Appendix V – Null Variables

AAHJU

Larry Mayhew

Distinguish principles for determining the position of a plaintext letter within a ciphertext word. First through infinite number of all words or nouns, verbs, adjectives, adverbs.

  1. Part of speech – noun, verb, adjective, adverb. Counting pattern from the beginning or ending of each word.
  2. Letter following a part of speech – consonant, noun, verb, syllable, adjective, adverb.
  3. Some counting pattern from the beginning or ending of each word.
  4. Middle letters of ciphertext words.
  5. Word syllables.
  6. Letters within selected word syllables.
  7. Counting patterns relative to vowels or consonants within a ciphertext word.
  8. Counting patterns relative to all ciphertext – Example every fifth letter or word.
  9. Punctuation mark patterns – letter or word following.
  10. Letter shape distinctions – Enclosed space or not, symmetrical or not.
  11. Letter placement based on initial letter of each word – A = first letter, B = 2nd letter
  12. Digraph/Trigraph counting within a ciphertext word or through multiple words.
  13. Do not exclude the possibility of two or more plaintext letters per ciphertext word.
  14. Be aware of the possibility of plaintext being reversed in ciphertext.

Nulls Ciphers from the Cryptogram, Grouped by Rule

BION Presentation to ACA 2006 Seattle Convention

start

One letter per word, numeric pattern (52 ciphers)

AM48 E-10  JF93 E-2  JA60 E-2  MJ94 E-5  SO60 E-2 ND94 E-3 SO60 E-8 JF98 E-7 JD66 E-4 MJ98 E-6 ND68 E-1 SO98 E-3 MJ70 E-1 ND98 E-4 SO71 E-2 JF99 CC-06 ND74 E-3 MJ99 E-7 SO75 E-5 JA00 E-9 JF78 E-2 MA00 E-1 SO78 E-5 ND00 E-2 ND79 E-3 MA01 E-2 ND80 E-3 JA01 E-3 MJ06 AC-816 ND01 E-2 ND81 E-10 MA02 E-5 MA83 E-8 ND02 E-6 MA84 E-11 JF03 CC-8 SO84 E-8 SO03 E-7 MA85 E-6 JF04 X-12 MA86 E-3 JA04 E-2 SO86 E-5 JA04 X-9 MA88 E-6 JA05 JA1 JF89 E-5 JA05 X-SP1 ND89 E-1 SO05 X-12 MA92 E-3 MJ06 X-10

One letter per word, key letter (5 ciphers)

MJ76 E-2  JA95 E-2  JF01 CC-8  JA03 E-12  JF06 E-11

One letter per word, unique shape or feature (2 ciphers)

JA02 E-18  ND04 AC-763

One letter per word, according to formula (3 ciphers)

MA87 E-8  JF97 E-5  MA03 E-11

One letter per word, numeric pattern, restarted at random (1 cipher)

MA89 E-4

Two letters per word, numeric pattern (12 ciphers)

AM48 E-13  JA64 E-10  ND69 E-3  MA73 E-4  MJ79 E-5  JA06 AC-821  JA88 E-9  JA90 E-3  MA91 E-2  MJ93 E-3  JA94 E-1  MJ05 E-6

One or two letters per word, numeric pattern (4 ciphers)

SO75 E-11  MJ82 E-2  SO87 E-2  MJ06 E-7

One or two letters per word, according to formula (2 ciphers)

MA90 E-6  ND03 AC-725

Group of letters, key group (1 cipher)

JA68 E-3

Ignore word divisions, numeric pattern (14 ciphers)

FM49 E-15  ND76 E-9  MJ80 E-4  SO85 E-4  MA90 CON4  ND90 E-9  JA91 E-4  JA92 E-2  ND92 E-2  JF94 E-4  MA95 E-6  ND95 E-3  ND99 E-5  SO05 E-18

Ignore word divisions, key letter (2 ciphers)

MJ72 E-12  SO93 E-3

Count blanks as letters, numeric pattern (1 cipher)

SO83 E-16

One letter per word, numeric pattern, reversed text (2 ciphers)

JJ52 E-7  MJ96 E-14

Two letters per word, numeric pattern, reversed text (1 cipher)

SO05 AC-791

Divide by syllables, numeric pattern (1cipher)

SO96 E-7

Morse code ( 1 cipher)

SO90 AC-363

Two messages, one letter per word, both numeric (1 cipher)

SO97 E-7

Two messages, one letter per word, numeric & key letter (2 ciphers)

MJ97 E-7  JF04 E-11

Null Rule Examples

One letter per word, numeric pattern – ND81 E-10

Lack tremendous motion? Ask Miss Grace Henderson. Managing leads abuse whenever stomach hurts. Henderson's doctors chase out small or tremendous plain! Attend!

(Alternate second letter from end and second letter from start)

One letter per word, key letter – JA95 E-2

FAITH POWERFUL OVERGROWN SEPTAGENARIAN SCREAM MNEMONIC FREEDOMS
LAMENTATION VIRTUOSO MOURN FOREIGNERS AREA SWORD THIRST
UNDERGROUND TWITCH APPLAUD HARDWARE NIGHTS HYPOTENUSE LAWYER
AGROUND FUEL

(letter before last vowel)

One letter per word, unique shape or feature – JA02 E-18

RUFUS NYLON FAIRY SPOTS HAUNT POUND ERROR FROGS DAUBS VUGGS TOKEN
THERE MELTS POUTS SHODS OBOES BAIZE THREE BROAD UVROU BUSES.

(Unique straight or curved letter)

One letter per word, according to formula – MA87 E-8

LUCKY ZOO: CAMEL, PUMAS, LIONS, GNU, PUFFINS, SEALS. WATCHED OTTER, CROCODILE, OSTRICH. VISIT AMUSING MARMOSETS, HOWLERS. LOVED PIGEONS, SPOONBILL. FOUND WALKS, DWELLINGS, GRASSES.

(Middle letter, = first plus last divided by 2)

One letter per word, numeric pattern, restarted at random – MA89 E-4

DWARFISH PROFESSOR TRIES TO SOLVE CIPHERS. EARLY ADVANCES ARISE, BUT ARE RESTRICTED TO UNPROVEN CLEVER GUESSES. CRITICISM GROWS, STATEMENTS OF WHIZ ARE ANNOYING. SHREWDLY HE MENTIONS NEW CONDITIONS. CIPHERBREAKING FOLLOWS GENEROUS TIPS ONLY!

(1, 2, 3, 4, 5, 6, 7 restart at random)

Two letters per word, numeric pattern – ND69 E-3

BRIGHTLY GLIMPSED SCHOLARS STRANDED OCTAGONS SECTIONS
CONTESTS BATTERED NAUTICAL ACTIVATE HANDPUMP BALECLIP
GOLDRING BAKEBEAN LATESHOW ADIPOSED

(letters 3 and 6)

One or two letters per word, numeric pattern – MJ82 E-2

Bully boys sing sexy doggerel, Crazy enjoyment! Imitative dame
Edits their attempts, Waxes lyrical.

(first pair, then second to last letter)

One or two letters per word, according to formula – MA90 E-6

PYLON OVERSIZE AGO HALO TORPID DRACO SEQUIN NEMESIS STEW TRAITOR
DEPTH DOGMA SPAN PLOYS PARASOL ANALYSIS

(Last pair from odd length words, last letter from even)

Group of letters, key group – JA68 E-3

MJU RG S SAN GL HIP SUG WIL NFUF A LZG LARR NUG IV GAK ETUE
JDO ING SDA G YOFF MWA MTG BEL ENG LBU GA OY

Ignore word divisions, numeric pattern – JA92 E-2

FOR THE ORDERS AND BOYS MAKE CODES OF SIX TYPES. ALWAYS OBTUSE,
LANGUAGE REPEATS A WORD TO DEFEND NATURALS.

(2,3,4,5 Pattern)

Ignore word divisions, key letter – SO93 E-3

KILN OATH SWORN LEARNS DODGE IOTA SEAL AFIELD SIP OINKS WEALTH
CHRISM

(letters before vowels)

Count blanks as letters, numeric pattern – SO83 E-16

MUCH FAVORS NOW REMAIN A MOMENTARY GLIMPSE SEES NO ORDERS FOR MY
REPORT COULD NOT SENSE METHOD.

(4, 5, 6 Pattern)

One letter per word, numeric pattern, reversed text – JJ52 E-7

You should always be energetic, brave, tireless in opposing wretched evil men of Soviet internationales's high tyranny

(First, last, first, first in reverse)

Two letters per word, numeric pattern, reversed text – SO05 AC-791

SWISS UNTESTED SCORES DANDER EVENING ERUPTS PLEASES HISTORIES
INTENSE SUTURES ABACUS EDIBLE EXPLOITS ITEMIZES SWIRLS ELEVATION
OUTSWIMS THRIFTS EVASION UNFASTEN CARELESS BICYCLE REDCOAT
TONNAGE OUTDRAW

(1 and 4 from each word, reverse)

Divide by syllables, numeric pattern – SO96 E-7

IMPETUOUS MARINATE PARISHIONER ZYMURGY TORTUOUS GALIOT DROUGHT
SYNECDOCHE VACUOLE VERTIGINOUS PANEGYRIC NARCOSIS WROUGHT
UXORIOUS LOGARITHMS PTERODACTYL MAYHEM PUSILLANIMOUS MINISTERIAL
EQUINOX INTERPLANETARY XENOPHOBIA SPHINX EUPHONIOUS OXYACETYLENE.

(First letter of last syllable)

Morse code – SO90 AC-363

COUNTERESPIONAGE TATOO ILLICIT PARADIGM UNSCIENTIFIC PHOSPORESCENCE
PROCRASTINATION AUDIOPHILE PENITENTIARY INSIGNIFICANCE PERISCOPE ECLIPTIC
DIVISION QUADRANGLE UTTERANCE HIRSUTE TITTER HORNBLENDE OBLITERATION
SANITARIUM SETTLEMENT FORMIDABILITY KOHLRABI PHALANX OMNISCIENT
BIBLOMANIA AISLES SUNLIGHT UTILIZING DIETICIAN HARPSICHORD WAREHOUSEMAN
TRICHINOSIS BISCUTS EFFERVESCENT PARALYZED RATTLETRAP MYSTIC SUPERSTITION
MALICE

(T = dash, I = dot. Word with no T or I = space.)

Two messages, one letter per word, both numeric – SO97 E-7

LABRINTHINE INCLEMENCY KAOLIN ESTROGEN ANGIOSPERM RUTHERFORDIUM
OUTDOORSMAN LUMINOSITY LONGITUDINAL INUNDATE NASTURTIUM GRAPHICS
SPRINGELIKE TRIBALISM OBITURARY NIHILIST EERIENESS XEROGRAPHY
YEASTY ZONINGS WORKROOM OSSIFY RHYOLITE DUODECIMALIZE STAPHYLOCOCCUS

(1, 2, 3, 4, 5, 4, 3, 2 pattern and first letter)

(Group following group with G)

Two messages, one letter per word, numeric & key letter – MJ97 E-7

SATYR TEACHER ALIENATION NEST INKED SYMBOL LEAN AMPLIFY WORKOUT
LORE ETHEREAL KEYING ADVENTUROUS DUO VOTER INCHES SERIAL EXAMINE
DARKEST

(first letter, and letter before last vowel, counting Y as vowel)

Keyed null – Worst country song titles 1

LIAISON BECKON BEEN ABNEGATE AIRDROPS MANIFOLD MELON MERGE SNAGS PEOPLE
SOFTNESS OUTGO MOTORIST PANOPLY ABDOMINAL AFGHAN MOSCOW ACROBAT
AGNOSTIC ALTOGETHER INDENTS KAOLIN DRABNESS OGLE OMINOUS ONTO
POLYNOMIAL PROGENY TENUOUS

(Repeated key word: song. Plaintext is letter before the first key letter in each word)

Keyed null – Worst country song titles 2

EPISCOPAL KEYSTONE CONSTRUCT RECREATION FRAGILITY YODELER HOMEY IDIOCY
ILLUSION SHUCK DRYING FALLOUT ACQUIRE SHABBY HATCHED ABBOT PLAYFUL
PLUMBING FRUITFUL UNILATERAL UNSEEMLY LYNCH ACOLYTE MINIBUS MINIBUS
OFFSET TEENAGER CUTELY DEMOCRATIC DURATION PEDICURE NONSKID EYESIGHT
GABARDINE LARCENY ROMANTIC STRIATION WIREPULLER WIRING

(Key: country. Second letter before key letter in each word)

Nulls — Easy as 1, 2, 3?

Mini Con — Lake George, NY

May 5, 2012

BECASSE

Binary Number Key, MJ12 E-11 Null. An apple is…(tooth) DABASAP

PHIL SAID “BIKE EAST LINDA.SETUP MURAL.TEAM APOLLO ITCHY. SUBARU WASHED.”
0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100

For each word, align its binary number (first word gets 0001, second gets 0010, etc.) with the right hand edge of the word, and the significant letters are above the “1” digits.

In binary, numbers from 1-15 are represented like this:

1- 0001  4-0100  7-0111  10-1010  13-1101
2- 0010 5-0101 8-1000 11-1011 14-1110
3- 0011 6-0110 9-1001 12-1100 15-1111

NULLS WITH EXTRA-ORDINARY KEYS

The Cryptogram MJ 2014

LIONEL

Null Cipher enthusiasts are often depicted as no more than puzzle zealots. However the Null remains my very favorite cipher type for its excellent concealment ability (the only unsolvable cipher is the one which no one knows exists) and its resistance to a computer program, challenging us to use all of our mental facilities.

We are aware of many of the common Null keying devices. Numerical sequences, letters preceding or following vowels, consonants, syllables, punctuation marks or parts of speech and digraph/trigraph counting, but the following Nulls reflect some unusual creative genius displayed by our Cm Null cipher constructors that went a bit beyond the keys we are used to looking for.

The indicated past Cm published Nulls are for information only and not for credit. The final three constructions at the end of the article are for credit.

MJ 13 E-10. Homily. (to-2) ANCHISES

AMBIENT SOURCE FOGS ABSURD FILMSET BOOSTS CORRUPT  EMOTIVE SURPLUS OBSCURE SQUADS AFTER BRONCOS CROWDUP CURIOUS ANIMALS PSEUDO DOUBTS FATHOM BUCK SUBORNS FANTOM CROWDS.

Letter shapes prompt this key. Look for the one letter in each ciphertext word that differs from the rest in curves or straight line construction. Solution – Be fast to learn wise to know.

MA 13 Ornamental LIONEL

BORROWED CONCEPTS FURTHERD DOEST DEBUNK FRAGILE IMPRUDENTLY DESIGNED ENIGMA DOMAINS DISTINCTIVELY CREATING FABRICATED GYRATIONS HAMPERING FRUITFUL INFORMATIVE EXPANDED BEACON COMPARISONS BEST EXPUNGED FUEDATORY DECISION CAST AS HESITANCY EASILY BOLSTERS EXPOSED DECEPTIVE CADAVEROUS COMBATIVELY DEVIATE CYNICAL EMBODIMENTS.

Plaintext letters based on initial letter of each ciphertext word – A = first pt letter, B = second pt letter, etc.

Solution – One’s ultimate confinement is a closed mind.

SO 12 E-10. Froude quote. (the) MARSHEN

EFFORT GLEEFUL ALKALI PURVEY ACERBIC HOSPICE LENGTH THURSDAY CLOSETED CHIRPS YEOMAN HUNDRED SECEDED INJURE MIGHTIER JOKER CONFORM UNCOUTH HARBOR FUGUE PROBLEM FIDDLE CURTSY PLAYBOY.

Letter between consecutive letters of each ciphertext word – Solution – Fear is the parent of cruelty.

MJ 12 E-11. An apple is … (HCCHV) DABASAP

PHIL SAID BIKE EAST LINDA SETUP
0001 0010 0011 0100 0101 0110
MURAL TEAM APOLLO ITCHY. SUBARU WASHED.”
0111 1000 1001 1010 1011 1100

For each word, align its binary number (first word gets 0001, second gets 0010, etc.) with the right hand edge of the word, and the significant letters are above the “1” digits.

In binary, numbers from 1-15 are represented by:

1- 0001 4-0100 7-0111 10-1010 13-1101 2- 0010 5-0101 8-1000 11-1011 14-1110
3- 0011 6-0110 9-1001 12-1100 15-1111

Solution – Like a natural tooth brush.

JF 10 E-6. Librarians agree (book) JABBERWOCK

DEEP JOLLY, BARNS STEEL JEEP BUBBLED LLAMA GOOSE PEPPER JAZZ CABOOSE SNOW WHITE COMMA SKIING DOUBT THE ABYSS FILLING TOOTH DISC CLOUD SMOOTH BOTTLE VEER BIGGER IMPECCABLE.

Letter preceding all double or consecutive letters – Solution – Don’t judge a book by its movie

SO 96 E7. Vocabulary Drill. (PDQB) APEX DX

IMPETUOUS MARINATE PARISHIONER ZYMURGY TORTUOUS GALIOT DROUGHT
SYNECDOCHE VACUOLE VERTIGINOUS PANEGYRIC NARCOSIS WROUGHT
UXORIOUS LOGARITHMS PTERODACTYL MAYHEM PUSILLANIMOUS MINISTERIAL EQUINOX INTERPLANETARY XENOPHOBIA SPHINX EUPHONIOUS OXYACETYLENE.

The first letter of the last syllable of each ciphertext word yields the plaintext – Solution – One good con is worth many a sol.

MA 90 E6. Confucius insight. (OCPA) APEX DX

PYLON OVERSIZE AGO HALO TORPID DRACO SEQUIN NEMESIS STEW TRAITOR DEPTH DOGMA SPAN PLOYS PARASOL ANALYSIS

Last pair of letters from odd length ciphertext words, last letter from even length words.

Solution – One good con is worth many sols.

ND 81 E10. Drive carefully. (….road) BRUBACHER

Lack tremendous motion? Ask Miss Grace Henderson. Managing leads abuse whenever stomach hurts. Henderson's doctors chase out small or tremendous ploy! But ache tonight.

(Alternate second letter from end and second letter from start)

Solution – Crossroad better humor: Ouch!

The devious constructors out there in ACA land will continue to use their imaginative and devious wiles to attempt to baffle the innocent solver. (See the JA 12 Cm for SCORPIUS’ Null Sequence Cipher).

The Null cipher is not a structured cipher type that lends itself to computer solving or programming, thus protecting and increasing its security value. Its unstructured status allows it to be a most valuable tool in leveling the playing field between the pencil and paper solver and those versed in computer programming.

The seemingly infinite amount of variables, limited only by the constructor’s imaginative powers to think outside the box, is an excellent stimulant to the solving thought juices and processes, an invaluable asset provided by our cryptology hobby.

It is time to recognize the Null Cipher for its value as a concealment and thinking person’s cipher.