The two texts below appear very real and clear but consider their concealment of an underlying secret message when two distinct features are used to generate a concealment device. In these exercises, the Baconian equivalency letter is determined through the examination of the final letter of each word. Consider its verb or consonant status and assign the “a” and “b” equivalency on this basis. Continue this route until you arrive at five letter equivalencies that establish plaintext letters logical cleartext.


The “father” of the Baconian biliteral alphabet type message code as we know it, was one, Lord Francis Bacon, a noted scribe, philosopher, one time avid cryptologist, who strongly believed the only secret codes were those that effectively concealed the fact that any secret existed.

Sixteenth Century, elite, active English political statesman, he used slightly different font types in the printing of written correspondence to conceal communication he wrote to his peers for exclusive interpretation by a selected few.

This system’s fundamental principle to compose an alphabet thru combinations that two unique symbols provide; in use long ahead of Bacon’s time by the ancient Greeks, whose armies use of fire torches swung to the opposite directions signified signs into two varying “fonts”. The Indians smoke signal communications from mountain tops across the North American Plains also is an example of communication transmission thru symbolic variations.

Simple substitution is the cryptographic art applied. A pure novice without any knowledge of cryptography is able to read the coded message quite easily when keys are provided the receiver.

Readable text use to conceal the fact that there was a concealment process present was a tandem step code device, with one step a text so obvious, no one would be ever looking for the second step.

So, Bacon’s noteworthy successes with cryptography lie in these very principles. It is claimed that he actually used the cipher as a preservation technique for historical documents, a media of lineage trace and a vessel for literary pseudo usage identification. Countless are many historians, literary personage, researchers and academics, who, pondering a Shakespeare connection, promote the question, who really penned some of the many works of Shakespeare? But such a pretense promises a story some brave soul can address another day where mind and matter compete with logic and reason.

Possibly, Bacon had his tongue in the proverbial cheek while declaring the true cipher was one not laborious to write, type or read. A strenuous mental exercise is necessary to construct Baconian text, a difficult task, attempting to write this bilateral type cipher in meaningful dialogue to promote plaintext concealment while being grammatically correct. ACA Krewe members who readily struggle thru Baconian constructions remain well aware of such.

Two versions of the Baconian cipher exist. One type, like null ciphers, conceals any plaintext existence, reading much like plaintext in its own. The second Baconian type, a verbal collage, conceals the message with series of words,

The Baconian type cipher concealment may use a variety of alternative methods for ciphertext dialogue. The use of any two distinct characteristic variations, either thru font styles, wordage length, message punctuation style, vowels, syllable number, consonant order, are all variables put to use in order to construct various ciphertext message cover of plaintext repartee.

We expend all such ruminations in the endless quest of the truly perfect cipher, the one which advocate, Francis Bacon, chose as a bastion of trust and security. He logically concluded that the most ingenious type cipher path devised by cryptographers, lie subject to cryptanalysis solution, as all paths can be followed backward to their very ultimate inception.

The Baconian Cipher is a good cipher to truly cover up the existence of any cryptography activity. Its value to the cryptographer is that no truly discernible trace of evidence exists to hint some sinister motive is taking place.

Though many a change has made the present day megabytes communiqué much the opposite of the ancient Greece torch fire communication technique and Indian mountain side clouds of smoke, divergent symbol signals still remain quite alive and with us today.


The Baconian consists of two unique levels. We begin a simple substitute alphabet procedure to replace the message we are concealing with the use of five surrogate “b” & “a” type letters. The alternative use of font choice preference or symbols include a variable style that we can use in disguising the “b” & “a” substitute type. Concealments also are accomplished thru using a substitute message which appearance gives off the apparent resemblance of the real message. Dragging a nudge, or crib, is a technique that we use to find the place the crib fits the ciphertext type in identical like sequence. We do this thru comparing the Baconian equivalents that embodies to those the same like representative type ciphertext surrogate letters utilize. Where no variance be there evident, diverse use active thru use of conflicting type equivalents, no dispute due in appropriate place of locale.