Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »
Q&A

Post History

60%
+1 −0
Q&A Using substitution ciphers to generate new alphabets in a novel

If the purpose of the cipher is encryption, use the substitution cipher. Have some character study it, know it is encrypted and that E is the most commonly used letter in English. Ah, E has been re...

posted 5y ago by Rasdashan‭  ·  last activity 4y ago by System‭

Answer
#3: Attribution notice added by user avatar System‭ · 2019-12-08T11:29:05Z (over 4 years ago)
Source: https://writers.stackexchange.com/a/43937
License name: CC BY-SA 3.0
License URL: https://creativecommons.org/licenses/by-sa/3.0/
#2: Initial revision by user avatar Rasdashan‭ · 2019-12-08T11:29:05Z (over 4 years ago)
If the purpose of the cipher is encryption, use the substitution cipher. Have some character study it, know it is encrypted and that E is the most commonly used letter in English. Ah, E has been replaced with R.

If the message was sent by a spy, it should be hard to understand but it should also be inconspicuous. What might be more interesting is something I use in my piece. Rather than something that has obviously been encrypted, I have spam emails and texts that, when you subtract 90% of the text, you have the real message. This is something that anyone can look at and think nothing of - insignificant spam. Nothing suspicious. Someone with training and aware would see the potential of the other message but perhaps remove the wrong words.

Ask yourself why it is encrypted and who sent it. Perhaps the first substitution method would be best except it screams code. Anything that screams code risks being intercepted and decoded.

A simple paragraph that has the first or, better, second or third letter be of importance, is more likely to seem innocent. It might seem slightly gibberish as an attempt I made to encrypt a message by hiding it in plain sight in a longer text devolved into. It can be done.

#1: Imported from external source by user avatar System‭ · 2019-03-22T17:03:58Z (about 5 years ago)
Original score: 7