The second is thus translated—

“Nonsensical phrases and unmeaning combinations of words, as the learned lexicographer would have confessed himself, when hidden under cryptographic ciphers, serve to perpdex the curious enquirer, and baffle penetration more completely than would the most profound apothems of learned philosophers. Abstruse disquisitions of the scholiasts, were they but presented before him in the undisguised vocabulary of his mother tongue——”

The last sentence here (as will be seen) is broken off short. The spelling we have strictly adhered to. D, by mistake, has been put for l in perplex.

The key-phrase is—“Suaviter in modo, fortiter in re.”

In the ordinary cryptograph, as will be seen in reference to most of those we have specified above, the artificial alphabet agreed upon by the correspondents, is employed, letter for letter, in place of the usual or natural one. For example:—two parties wish to communicate secretly. It is arranged before parting that

)shall standfora
(—————b
—————c
*—————d
.—————e
—————f
;—————g
:—————h
?—————i or j
!—————k
&—————l
0—————m
—————n
—————o
—————p
—————q
#[[TN1]]—————r
>[—————s
[—————t
£—————u or v
$—————w
¿—————x
¡—————y
%[[TN2]]—————z

[TN1] Transcriber’s note: In the original publication of the magazine, the character used was a small right pointing hand, which is visible in the illustration of the crytograph below. Although a modern html version of this character exists, it will not display in many modern devices, depending on the capabilities of the device itself and the fonts available for use in the device. It has therefore been replaced in this list with #.
[TN2] Transcriber’s note: In the original publication of the magazine, the character used was a small left pointing hand. No suitable html character was found and even if available, the limitations of some modern devices and fonts prevents its use in this ebook. It has therefore been replaced in this list with %.

Now the following note is to be communicated—