ever,       Z.

Put your card over the note, and through the piercings you will read: “The Bearer is not to be trusted.”

Poe, in his story of “The Gold Bug,” gives some valuable hints on the interpretation of the most common cryptographs. He contends that the ingenuity of man can construct no enigma which the ingenuity of man cannot unravel. And he actually read several very difficult ciphers which were sent to him after the publication of “The Gold Bug.”

But we saw, several years ago, a method which makes the message absolutely safe from detection. We will try to describe it.

Take a square sheet of paper of convenient size, say a foot square. Divide it by lines drawn at right angles into five hundred and seventy-six squares, twenty-six each way; in the upper horizontal row write the alphabet in its natural order, one letter in each square; in the second horizontal row write the alphabet, beginning with B. There will then be one square left at the end of this row; into this put A. Fill the third row by beginning with C, and writing A and B after Z at the end. So on until the whole sheet is filled. When completed, the table, if correct, will present this appearance. In the upper horizontal row, the alphabet in its natural order from left to right; in the left-hand vertical row, the same from top to bottom; and the diagonal, from upper right to lower left-hand corner, will be a line of Z’s.