# Advice 1: How to decode the cryptogram

A cryptogram is an encrypted text, that is, the text is deliberately written so to read it and understand its meaning could only recipient. However, any means of concealing information known to man, may be disclosed to another person. Therefore, the cryptogram can be read.
Instruction
1
Using modern terms, any encrypted message is the author who wrote it; the person to whom it is intended; and the interceptor — a cryptographer trying to read it.
2
Manual encryption there are two main methods — the replacement and relocation. The first is that the letters of the original message are replaced by others according to a specific rule. The second is that the letters, again according to the rule reversed. Of course, these two methods can be combined, which makes the cipher more resistant.
3
The simplest form of substitution cipher — cryptography. In this case the letters are changed to conditional icons: numbers, symbols, images, dancing men, and so on. To reveal the cryptographic message, it is enough to determine which symbol corresponds to which letter.

For this purpose, commonly used tables of frequency showing how often found one or the other letter in the language of the message. For example, in the Russian language on the first place in this table will be the letters "a", "e", "o". Substituting them instead of the most frequently occurring icons, you can decipher some of the words, and this, in turn, will give the values of other symbols.
4
Stronger ciphers replace letters produced by key. For example, the key may become multivalued. To encrypt so the text over it many times to write a number key so that above each letter was a number. After that letter replaced by another, following after it in the alphabet through as many positions as specified by a number. The alphabet is a closed ring, that is, for example, the second letter after "I" will be "b".
5
Disclose that the cryptogram is more complicated, because for each letter of the cipher there are ten different interpretations. To decrypt we must first determine the key length and split the text into words. This is usually done using a table where the first line is the text to encrypt, and below it is the options where each letter of the cipher replaced a possible letter of the source text. Thus, in the table there are eleven lines.
6
Looking at what the options lead to the most natural division of the text into words, the cryptograph determines what letters are encoded spaces, and then finds one or more digits of the key. From this we can begin to draw conclusions, how many times the key is repeated in the text.

Substituting in place as yet unknown to letters options from the table, the cryptographer defines in which cases appear in the text of meaningful words and fragments.
7
To facilitate the work of the cryptographer normally seeks to find any information about the content of the text or key. If you know what a signature is at the end of the document, or what word is there often to be repeated, then you can use this information to reveal part of the encryption key. Substituting the first occurrence in the document, the cryptographer finds the length of the key and learns some more parts of the original text.

# Advice 2 : How to encrypt the phrase

Coded messages, anagrams, puzzles is not only exciting workout for the mind, but also a very useful skill in an emergency. The art of encryption can be trained every. But after some practice, you will be able to make their own methods.
You will need
• paper and writing materials;
• - computer keyboard.
Instruction
1
If you decide to learn how to encrypt the text, then you probably have the need to hide certain information from others. Now it is especially important. After all, no channel information is not completely reliable. Constant hacker attacks on mail servers, and databases of mobile operators make us think about our own information security.
2
Practicing the encryption of the text, start with the basics. The easiest way encryption on the first letter. You write with plain text, but the first letter of each line vertically, will make the encrypted message (Fig.1).
3
This method of encryption will help you if enemies force you to write a note to the family and to convince them that you're okay. Externally, the text will absolutely meet all their requirements, but you can file a "distress signal" (provided that the family also know, this method of encryption).
4
Another simple method of encryption is based on a computer keyboard. Each key for typing contain two letters of Russian and Latin. To encrypt the phrase "I will come tomorrow", type the text, switching to English layout. Then you get the "Z ghbtle pfdnhf" (Fig.2). To decode your message, he should perform reverse action – to get English text in the Russian layout, or use the services of specialized sites (e.g., http://klava.biz/index.php, http://androidpage.ru/text-converter-konverter-raskladok-klaviatury-v-te... etc.).
5
Because of the existence of such services should not transmit email information, the unit of measurement that is encrypted in this way. If your mailbox is compromised, a third party will be able to decode your message.
6
For truly effective protection of your communications devise your own coding system, the key to which will be known only to you and the person to whom you address your message.
7
Based you can also take a computer keyboard. Now think of a coding principle. For example, conventionally designate keys for typing numerals (Fig.3). One letter from you will be identified by a unique number, others in double digits. To avoid confusion, put "/" between the numbers. Now encrypt the phrase "He's not guilty." You should have "20/16 16/13 8/15/16/20/8/13/16".

# Advice 3 : How to decode the cryptogram

A cryptogram is an encrypted text, that is, the text is deliberately written so to read it and understand its meaning could only recipient. However, any means of concealing information known to man, may be disclosed to another person. Therefore, the cryptogram can be read.
Instruction
1
Using modern terms, any encrypted message is the author who wrote it; the person to whom it is intended; and the interceptor — a cryptographer trying to read it.
2
Manual encryption there are two main methods — the replacement and relocation. The first is that the letters of the original message are replaced by others according to a specific rule. The second is that the letters, again according to the rule reversed. Of course, these two methods can be combined, which makes the cipher more resistant.
3
The simplest form of substitution cipher — cryptography. In this case the letters are changed to conditional icons: numbers, symbols, images, dancing men, and so on. To reveal the cryptographic message, it is enough to determine which symbol corresponds to which letter.

For this purpose, commonly used tables of frequency showing how often found one or the other letter in the language of the message. For example, in the Russian language on the first place in this table will be the letters "a", "e", "o". Substituting them instead of the most frequently occurring icons, you can decipher some of the words, and this, in turn, will give the values of other symbols.
4
Stronger ciphers replace letters produced by key. For example, the key may become multivalued. To encrypt so the text over it many times to write a number key so that above each letter was a number. After that letter replaced by another, following after it in the alphabet through as many positions as specified by a number. The alphabet is a closed ring, that is, for example, the second letter after "I" will be "b".
5
Disclose that the cryptogram is more complicated, because for each letter of the cipher there are ten different interpretations. To decrypt we must first determine the key length and split the text into words. This is usually done using a table where the first line is the text to encrypt, and below it is the options where each letter of the cipher replaced a possible letter of the source text. Thus, in the table there are eleven lines.
6
Looking at what the options lead to the most natural division of the text into words, the cryptograph determines what letters are encoded spaces, and then finds one or more digits of the key. From this we can begin to draw conclusions, how many times the key is repeated in the text.

Substituting in place as yet unknown to letters options from the table, the cryptographer defines in which cases appear in the text of meaningful words and fragments.
7
To facilitate the work of the cryptographer normally seeks to find any information about the content of the text or key. If you know what a signature is at the end of the document, or what word is there often to be repeated, then you can use this information to reveal part of the encryption key. Substituting the first occurrence in the document, the cryptographer finds the length of the key and learns some more parts of the original text.

# Advice 4 : How to encrypt a number

The hiding room is a special service provided by mobile operators, if you want to call someone, not allowing to determine a number. Each operator has its own connection procedure of this service.
You will need
• - the mobile phone.
Instruction
1
Use the service of "calling number identification restriction room" from the company "Megaphone" to hide your number from the person you are calling. Please note, this function is guaranteed to work for all subscribers of "MegaFon", except those who have activated the "Super caller ID". Order services to hide the rooms can be done on the website of the operator. To do this, follow the link http://moscow.megafon.ru/services/base/service45.htm. Then enter your mobile phone number. Wait until your number will get a text message asking to confirm activation of the service. Please note that this feature is paid. Connection costs 10 rubles, and the monthly fee is 5 rubles per day. To use this service, dial before number #31#. Please note that your number will be displayed in the detailed account of the subscriber.
2
Install the ban on the definition of numbers, use the special service operator "Beeline". To activate this service, follow the link https://uslugi.beeline.ru/, log in to the service management system "My Beeline". Also in order to connect the calling number identification restriction numbersyou can call by phone 067409071 either dial from your mobile *110*071#. So your number was not determined during the set before number of subscriber, add *31#.
3
Activate the service "calling number identification restriction numbers" to hide the rooms in the MTS network. Connect it by using Internet assistant or the call operator per room. Please note that there is a monthly fee for its use – 3.95 rubles per day. Also note that you will not be able to hide number when sending SMS messages, since this function will only work during a call. To encrypt your number, before the number of subscriber to dial a combination of characters #31#.

# Advice 5 : How to: encrypt a message

When communicating online it is difficult to be sure that the conversation takes place without prying eyes. Traffic can be intercepted in different ways, so you cannot guarantee that transmitted information will not fall into the wrong hands. To secure conversation, use message encryption.
Instruction
1
To encrypt the message in different ways, ranging from the simple to using special encryption programs. Very old and proven option is the encryption of the book, one page of which is the key. The sides must be the same instances.
2
Suppose you want to encrypt the word "winter". Open pre-agreed with the partner page of the book and find the letter "z". Now count which line it is and what is on the account. For example, the fifth string, it searched letter twenty-seventh. So, code the first letter is 5-27. Similarly, a comma is substituted numerical values for the other letters. To decrypt the message, your partner should open your copy of the book to the desired page and, using a numerical code to find the desired letter.
3
One of the simplest methods of encryption is a permutation of the letters in some places. This algorithm is not too stable, so it should not be used to encrypt important data. Its principle is simple: enter the to-be-encrypted text in a horizontal row of the matrix of size 10 × 10 (possible more) cells. Then rewrite it again, but in one line, with nice horizontal lines, and vertical. Will apparently meaningless text. To read it should re-enter into the matrix.
4
The algorithm described above can be complicated if the number of the horizontal lines of the matrix an arbitrary key for example, 3-5-8-2-7-6-10-1-9-4. The vertical bars enter into the line in numerical order in the key and send it to the recipient. To read the message of your interlocutor, you must know the key.
5
Modern supercomputers are able every second to sort through millions of combinations, so to decipher these messages for they will not leave labour. To protect the correspondence, you should use of computer encryption methods. For example, use Steganos Security Suite. It allows you to encrypt files and correspondence, will help to remove data from a computer without the possibility of recovery.
6
If you are concerned about protecting your information, approach this issue comprehensively. For example, if you are working with a Windows operating system, it would be better to switch to Linux. This OS provides a much more reliable storage of sensitive data. If you fear read your correspondence, use mail service Gmail. Particularly important information encrypt is the probability that she will not fall into the wrong hands, in this case will be very high.
Search