A few days ago
Anonymous

how do i de sypher a lettered code??

what programs, and howwW??

i need to de sypher JES LBH LBQE LXH GPH I UQCP J NAX WFNTE TTX

AXFE MO RB RN ZSW PW TRH AHOEH

S KOOF DOWHHAJYG PRF RPF

SYPSMITNQ WVTU HIVO GAPH WRDH TEN RODZEZ TS

DKSKF HIVO PX B SINGSG DWUO ICK USE DLAX BVD ZODVF

84787

any idea how?

Top 3 Answers
A few days ago
TurtleFromQuebec

Favorite Answer

I don’t think this can be a simple substitution code, that is, where each letter of the alphabet is replaced by the same letter throughout. There are 4 one-letter words: I, J, S, and B — while English has just the two one-letter words A and I. Also at the end of the first line, TTX would have to be SOME three-letter word starting with two letters the same, and there are hardly any of those (AAR, a river in Switzerland… OOF, a comic-book sound-effect… EEL, as Picador noted) So either it’s a different kind of code, or it’s something real complicated, or…… it’s nonsense.
1

A few days ago
picador
I enjoy cryptograms. The first thing is to know the convention used. e.g. Does a letter ever stand for itself? Does a coded letter ever change its meaning within the encrypted passage? Is the passage properly punctuated?

If the answers are not respectively No, No and Yes, I pass on to some other passtime.

Keys are (A) Look for single letters (must be A or I), (B) look for doubled letters, (C) Look for double-letter words (one of the two must be a vowel), (D) look for apostrophes (d,s,t, follow.)

The examples you have given contain no punctuation – VERY bad sign.

The first example has “I”, so it should mean “A”. The last word has a doubled “T”, which can only be “e” and the word can only be “eel”. That IF the usual rules apply. I hope that gives you at least a foothold on the sub ject. By the way that is decypher (decipher in the U.S.)

0

A few days ago
phillip
Well you would need a key. A key shows how the letter was coded and to be truthful it takes many men with machines to figure out codes it could take years with a roomful of machines. But if it is a known code then its possible to find the key with a crypto program and let it run it . But if it is like a letter your gf is writing her other man then they could have any sort of code system set up. The chances are the key is around somewhere . It would be very difficult to remember most codes.
0