chalkoutline
Greenie
- #1
Thread Owner
I use an Excel workbook to decode the Beale ciphers and i have attached 2 files: my Cipher 2 solve using the numbered DOI to reveal the treasure description described in the 1885 pamphlet and my Cipher 1 solve using the same numbered DOI.
As shown in my Cipher 1 solve, it looks like gibberish which typically means i have the wrong document: however, you will see there are four alphabetical strings embedded in the Cipher 1 solution with the most obvious string occurring at position 188 where "A through P" are shown in alphabetical sequence.
Since these alphabetical sequences are intentional, this mostly likely means the ciphers are a hoax. One could also conclude the solution is a two step process where the first step to solving the Cipher 1 location is to convert Cipher 1 using the DOI and the second step is to decode the Cipher 1 Solve attachment to the final message using some a deciphering method i am not aware of.
So if the ciphers are real, and uses the 2 step process, one doesn't need to find the correct document to make Cipher 1 readable but rather a Cipher method to use on step 2.
As shown in my Cipher 1 solve, it looks like gibberish which typically means i have the wrong document: however, you will see there are four alphabetical strings embedded in the Cipher 1 solution with the most obvious string occurring at position 188 where "A through P" are shown in alphabetical sequence.
Since these alphabetical sequences are intentional, this mostly likely means the ciphers are a hoax. One could also conclude the solution is a two step process where the first step to solving the Cipher 1 location is to convert Cipher 1 using the DOI and the second step is to decode the Cipher 1 Solve attachment to the final message using some a deciphering method i am not aware of.
So if the ciphers are real, and uses the 2 step process, one doesn't need to find the correct document to make Cipher 1 readable but rather a Cipher method to use on step 2.