![]() ![]() ![]() We are indebted to Sharon Touton of Pasadena, California, for calling attention to our errors in the original version of this page, and for clarifying the encoding of numbers with Jefferson’s … Continue reading ![]() ![]() Those four numbers and their corresponding letters intersect at the code letters b, u, b, and q, which is the ciphered form of 1789. The number 1798 is represented by the password letters as a, n, t, and i. To encode the number 8 in 18, follow the number 8 across to the n column, which intersects with the 8 line at the letter v. To encode numbers, write the them beneath the letters of the password, in this instance “antipodes.” Reading from the figure 1 across to the a in the top row, then down that column to the first a in the left column will produce an encoding of b. A keyword is used for simplicity and speed in encoding and decoding. The top row and the extreme left-hand column are the basic coordinates. It is used to create a substitution cipher, in which any letter of the alphabet is made to stand for another letter. Sometime in 1803 Thomas Jefferson presented Meriwether Lewis with a cipher based on a square table or tableau such as that published in 1516 by Johannes Trithemius, a Benedictine abbot in Germany, and which had found common usage during the eighteenth century. ![]()
0 Comments
Leave a Reply. |