Ciphers for elementary school children. "Encrypted message

A complete encyclopedia of modern educational games for children. From birth to 12 years old Voznyuk Natalia Grigorievna

"Encrypted message"

"Encrypted message"

What request does Dunno ask you? Read it!

Cross out any duplicate letters and read the hidden word.

V O I T G Z V B b

P R C O U SC V N F

W SC T B B P N K A

(A TOY)

Z K Z J O D U V S Z

Z Y T Z A E D Y P

D A P Y B C A P Z

B P V F R Z U P

B X Z O K V F Z Y

Y A Z P M T Y D C

R Z B SCH U T CH Y S

E C H M E Y O L F

L B Y X N S W P N

(CAROUSEL)

From the book Encyclopedic Dictionary (P) author Brockhaus F.A.

From the book of 100 great necropolises author Ionina Nadezhda

MESSAGE FROM THE TOMB OF A CHINESE EMPEROR In March 1974, three young peasants from a small village located a few kilometers from Xi'an (the administrative center of the Chinese province of Shen-si) went to the field to dig a well and accidentally stumbled upon

From the book Great Soviet Encyclopedia (PO) of the author TSB

From the book Lexicon nonclassics. Artistic and aesthetic culture of the XX century. the author The team of authors

From the book Around Petersburg. Observer Notes the author Glezerov Sergey Evgenievich

From the book Big dictionary quotes and catchphrases the author Dushenko Konstantin Vasilievich

From the author's book

Epistle of the Holy Apostle James 881 Not a little doubtful. // Nothing hesitating. Jac. 1: 6 Hence: "Not much hesitating." 882 Every Good Gift<…> descends from above. // Any gift is good<…>... Jac. 1:17 Hence, "Every gift is good." 883 ... Let everyone be swift

From the author's book

The Epistle of the Holy Apostle Paul to the Romans 908 ... When pagans, who do not have the law [of God], by nature do what is lawful, then, having no law, they are their own law: / they show that the work of the law is written in their hearts. Rome. 2: 14-15 909 ... Not the circumcision that is outwardly in the flesh;

From the author's book

St. Paul's First Epistle to the Corinthians 930 Where is the wise man? where is the scribe? where is the co-questioner of this age? 1 Cor. 1:20 Hence, "the co-questioners of this world." 931 We preach Christ crucified, for the Jews a temptation, but for the Greeks madness. 1 Cor. 1:23 932 The unwise God is wiser

From the author's book

The Epistle of the Holy Apostle Paul to Galatians 979 Glory to Him forever and ever. // ... In saeucula saeuculorum (lat.). Gal. 1: 5 980 ... Jacob and Cephas [v. e. Peter] and John, venerated by pillars<…>... Gal. 2: 9 Hence: "the pillars of the church." ? "Pillars of Society" (N-759). 981 ... We expect and hope<…>... Gal. 5: 5 From here: “Wait and

From the author's book

The Epistle to the Ephesians of the Holy Apostle Paul 985 Fatherland is in heaven. Eph. 3:15 Also: “Our dwelling is in heaven<…>"(Phil. 3:20). According to legend, the philosopher Anaxagoras (c. 500-428 BC)" engaged in speculation of nature, not worrying about any state affairs. He was asked: “And

From the author's book

The Epistle of the Holy Apostle Paul to the Philippians 996 God is a witness! Phil. 1: 8; See also: 1 Thess. 2: 5,997 Their god is the womb. Phil. 3:19? “The womb is our god” (E-17). 998 ... The peace of God, which is above all intelligence, will keep your hearts<…>... Phil. 4: 7 "Peace" means "rest." Hence: "God's peace" ("Pax

From the author's book

The Epistle to the Hebrews of the Holy Apostle Paul 1014 With the change of the priesthood, there must be a change and the law. /<…> / Cancellation of the former commandment is due to its weakness and uselessness. // ... According to need and law, there is a change<…>... Heb. 7:12, 18 Hence: “According to need and

When planning a children's party, the easiest option is to contact people who are professionally involved in organizing parties. They will offer you a lot of options for holding, different kinds entertainment, among which quests are especially popular today.

Quest - This is a chain of tasks related to each other by a topic, a common goal.

It is not surprising that children are delighted with quests, because they are so fond of solving mysteries, going to the goal and getting such a coveted prize as a result.

But in order to arrange an exciting quest, you do not have to contact anyone. By including ingenuity and imagination, any parent can write a script for his special quest, which will be drawn up taking into account the hobbies and interests of your child. And such a quest will be even more valuable, because you have put your soul into it, and even more interesting, because who, if you don’t know, how to interest your own child.

To compose a script, you will need tasks for a quest for children. Consider different options for children's assignments, having assembled which, you can compose your own unique scenario.

To read it, you need to do certain things with it. Examples of such a letter:

  • milk lettering. It manifests itself when heated. This will require matches or a lighter, so this task should not be given to kids. But even if you are doing a quest for schoolchildren, at this stage it is desirable to participate or at least the presence of an adult for safety reasons.
  • candle wax or crayon. The paper with the hint must be painted over with a pencil so that the inscription appears. An excellent safe option for the task.
  • embossed inscription. We take two sheets of paper, put them on a soft surface and write the message so that it is imprinted on the bottom sheet. It will be our secret letter. To read the inscription, it must be painted over in the same way as in the previous version.

Crossword

You can easily compose yourself. For example, the word "sun" will be the answer to the next step. For each letter of the word we come up with one more word: the letter "C" - dog, etc. Moreover, it may not necessarily be the first letter of the word. Then we select a leading question or riddle for each of the words. The answers fit into the boxes and the result is a hint word in one of the columns. We paint it with some color. An example of such a crossword puzzle can be found here.

Hidden hint

For this type of task, you will need a container with sand, any cereal or pasta, in which a capsule with a hint is hidden. You can also use a bucket of water.

Such tasks are more suitable for a quest that is carried out in nature.

You can hide a hint not in a container, but in a certain area. It could be some kind of bushes or thick grass.

Quiz

One or several questions, having solved which, the participants receive a hint. It is desirable that the questions of the quiz be united by one topic. These can be phrases from fairy tales, according to which it is necessary to guess the fairy tale itself.

More options for quizzes:

  • we take several objects or pictures, it is necessary to guess from which film or cartoon these objects are;
  • geographic quiz - guess countries, cities;
  • a quiz with questions about animals, birds or insects;
  • a quiz with questions about household appliances or about any objects used in everyday life.

If the quest is with students, the quiz can be about any subject that they study in school. In this case, the task will not only be exciting, but also useful.

Maze

More suitable for nature, but also houses can be arranged. On the street, it can be stretched ropes, between which you need to crawl, or a tunnel made of branches - this should already be looked at from the availability of materials.

At home, you can use a special children's tunnel or stretch tape between the walls in the corridor.

Riddle

It can be both in prose and in poetic form. The answer is the key to the next task.

To complicate the task, write the riddle backwards - then the children will have to try to read it, and then just guess.

Rebus

We represent the key word using a rebus. You can pick up a rebus ready-made, or you can come up with it yourself.

Puzzle

We pre-print a word or picture on paper, glue the paper onto thick cardboard and cut it into pieces. The child's task is to put the puzzle together to get a hint.

The word encrypted with the phone buttons

The telephone buttons have letters, which means that each letter in a word can be designated by a number. But each number corresponds to several letters, which complicates the task. Such tasks are suitable for schoolchildren, kids may not be able to cope with them.

Word Encrypted with Icons

Each letter of the alphabet is designated by some kind of sign - a circle, a square, an asterisk. Children are given a cipher of signs and an alphabet with symbols. Their task is to pick up the letters and guess the word as soon as possible.

find 10 differences

Fun known from childhood is to compare two pictures and find the differences. It is quite possible to make it a task for a children's quest. Finding differences as a team is much more fun and interesting.

Relay races

This is part of the nature quest. There are a lot of relay races. You can come up with your own, stylizing it under the theme of the quest. For example, if the quest is dedicated to the New Year, then the children can pass a toy snowman or Santa Claus's bag with gifts to each other instead of a ball.

Who is superfluous here?

Children are offered a few words or pictures. Their task is to determine which object or word is superfluous. An extra word will just be the key to the next stage. Option with complication - we make each word a riddle or a rebus, then the children first need to guess the words, and then look for the superfluous among them.

Count

We prepare cards with tips in advance, on each card there is a word and a number. To find out which word is the key, you need to count something. You can count the steps at the entrance, benches or trees on the street, windows in the house, etc. We complicate the task - you need to count several objects, then add these numbers to get the key.

Find the right box

It is necessary to prepare several identical boxes, one of which contains a key or a word. The participants' task is to open all the boxes. The option is more complicated - we put a key in each, but only one of them fits the lock, or in each we put a piece of paper, but only one of them has a hint.

Mirror reflection

We write a word or riddle in a mirror image. Participants have to guess for themselves that they need to use a mirror to read. By the way, the mirror can also be hidden, thereby making the task even more interesting.

General assignment rules

Here are selected only the basic options for tasks, you can take them as a basis or come up with your own, but you must follow a few rules:

  • all tasks should not be dangerous. You cannot force a child to swim across a river or light a fire;
  • the tasks must be age-appropriate for the participants to actually solve them. But at the same time, they should not be too simple;
  • the stages of the quest should be united by one theme, smoothly transition into each other, be built in a logical chain;
  • at the end of the participants there should be a prize, and it should be such that no one would be offended. If the game is a team game, then the prize should be calculated for the whole team. Optionally, you can give small prizes at each stage of the passage.

We hope that our tips will help you and you will organize your original and exciting children's quest!

I suspect that cryptography appeared almost simultaneously with writing :-). After all, we write in order to record and transmit information, and we do not always want it to fall into the wrong hands. Officially, the history of cryptography began 4 thousand years ago. The first known application of cryptography is believed to be the use of special hieroglyphs about 4000 years ago in Ancient Egypt. Today, the widest group of highly qualified cryptographers are doctors, I think that many have met with their mysterious writing :-)

I would like to clarify right away that the code and the cipher are not synonyms at all. A code is when every word in a message is replaced by a code word, symbol or picture, while a cipher is when every letter in a message is replaced by a letter or a cipher symbol. In a way, chinese characters - this is also a code.

You can hide a message not only with the help of a cipher or code, but also in more exotic ways. For example, you can get a tattoo on the head of a messenger, and then just wait for the hair to grow (naturally, this was used in very old times and, as a rule, slaves were used for this).

The simplest and oldest encryption methods are replacing the letters of the alphabet with the following ones (the code was named ROT1, which means rotation by one) or rearranging the letters in words. A more complex modification of ROT1 is the Caesar cipher, in fact, these are two circles with letters rotating relative to each other. Thus, in the Russian language, 33 encryption codes can be created using one device. As you can see from the photo, it's easy to make it at home :-)

All of these examples refer to mono-alphabetic substitutions, which means that one letter is replaced with another or a symbol. They were used from 3000 BC until the 10th century AD - this is the first period of cryptography. Unfortunately, such codes are easy to guess, since the length of the words does not change. To decipher, it is enough to find the most short words, such as single-letter conjunctions and prepositions, and then you just need to match the letter you see with the most common conjunctions. Having solved one or two letters, it is necessary to substitute them already in two-letter letters, and so on.

Another way is to count the occurrence of different letters and compare it with the frequency in our language (but this requires additional data, so I prefer the first option) - this approach is called frequency analysis and for each language its own picture is obtained. How often the letters of the Russian and English alphabets are used can be seen in these figures.
Russian:

English:

Of course, there are programs that allow you to do this with an encrypted message in a split second, but sometimes it's nice to sweat over this task yourself. Actually, during our school years, we had fun by sending each other texts saved in a different MS Word encoding, in order to decode them later - just for fun.

One of the most famous mono-alphabetic ciphers is Morse code, however, it is used not for encoding, but to simplify data transmission.

The second period of cryptography began in the 11th century in the Middle East and reached Europe only in the 15th century. It is characterized by polyalphabetic ciphers. The essence of polyalphabetic ciphers is reduced to the consistent use of monoalphabetic ones. For example, you have 5 mono-alphabetic ciphers, the first letter you are encoded by the first cipher, the second by the second, and so on, when the ciphers end, you need to start from the beginning. Their biggest advantage is that they do not lend themselves to frequency analysis like mono-alphabetic ciphers. The difficulty of decryption lies in determining the number of mono-alphabetic ciphers, as soon as you know their number, it is enough to select all the letters related to one cipher and apply algorithms to decrypt mono-alphabetic ones. Modern computers sort out such combinations very quickly, so for concealment it is very important information they don't fit.

A classic example of such a cipher is the Vigenère cipher. To create a message, you need to have a table with a set of classic ciphers with an alphabetical shift and a key word:


Under the text, you must write a key word, repeating it until the number of letters equals the number in the text.
Suppose the key word is SUMMER and we want to encrypt the word WELCOME.

Now, to determine the first letter, you need to find in the mono-alphabetic cipher S (row of the matrix S), find the letter W (column W), this will be O.

There is another famous example of a polyalphabetic cipher: the Playfair cipher, which was invented by Charles Wheatstone, but is called Lord Playfair, who introduced it into Government Services UK. The method is simple, although a bit confusing. I'll try to explain point by point with an example:

For each language, you compose a matrix of letters - the point is that the matrix contains all the letters of the alphabet. Therefore, a 5 × 5 matrix is \u200b\u200bsuitable for the English alphabet, and an 8 × 4 matrix for the Russian alphabet.
Here is our empty matrix:

For compilation, a code phrase or words are used. It is written into the matrix according to a previously agreed-upon rule: for example, in a spiral (repeating letters are not written). Further, the unused letters of the alphabet are inscribed in the empty cells in order.

For example, we will choose the phrase "It's summer now and we swim every day." And fill the cells in order: nowfrom le then and we bunchaems i ka fdy de ny

And we add the rest of the letters of the alphabet (БВГЗРФХЦШЩЭЮЯ) also in order:

Our matrix is \u200b\u200bready.

We select the phrase that we want to encrypt and break it into pairs of letters. If an unpaired letter remains, then the selected character is added to it (for the English alphabet, this is X, so we will stop at the same for our example)

Let's take the phrase "Sunny day" and divide it into pairs: CO-LN-ECH-NY-YD-EN-LH

We take the first pair and build a rectangle in our matrix with corners in these letters, then replace them with letters in other corners of this rectangle (one corner is replaced by another in the same line). We continue to do this for the other couples.

If the letters are on the same line, then they are replaced by those adjacent to the right. If the letter is the last in the line, then we take the first in the next line. For a pair of COs, since they are in the same line, the EI will be the replacement.

For a pair of LN, according to the rectangle rule, we replace it with EG.

If a pair is in one column, then we replace it with letters in the same column, but one lower. Continuing the replacement, we get a coded message: EI-EG-YA-LM-CH-MX-NT

In an extremely simplified representation, the Enigma machine is a set of rotors (each rotor is a mono-alphabetic code), adjacent rotors, when connected, complete an electrical circuit. When several rotors were connected in series, a light bulb with an encrypted letter came on from the formed electrical circuit. With the large use of rotors, the combinations of the sequence of mono-alphabetic substitutions become very numerous, which made this cipher extremely effective in those days. Moreover, the combinations of rotors can change daily, which additionally complicates the work of cryptographers. The total number of possible combinations was about 2 * 10 145, for comparison, the stars in our Milky Way galaxy, if not mistaken, only about 2 * 10 11.

The commercial production of Enigma machines began in the 1920s. The German navy was the first to use them in data transmission, however, making a number of modifications to increase safety. Other countries have also used them, but usually commercial designs.

Until the 70s of the last century, cryptography, despite the constant complications, was still classical encryption with the aim of hiding information from prying eyes. Modern cryptography is more a branch of mathematics and computer science than linguistics. We now widely apply the results of this new discipline in electronic paperwork and electronic signatures, now it is not only the prerogative of the state, but also a part of business and private life. With the help of encryption methods, it becomes possible, for example, to verify the authenticity of a message or its addressee.

But the work of cryptographers comes down not only to spy games, there is, in my opinion, an even more romantic component - deciphering ancient and extinct languages. Here, of course, one cannot fail to mention the Rosetta Stone.


It was found at the very end of the 18th century in Egypt, its great scientific value was in the fact that it adorned with 3 identical inscriptions in three languages: two of which are different scripts ancient Egyptian language, and one - in ancient Greek, which was well known at that time. Thanks to this tablet, it was possible to begin deciphering the ancient Egyptian hieroglyphs. Unfortunately, none of the three inscriptions are complete due to damage to the stone, which, I suppose, made the work of cryptographers-linguists more difficult, but also more interesting.

Cryptography even has its own monuments - this is the statue of Kryptos, near the CIA office in the United States. It consists of 4 pages with 4 encrypted messages, made by the American artist James Sanborn. To date, only 3 of 4 messages have been deciphered.

And of course, like any science, cryptography is not without great secrets.


I already wrote about one of them - this one, which turned out to be such a tough nut to crack that the majority of cryptographers already agreed that the text was absolutely meaningless, but this year it was perfect, which I also wrote about not so long ago.

Another interesting example of a cryptic book is the Codex Seraphinianus.


Although, unlike the Voynich Manuscript, it is known that this is the creation of the Italian architect Luigi Serafini, in which he depicts a mysterious world, however, a few text of this code has not yet been deciphered.

Thus, in spite of the help of supercomputers capable of calculating the most complex decryption algorithms in a split second, a creative approach is still indispensable in this matter. Cryptography still hasn't lost its noble touch of romance.

And of course gratitude magnolia1985 for an interesting topic for a post :-)

My memories from childhood + imagination was enough for exactly one quest: a dozen tasks that are not duplicated.
But the children liked the fun, they asked for more quests and had to go online.
This article will not describe the scenario, legends, design. But there will be 13 ciphers to encode the quest tasks.

Code number 1. Picture

A drawing or photo that directly indicates the place where the next clue is hidden, or a hint of it: broom + socket \u003d vacuum cleaner
Complication: make a puzzle by cutting the photo into several pieces.


Code 2. Leapfrog.

Swap the letters in the word: SOFA \u003d NIDAV

Code 3. Greek alphabet.

Encode the message with the letters of the Greek alphabet, and give the children the key:

Code 4. On the contrary.

Write the task backwards:

  • every word:
    Etischi dalk dop yonos
  • or the whole sentence, or even a paragraph:
    with all morkom momas v - aksaxdop yaschudelS. itup monreve an yv

Code 5. Mirror.

(when I was doing the quest for my children, at the very beginning I gave them a "magic bag": there was a key to the "Greek alphabet", a mirror, "windows", pens and sheets of paper, and all kinds of unnecessary stuff for confusion. , they had to figure out for themselves which of the bag would help them find the answer)

Code 6. Rebus.

The word is encoded in pictures:



Code 7. Next letter.

We write a word, replacing all the letters in it with the next alphabetically (then I is replaced by A, in a circle). Or the previous ones, or the next ones after 5 letters :).

CABINET \u003d SHLBH

Code 8. Classics to help.

I took a poem (and told the children which one it was) and a 2-digit code: line number number letter in a line.

Example:

Pushkin "Winter Evening"

The storm covers the sky with darkness,
Whirling snow whirlwinds;
How a beast she will howl
It will cry like a child
Then on the dilapidated roof
Suddenly it will rustle with straw,
How a belated traveler
He will knock at our window.

21 44 36 32 82 82 44 33 12 23 82 28

read where is the clue? :)

Code 9. Dungeon.

Enter the letters in the 3x3 lattice:

Then the word WINDOW is encrypted like this:

Code 10. Labyrinth.

My children liked this cipher, it is unlike the others, because it is not so much for the brain as for attention.

So:

on a long thread / rope, hook the letters in order, as they go in the word. Then stretch the rope, twist it and in every possible way entangle it between the supports (trees, legs, etc.). Walking along the thread, like a labyrinth, from the 1st letter to the last, the children recognize the clue word.

Imagine if you wrap one of the adult guests in this way!
Children are reading - The next clue is on Uncle Vasya.
And they run to feel Uncle Vasya. Eh, if he is also afraid of tickling, then everyone will have fun!

Code 11. Invisible ink.

Use a wax candle to write the word. If you paint over the sheet with watercolors, you can read it.
(there are other invisible ink .. milk, lemon, something else .. But I only had a candle in my house :))

Code 12. Rubbish.

The vowels remain unchanged, and the consonants change according to the key.
eg:
OVEK SCHOMOZKO
reads like - VERY COLD if you know the key:
D L X N H
Z M Sh K V

Code 13. Windows.

The children liked it incredibly! Then they encrypted messages to each other with these windows all day.
So: on one sheet we cut out windows, as many as there are letters in the word. This is a stencil, we apply it to clean slate and "in the windows" we write a hint word. Then we remove the stencil and write many different other unnecessary letters on the remaining blank place of the sheet. You can read the code if you attach a stencil with windows.
The children at first fell into a stupor when they found a sheet of paper covered with letters. Then they twisted the stencil back and forth, it also needs to be applied with the right side!

Code 14. Card, Billy!

Draw a map and mark (X) the location with the treasure.
When I made my quest for the first time, I decided that the map is very simple for them, so I need to make it more mysterious (later it turned out that the children would have had enough just a map to get confused and run in the opposite direction) ...

This is a diagram of our street. Hints here - house numbers (to understand that this is our street in general) and husky. Such a dog lives with a neighbor opposite.
The children did not immediately recognize the area, they asked me leading questions ..
Then 14 children participated in the quest, so I combined them into 3 teams. They had 3 variants of this map and each one has its own place marked. As a result, each team found one word:
"SHOW" "FAIRY TALE" "REPKA"
This was the next task :). After him there were hilarious photos!
On the 9th birthday of my son, there was no time to invent a quest and I bought it on the MasterFuns website .. At my own peril and risk, because the description there is not very good.
But my children and I liked it, because:
  1. inexpensive (analogue somewhere around 4 dollars per set)
  2. quickly (paid - downloaded-printed - 15-20 minutes for everything)
  3. there are a lot of tasks, with a margin. Although I didn't like all the riddles, there was plenty to choose from, and you could write your task
  4. everything is decorated in one, monster style, and this gives the holiday an effect. In addition to the quest tasks themselves, the kit includes: a postcard, flags, table decorations, invitations to guests. And all in monsters! :)
  5. besides the 9-year-old birthday boy and his friends, I also have a 5-year-old daughter. She couldn't do the tasks, but she and her friend also found entertainment - 2 games with monsters, which were also in the set. Fuh, in the end - everyone is happy!

Once, with the eldest Nastya, we played avidly as detectives and detectives, invented our own codes, methods of investigation. Then this hobby passed and now it came back again. Nastya got a fiancé Dimka, who enthusiastically plays scouts. His passion was shared by my daughter. As you know, in order to transmit important information to each other, intelligence officers need a cipher. With these games, you will also learn how to encrypt a word or even a whole text!

White spots

Any text, even without a cipher, can turn into a hard-to-read gibberish if the spaces between letters and words are incorrectly placed.

For example, this is what a simple and straightforward sentence turns into "We meet on the shore of the lake" - "In the evening with Janaber eguozera".

Even an attentive person will not immediately notice the catch. But an experienced intelligence officer Dimka says that this is the simplest type of encryption.

No vowels

Or you can use this method - write text without vowels.

For example, I give the following sentence: "The note lies in the hollow of an oak tree that stands at the edge of the forest"... The ciphertext looks like this: "Zpska lzht in dpl db, ktr stt n pshke ls".

Here you will need ingenuity, perseverance, and, possibly, the help of adults (for whom sometimes it is not harmful to train memory and remember childhood).

Read the other way around

This encryption combines two methods at once. The text must be read from right to left (that is, vice versa), and the spaces between words can be randomly placed.

Here, read and decode: "Neleta minve oak, manoro tsop irtoms".

Second for first

Or each letter of the alphabet can be designated by the next letter after it. That is, instead of "a" we write "b", instead of "b" we write "c", instead of "c" - "d" and so on.

Based on this principle, you can compose an unusual code. In order not to get confused, we made mini-cheat sheets for all the participants of the game. It is much more convenient to use this method with them.

Guess what phrase we have encrypted for you: "Tyilb g tzhsybmzh fiobue mzhlp - according to ozhlpdeb standby toynbzhu shmarf".

Deputy

By the same principle as the previous cipher, the "Substitution" method is used. I read that it was used to encrypt sacred Jewish texts.

Instead of the first letter of the alphabet, we write the last, instead of the second - the penultimate, and so on. That is, instead of A - Z, instead of B - Y, instead of V - E ...

To make it easier to decipher the text, you need to have an alphabet and a piece of paper with a pen on hand. You look at the correspondence of the letter and write it down. It will be difficult for a child to estimate by eye and decipher.

Tables

You can encrypt the text by first writing it into the table. You just need to agree in advance which letter you will mark the spaces between words.

A small hint - this should be a common letter (such as p, k, l, o), because the eyes that are rarely found in words immediately catch the eye and because of this, the text is easily deciphered. You also need to discuss how large the table will be and how you will enter words (from left to right or from top to bottom).

Let's encrypt the phrase together with the help of the table: At night we go to catch carp.

The space will be denoted by the letter "p", the words are written from top to bottom. Table 3 by 3 (we draw in the cells of a regular notebook sheet).

Here's what we get:
N L I M O T K A Y
ABOUT Y D R V B A S R
CH R E L I R R E.

Lattice

In order to read the text encrypted in this way, you and your friend will need the same stencils: sheets of paper with squares cut out on them in random order.

The encryption must be written on a piece of paper in exactly the same format as the stencil. Letters are written in holes-cells (and you can also write, for example, from right-to-left or top-to-bottom), the rest of the cells are filled with any other letters.

Key in the book

If in the previous cipher we prepared two stencils, now we need identical books. I remember even in the days of my childhood the boys at school used Dumas' novel "The Three Musketeers" for this purpose.

The notes looked something like this:
"324 s, 4 a, b, 7 words.
150 s, 1 a, n, 11 words .... "

First digit denoted the page number,
second - paragraph number,
third letter - how paragraphs should be counted above (c) or below (n),
fourth letter - word.

In my example the right words need to find:
First word: on page 324, 4 paragraph above, seventh word.
Second word: on page 150, 1 paragraph below, eleventh word.

The decryption process is slow, but none of the outsiders will be able to read the message.