chalkoutline
Greenie
- #1
Thread Owner
I have mentioned in several posts that I believed the Beale Ciphers were real until I found a 19 character alphabetical string at location 188 when you use the numbered DOI to solve Cipher 1. This string is intentional.
The first question is…Could a magic document exist that will produce a readable document for Cipher 1 AND produce an alphabetical string when solved using the numbered DOI from the 1820. Statistically, you have a better chance of winning the lottery than finding the magic document.
The second question is…Could a second ciphering technique remove the alphabetical string to produce a readable message. I first tried a Caesar cipher which didn’t work so I tried a Vigenere cipher. In the attached pdf, I share a test where I developed a Vigenere Key by assigning numbers to the alphabet that would remove the alphabetical string:
This did indeed work and I was able to duplicate the scenario where a readable message is encrypted using a Vigenere Key (above) that produces the alphabetical string as described. The cipher creator would have to assign the numbers from the numbered DOI to the alphabetical string. This test supports the idea that a two-step cipher could have been used to create Cipher 1.
The only way to determine whether a Vigenere cipher Key was used is to find the correct 16 characters/numbers that unlock the Cipher 1 message and solve the cipher.
The first question is…Could a magic document exist that will produce a readable document for Cipher 1 AND produce an alphabetical string when solved using the numbered DOI from the 1820. Statistically, you have a better chance of winning the lottery than finding the magic document.
The second question is…Could a second ciphering technique remove the alphabetical string to produce a readable message. I first tried a Caesar cipher which didn’t work so I tried a Vigenere cipher. In the attached pdf, I share a test where I developed a Vigenere Key by assigning numbers to the alphabet that would remove the alphabetical string:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P |
8 | 21 | 22 | 10 | 15 | 14 | 8 | 11 | 6 | 2 | 11 | 9 | 7 | 4 | 6 | 8 |
This did indeed work and I was able to duplicate the scenario where a readable message is encrypted using a Vigenere Key (above) that produces the alphabetical string as described. The cipher creator would have to assign the numbers from the numbered DOI to the alphabetical string. This test supports the idea that a two-step cipher could have been used to create Cipher 1.
The only way to determine whether a Vigenere cipher Key was used is to find the correct 16 characters/numbers that unlock the Cipher 1 message and solve the cipher.