0% found this document useful (0 votes)
568 views

Substitution Cipher

1. A substitution cipher replaces units of plaintext (such as letters) with ciphertext according to a fixed system. The receiver deciphers the text by performing the inverse substitution. 2. Simple substitution ciphers use a single fixed alphabet for the entire message. These ciphers are weak and can be broken using frequency analysis of the ciphertext letters. 3. Homophonic substitution ciphers aim to strengthen simple ciphers by mapping plaintext letters to multiple ciphertext symbols to flatten frequency analysis. This involves using larger alphabets such as numbers or invented symbols. Nomenclators combined codebooks with large substitution tables and remained in use for diplomatic correspondence into the late 18th century.

Uploaded by

phaulus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
568 views

Substitution Cipher

1. A substitution cipher replaces units of plaintext (such as letters) with ciphertext according to a fixed system. The receiver deciphers the text by performing the inverse substitution. 2. Simple substitution ciphers use a single fixed alphabet for the entire message. These ciphers are weak and can be broken using frequency analysis of the ciphertext letters. 3. Homophonic substitution ciphers aim to strengthen simple ciphers by mapping plaintext letters to multiple ciphertext symbols to flatten frequency analysis. This involves using larger alphabets such as numbers or invented symbols. Nomenclators combined codebooks with large substitution tables and remained in use for diplomatic correspondence into the late 18th century.

Uploaded by

phaulus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Substitution cipher

In cryptography, a substitution cipher is a method of alphabet. Traditionally, mixed alphabets may be created
encoding by which units of plaintext are replaced with by rst writing out a keyword, removing repeated letters
ciphertext, according to a xed system; the units may be in it, then writing all the remaining letters in the alphabet
single letters (the most common), pairs of letters, triplets in the usual order.
of letters, mixtures of the above, and so forth. The re-
Using this system, the keyword zebras gives us the fol-
ceiver deciphers the text by performing the inverse sub- lowing alphabets:
stitution.
A message of
Substitution ciphers can be compared with transposition
ciphers. In a transposition cipher, the units of the plain- ee at once. we are discovered!
text are rearranged in a dierent and usually quite com- enciphers to
plex order, but the units themselves are left unchanged.
By contrast, in a substitution cipher, the units of the plain- SIAA ZQ LKBA. VA ZOA RFPBLUAOAR!
text are retained in the same sequence in the ciphertext, Traditionally, the ciphertext is written out in blocks of
but the units themselves are altered. xed length, omitting punctuation and spaces; this is done
There are a number of dierent types of substitution ci- to help avoid transmission errors and to disguise word
pher. If the cipher operates on single letters, it is termed boundaries from the plaintext. These blocks are called
a simple substitution cipher; a cipher that operates groups, and sometimes a group count (i.e., the num-
on larger groups of letters is termed polygraphic. A ber of groups) is given as an additional check. Five-letter
monoalphabetic cipher uses xed substitution over the groups are traditional, dating from when messages used
entire message, whereas a polyalphabetic cipher uses a to be transmitted by telegraph:
number of substitutions at dierent positions in the mes- SIAAZ QLKBA VAZOA RFPBL UAOAR
sage, where a unit from the plaintext is mapped to one of
If the length of the message happens not to be divisible
several possibilities in the ciphertext and vice versa.
by ve, it may be padded at the end with "nulls". These
can be any characters that decrypt to obvious nonsense,
so the receiver can easily spot them and discard them.
1 Simple substitution
The ciphertext alphabet is sometimes dierent from the
plaintext alphabet; for example, in the pigpen cipher, the
ciphertext consists of a set of symbols derived from a grid.
For example:

X MA R K S T H E S P OT
Such features make little dierence to the security of a
scheme, however at the very least, any set of strange
symbols can be transcribed back into an A-Z alphabet
and dealt with as normal.
In lists and catalogues for salespeople, a very simple en-
cryption is sometimes used to replace numeric digits by
ROT13 is a Caesar cipher, a type of substitution cipher. In letters.
ROT13, the alphabet is rotated 13 steps. Example: MAT would be used to represent 120.

Substitution of single letters separatelysimple substi-


tutioncan be demonstrated by writing out the alphabet
in some order to represent the substitution. This is termed 1.1 Security for simple substitution ci-
a substitution alphabet. The cipher alphabet may be phers
shifted or reversed (creating the Caesar and Atbash ci-
phers, respectively) or scrambled in a more complex fash- A disadvantage of this method of derangement is that
ion, in which case it is called a mixed alphabet or deranged the last letters of the alphabet (which are mostly low fre-

1
2 2 HOMOPHONIC SUBSTITUTION

quency) tend to stay at the end. A stronger way of con- An early attempt to increase the diculty of frequency
structing a mixed alphabet is to perform a columnar trans- analysis attacks on substitution ciphers was to disguise
position on the ordinary alphabet using the keyword, but plaintext letter frequencies by homophony. In these ci-
this is not often done. phers, plaintext letters map to more than one ciphertext
Although the number of possible keys is very large (26! symbol. Usually, the highest-frequency plaintext symbols
288.4 , or about 88 bits), this cipher is not very strong, are given more equivalents than lower frequency letters.
and is easily broken. Provided the message is of reason- In this way, the frequency distribution is attened, mak-
able length (see below), the cryptanalyst can deduce the ing analysis more dicult.
probable meaning of the most common symbols by ana- Since more than 26 characters will be required in the ci-
lyzing the frequency distribution of the ciphertext. This phertext alphabet, various solutions are employed to in-
allows formation of partial words, which can be tenta- vent larger alphabets. Perhaps the simplest is to use a
tively lled in, progressively expanding the (partial) solu- numeric substitution 'alphabet'. Another method consists
tion (see frequency analysis for a demonstration of this). of simple variations on the existing alphabet; uppercase,
In some cases, underlying words can also be determined lowercase, upside down, etc. More artistically, though
from the pattern of their letters; for example, attract, not necessarily more securely, some homophonic ciphers
osseous, and words with those two as the root are the employed wholly invented alphabets of fanciful symbols.
only common English words with the pattern ABBCADB. One variant is the nomenclator. Named after the public
Many people solve such ciphers for recreation, as with ocial who announced the titles of visiting dignitaries,
cryptogram puzzles in the newspaper. this cipher combines a small codebook with large ho-
According to the unicity distance of English, 27.6 let- mophonic substitution tables. Originally the code was
ters of ciphertext are required to crack a mixed alphabet restricted to the names of important people, hence the
simple substitution. In practice, typically about 50 letters name of the cipher; in later years it covered many com-
are needed, although some messages can be broken with mon words and place names as well. The symbols for
fewer if unusual patterns are found. In other cases, the whole words (codewords in modern parlance) and letters
plaintext can be contrived to have a nearly at frequency (cipher in modern parlance) were not distinguished in the
distribution, and much longer plaintexts will then be re- ciphertext. The Rossignols' Great Cipher used by Louis
quired by the cryptanalyst. XIV of France was one.
Nomenclators were the standard fare of diplomatic corre-
spondence, espionage, and advanced political conspiracy
2 Homophonic substitution from the early fteenth century to the late eighteenth
century; most conspirators were and have remained less
cryptographically sophisticated. Although government
intelligence cryptanalysts were systematically breaking
nomenclators by the mid-sixteenth century, and superior
systems had been available since 1467, the usual response
to cryptanalysis was simply to make the tables larger. By
the late eighteenth century, when the system was begin-
ning to die out, some nomenclators had 50,000 symbols.
Nevertheless, not all nomenclators were broken; today,
cryptanalysis of archived ciphertexts remains a fruitful
area of historical research.
The Beale ciphers are another example of a homophonic
cipher. This is a story of buried treasure that was de-
scribed in 181921 by use of a ciphered text that was
keyed to the Declaration of Independence. Here each
ciphertext character was represented by a number. The
number was determined by taking the plaintext character
and nding a word in the Declaration of Independence
that started with that character and using the numerical
position of that word in the Declaration of Independence
as the encrypted form of that letter. Since many words
in the Declaration of Independence start with the same
letter, the encryption of that character could be any of
the numbers associated with the words in the Declaration
of Independence that start with that letter. Deciphering
The forged nomenclator message used in the Babington Plot the encrypted text character X (which is a number) is as
3

simple as looking up the Xth word of the Declaration of der 'A', the third under 'T', the fourth under 'C' again, and
Independence and using the rst letter of that word as the so on. In practice, Vigenre keys were often phrases sev-
decrypted character. eral words long.
Another homophonic cipher was described by Stahl[2][3] In 1863, Friedrich Kasiski published a method (prob-
and was one of the rst attempts to provide for computerably discovered secretly and independently before the
security of data systems in computers through encryption.
Crimean War by Charles Babbage) which enabled the
Stahl constructed the cipher in such a way that the number
calculation of the length of the keyword in a Vigenre
of homophones for a given character was in proportion ciphered message. Once this was done, ciphertext let-
to the frequency of the character, thus making frequencyters that had been enciphered under the same alphabet
analysis much more dicult. could be picked out and attacked separately as a number
The book cipher and straddling checkerboard are types of semi-independent simple substitutions - complicated
of homophonic cipher. by the fact that within one alphabet letters were separated
and did not form complete words, but simplied by the
Francesco I Gonzaga, Duke of Mantua, used the earliest fact that usually a tabula recta had been employed.
known example of a homophonic substitution cipher in
1401 for correspondence with one Simone de Crema.[4][5] As such, even today a Vigenre type cipher should theo-
retically be dicult to break if mixed alphabets are used
in the tableau, if the keyword is random, and if the total
length of ciphertext is less than 27.67 times the length of
3 Polyalphabetic substitution the keyword.[6] These requirements are rarely understood
in practice, and so Vigenre enciphered message security
Main article: Polyalphabetic cipher is usually less than might have been.
Other notable polyalphabetics include:
Polyalphabetic substitution ciphers were rst described
in 1467 by Leone Battista Alberti in the form of The Gronsfeld cipher. This is identical to the Vi-
disks. Johannes Trithemius, in his book Steganographia genre except that only 10 alphabets are used, and
(Ancient Greek for hidden writing) introduced the now so the keyword is numerical.
more standard form of a tableau (see below; ca. 1500
but not published until much later). A more sophisticated The Beaufort cipher. This is practically the same
version using mixed alphabets was described in 1563 by as the Vigenre, except the tabula recta is replaced
Giovanni Battista della Porta in his book, De Furtivis Lit- by a backwards one, mathematically equivalent to
erarum Notis (Latin for On concealed characters in writ- ciphertext = key - plaintext. This operation is self-
ing). inverse, whereby the same table is used for both en-
cryption and decryption.
In a polyalphabetic cipher, multiple cipher alphabets are
used. To facilitate encryption, all the alphabets are usu- The autokey cipher, which mixes plaintext with a
ally written out in a large table, traditionally called a key to avoid periodicity.
tableau. The tableau is usually 2626, so that 26 full ci-
phertext alphabets are available. The method of lling The running key cipher, where the key is made very
the tableau, and of choosing which alphabet to use next, long by using a passage from a book or similar text.
denes the particular polyalphabetic cipher. All such ci-
phers are easier to break than once believed, as substi- Modern stream ciphers can also be seen, from a su-
tution alphabets are repeated for suciently large plain- ciently abstract perspective, to be a form of polyalpha-
texts. betic cipher in which all the eort has gone into making
One of the most popular was that of Blaise de Vigenre. the keystream as long and unpredictable as possible.
First published in 1585, it was considered unbreakable
until 1863, and indeed was commonly called le chire in-
dchirable (French for indecipherable cipher). 4 Polygraphic substitution
In the Vigenre cipher, the rst row of the tableau is lled
out with a copy of the plaintext alphabet, and successive In a polygraphic substitution cipher, plaintext letters are
rows are simply shifted one place to the left. (Such a substituted in larger groups, instead of substituting let-
simple tableau is called a tabula recta, and mathemati- ters individually. The rst advantage is that the frequency
cally corresponds to adding the plaintext and key letters, distribution is much atter than that of individual letters
modulo 26.) A keyword is then used to choose which ci- (though not actually at in real languages; for example,
phertext alphabet to use. Each letter of the keyword is 'TH' is much more common than 'XQ' in English). Sec-
used in turn, and then they are repeated again from the ond, the larger number of symbols requires correspond-
beginning. So if the keyword is 'CAT', the rst letter of ingly more ciphertext to productively analyze letter fre-
plaintext is enciphered under alphabet 'C', the second un- quencies.
4 6 THE ONE-TIME PAD

To substitute pairs of letters would take a substitution al- Enigma, especially in the versions used by the German
phabet 676 symbols long ( 262 = 676 ). In the same military from approximately 1930. The Allies also de-
De Furtivis Literarum Notis mentioned above, della Porta veloped and used rotor machines (e.g., SIGABA and
actually proposed such a system, with a 20 x 20 tableau Typex).
(for the 20 letters of the Italian/Latin alphabet he was us- All of these were similar in that the substituted letter
ing) lled with 400 unique glyphs. However the system was chosen electrically from amongst the huge number
was impractical and probably never actually used. of possible combinations resulting from the rotation of
The earliest practical digraphic cipher (pairwise substi- several letter disks. Since one or more of the disks ro-
tution), was the so-called Playfair cipher, invented by Sir tated mechanically with each plaintext letter enciphered,
Charles Wheatstone in 1854. In this cipher, a 5 x 5 grid the number of alphabets used was substantially more than
is lled with the letters of a mixed alphabet (two letters, astronomical. Early versions of these machine were, nev-
usually I and J, are combined). A digraphic substitution is ertheless, breakable. William F. Friedman of the US
then simulated by taking pairs of letters as two corners of Armys SIS early found vulnerabilities in Heberns rotor
a rectangle, and using the other two corners as the cipher- machine, and GC&CS's Dillwyn Knox solved versions of
text (see the Playfair cipher main article for a diagram). the Enigma machine (those without the plugboard) well
Special rules handle double letters and pairs falling in the before WWII began. Trac protected by essentially all
same row or column. Playfair was in military use from of the German military Enigmas was broken by Allied
the Boer War through World War II. cryptanalysts, most notably those at Bletchley Park, be-
Several other practical polygraphics were introduced in ginning with the German Army variant used in the early
1901 by Felix Delastelle, including the bid and four- 1930s. This version was broken by inspired mathematical
square ciphers (both digraphic) and the trid cipher insight by Marian Rejewski in Poland.
(probably the rst practical trigraphic). No messages protected by the SIGABA and Typex ma-
The Hill cipher, invented in 1929 by Lester S. Hill, chines were ever, so far as is publicly known, broken.
is a polygraphic substitution which can combine much
larger groups of letters simultaneously using linear alge-
bra. Each letter is treated as a digit in base 26: A = 0, B
=1, and so on. (In a variation, 3 extra symbols are added
to make the basis prime.) A block of n letters is then con-
6 The one-time pad
sidered as a vector of n dimensions, and multiplied by a
n x n matrix, modulo 26. The components of the matrix Main article: One-time pad
are the key, and should be random provided that the ma-
trix is invertible in Zn26 (to ensure decryption is possible).
One type of substitution cipher, the one-time pad, is quite
A mechanical version of the Hill cipher of dimension 6
[7] special. It was invented near the end of World War I by
was patented in 1929.
Gilbert Vernam and Joseph Mauborgne in the US. It was
The Hill cipher is vulnerable to a known-plaintext attack mathematically proven unbreakable by Claude Shannon,
because it is completely linear, so it must be combined probably during World War II; his work was rst pub-
with some non-linear step to defeat this attack. The com- lished in the late 1940s. In its most common implementa-
bination of wider and wider weak, linear diusive steps tion, the one-time pad can be called a substitution cipher
like a Hill cipher, with non-linear substitution steps, ulti- only from an unusual perspective; typically, the plaintext
mately leads to a substitution-permutation network (e.g. letter is combined (not substituted) in some manner (e.g.,
a Feistel cipher), so it is possible from this extreme per- XOR) with the key material character at that position.
spective to consider modern block ciphers as a type of
The one-time pad is, in most cases, impractical as it re-
polygraphic substitution.
quires that the key material be as long as the plaintext, ac-
tually random, used once and only once, and kept entirely
secret from all except the sender and intended receiver.
5 Mechanical substitution ciphers When these conditions are violated, even marginally, the
one-time pad is no longer unbreakable. Soviet one-time
Between circa World War I and the widespread availabil- pad messages sent from the US for a brief time during
ity of computers (for some governments this was approx- World War II used non-random key material. US crypt-
imately the 1950s or 1960s; for other organizations it was analysts, beginning in the late 40s, were able to, entirely
a decade or more later; for individuals it was no ear- or partially, break a few thousand messages out of several
lier than 1975), mechanical implementations of polyal- hundred thousand. (See Venona project)
phabetic substitution ciphers were widely used. Several In a mechanical implementation, rather like the Rockex
inventors had similar ideas about the same time, and equipment, the one-time pad was used for messages sent
rotor cipher machines were patented four times in 1919. on the Moscow-Washington hot line established after the
The most important of the resulting machines was the Cuban missile crisis.
5

7 Substitution in modern cryptog- of the opening sequence), an Atbash cipher, or a


letter-to-number simple substitution cipher. The
raphy season 1 nale encodes a message with all three.
In the second season, Vigenre ciphers are used in
Substitution ciphers as discussed above, especially the place of the various monoalphabetic ciphers, each
older pencil-and-paper hand ciphers, are no longer in using a key hidden within its episode.
serious use. However, the cryptographic concept of
substitution carries on even today. From a suciently In the Artemis Fowl series by Eoin Colfer there are
abstract perspective, modern bit-oriented block ciphers three substitution ciphers; Gnommish, Centaurean
(e.g., DES, or AES) can be viewed as substitution ci- and Eternean, which run along the bottom of the
phers on an enormously large binary alphabet. In ad- pages or are somewhere else within the books.
dition, block ciphers often include smaller substitution
In Bitterblue, the third novel by Kristin Cashore, sub-
tables called S-boxes. See also substitution-permutation
stitution ciphers serve as an important form of coded
network.
communication.

In the 2013 video game BioShock Innite, there are


8 Substitution ciphers in popular substitution ciphers hidden throughout the game in
which the player must nd code books to help deci-
culture pher them and gain access to a surplus of supplies.

Sherlock Holmes breaks a substitution cipher in In the anime adaptation of The Devil Is a Part-
"The Adventure of the Dancing Men". There, Timer!, the language of Ente Isla, called Entean,
the cipher remained undeciphered for years if not uses a substitution cipher with the ciphertext alpha-
decades; not due to its diculty, but because no bet AZYXEWVTISRLPNOMQKJHUGFDCB,
one suspected it to be a code, instead considering leaving only A, E, I, O, U, L, N, and Q in their
it childish scribblings. original positions.

The Al Bhed language in Final Fantasy X is actu-


ally a substitution cipher, although it is pronounced 9 See also
phonetically (i.e. you in English is translated to
oui in Al Bhed, but is pronounced the same way
that oui is pronounced in French). Ban (unit) with Centiban Table

Copiale cipher
The Minbari's alphabet from the Babylon 5 series is
a substitution cipher from English. Dvorak encoding
The language in Starfox Adventures: Dinosaur Leet
Planet spoken by native Saurians and Krystal is also
a substitution cipher of the English alphabet. Vigenre cipher

The television program Futurama contained a sub- Topics in cryptography


stitution cipher in which all 26 letters were replaced
by symbols and called Alien Language. This was
deciphered rather quickly by the die hard viewers by 10 References
showing a Slurm ad with the word Drink in both
plain English and the Alien language thus giving the [1] David Crawford / Mike Esterl, At Siemens, witnesses
key. Later, the producers created a second alien lan- cite pattern of bribery, The Wall Street Journal, January
guage that used a combination of replacement and 31, 2007: Back at Munich headquarters, he [Michael
mathematical Ciphers. Once the English letter of Kutschenreuter, a former Siemens-Manager] told prose-
the alien language is deciphered, then the numerical cutors, he learned of an encryption code he alleged was
value of that letter (0 for A through 25 for Z re- widely used at Siemens to itemize bribe payments. He
spectively) is then added (modulo 26) to the value of said it was derived from the phrase Make Prot, with
the previous letter showing the actual intended let- the phrases 10 letters corresponding to the numbers 1-2-
3-4-5-6-7-8-9-0. Thus, with the letter A standing for 2
ter. These messages can be seen throughout every
and P standing for 5, a reference to le this in the APP
episode of the series and the subsequent movies. le meant a bribe was authorized at 2.55 percent of sales.
- A spokesman for Siemens said it has no knowledge of a
At the end of every season 1 episode of the car-
Make Prot encryption system.
toon series Gravity Falls, during the credit roll, there
is one of three simple substitution ciphers: A 3 [2] Stahl, Fred A., On Computational Security, University of
Caesar cipher (hinted by 3 letters back at the end Illinois, 1974
6 11 EXTERNAL LINKS

[3] Stahl, Fred A. "A homophonic cipher for computational


cryptography", aps, pp. 565, 1973 Proceedings of the
National Computer Conference, 1973

[4] David Salomon. Coding for Data and Computer Commu-


nications. Springer, 2005.

[5] Fred A. Stahl. "A homophonic cipher for computational


cryptography" Proceedings of the national computer con-
ference and exposition (AFIPS '73), pp. 123126, New
York, USA, 1973.

[6] Toemeh, Ragheb (2014). Certain investigations in


Cryptanalysis of classical ciphers Using genetic algo-
rithm. Shodhganga.

[7] Message Protector patent US1845947. February 14,


1929. Retrieved November 9, 2013.

11 External links
quipqiup An automated tool for solving simple sub-
stitution ciphers both with and without known word
boundaries.
CrypTool Exhaustive free and open-source e-
learning tool to perform and break substititution ci-
phers and many more.

Substitution Cipher Toolkit Application that can -


amongst other things - decrypt texts encrypted with
substitution cipher automatically
SCB Cipher Solver A monoalphabetic cipher
cracker.
Monoalphabetic Cipher Implementation for En-
crypting File (C Language).
Substitution cipher implementation with Caesar and
Atbash ciphers (Java)
Online simple substitution implementation (Flash)

Online simple substitution implementation for


MAKEPROFIT code (CGI script: Set input in
URL, read output in web page)
Monoalphabetic Substitution Breaking A Monoal-
phabetic Encryption System Using a Known Plain-
text Attack
http://cryptoclub.math.uic.edu/substitutioncipher/
sub2.htm
7

12 Text and image sources, contributors, and licenses


12.1 Text
Substitution cipher Source: https://en.wikipedia.org/wiki/Substitution_cipher?oldid=799630915 Contributors: Damian Yerrick, Matusz,
Imran, Michael Hardy, Lquilter, Charles Matthews, Ww, ZeWrestler, Phil Boswell, Astronautics~enwiki, R3m0t, Securiger, Wjhonson,
Sverdrup, Inkling, Nunh-huh, KuniShiro~enwiki, Matt Crypto, Beland, Austin Hair, Kelson, Kevin Rector, Chmod007, CALR, Rich Farm-
brough, Roybb95~enwiki, Quistnix, BrokenSegue, Davidgothberg, RussBlau, Haham hanuka, CyberSkull, Andrewpmk, Alexg~enwiki,
Brentdax, Cbdorsett, Waldir, Gimboid13, Sinar~enwiki, Tangotango, Gwernol, RussBot, Gustavb, -OOPSIE-, Yahya Abdal-Aziz, Deville,
Thnidu, Luk, SmackBot, Mmernex, Sydius, BiT, Hmains, Bluebot, William Allen Simpson, OrphanBot, KaiserbBot, LeoNomis, Ohconfu-
cius, Stelio, Renmiri, , Japoniano, Grgarza, Ntsimp, Arruah, Nuwewsco, Jepler, Tylop~enwiki, Dajagr, Prolog, Kraelis, JAnDbot,
Omeganian, MER-C, Hypnometal, Midnightdreary, Hut 8.5, Magioladitis, CountingPine, B9 hummingbird hovering, D2B, R'n'B, Nono64,
DH85868993, IPSOS, TedColes, Dprust, Neonsignal, Arkwatem, Ellusion, OKBot, Anchor Link Bot, Mild Bill Hiccup, Niceguyedc, Ex-
cirial, Socrates2008, Razorame, SchreiberBike, Ratna0, Paulmnguyen, Richard-of-Earth, Addbot, Grayfell, Morriswa, MrOllie, Morn-
ing277, Ehrenkater, Lightbot, MaBoehm, Zorrobot, Qwertymith, Luckas-bot, Yobot, OrgasGirl, TaBOT-zerem, AnomieBOT, Ciphers,
Materialscientist, MauritsBot, Xqbot, TinucherianBot II, Semioptimist, GrouchoBot, Revipm, FrescoBot, Dr.sliderule, LaukkuTheGreit,
Jschnur, ChartaxS, Schiy, Jesse V., DARTH SIDIOUS 2, Alph Bot, Lauri.pirttiaho, EmausBot, John of Reading, Orphan Wiki, Quondum,
ClueBot NG, Maklen, Ososolax, Mouse20080706, Prbindia, BG19bot, AvocatoBot, Samswimmer, Skunk44, Sfarney, ChrisGualtieri, Ku-
piakos, Dexbot, Alysq, Harshul.mittal.se, Tshubham, Nuew, HelpUsStopSpam, Ira Leviton, Tiger27, TheLanguageMan, LeoTindall and
Anonymous: 114

12.2 Images
File:A-pigpen-message.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/ba/A-pigpen-message.svg License: Public do-
main Contributors: Transferred from en.wikipedia to Commons. Original artist: Of the SVG version, Roland Geider (Ogre), the original
uploader was Matt Crypto at en.wikipedia
File:Babington_postscript.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e0/Babington_postscript.jpg License: Pub-
lic domain Contributors: This le is from the collections of The National Archives (United Kingdom), catalogued under document record
SP12/193/54. For high quality reproductions of any item from The National Archives collection please contact the image library.
Original artist: Thomas Phelippes and Anthony Babington
File:Folder_Hexagonal_Icon.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.svg License: Cc-by-
sa-3.0 Contributors: ? Original artist: ?
File:People_icon.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/37/People_icon.svg License: CC0 Contributors: Open-
Clipart Original artist: OpenClipart
File:Portal-puzzle.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fd/Portal-puzzle.svg License: Public domain Contributors: ?
Original artist: ?
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:ROT13.png Source: https://upload.wikimedia.org/wikipedia/commons/2/2a/ROT13.png License: Public domain Contributors: cre-
ated with Dia Original artist: en:User:Matt Crypto

12.3 Content license


Creative Commons Attribution-Share Alike 3.0

You might also like