Baconian cipher
The Baconian cipher, or Bacon's cipher, is a method for steganography invented by Francis Bacon in 1605. Each letter is translated into a pattern of five digits or the letters 'A' and 'B'. These are then applied to a carrier message. For instance they could represent two different typefaces or some other property of the letters.
For example the letter F would translate to aabab. We could apply it to the word 'horse' by letting a = lowercase and b = uppercase. We then get hoRsE. This way of applying the cipher is very easy to detect, but is a good example. There are countless other possibilities in how to apply it.
Baconian Cipher Tool
Note: Any other characters in the Baconian code than A, 0, B or 1 will be ignored.
Settings
24-letter Baconian Code
This is the original version.
Letter | Code | Binary |
---|---|---|
A | aaaaa | 00000 |
B | aaaab | 00001 |
C | aaaba | 00010 |
D | aaabb | 00011 |
E | aabaa | 00100 |
F | aabab | 00101 |
G | aabba | 00110 |
H | aabbb | 00111 |
I/J | abaaa | 01000 |
K | abaab | 01001 |
L | ababa | 01010 |
M | ababb | 01011 |
N | abbaa | 01100 |
O | abbab | 01101 |
P | abbba | 01110 |
Q | abbbb | 01111 |
R | baaaa | 10000 |
S | baaab | 10001 |
T | baaba | 10010 |
U/V | baabb | 10011 |
W | babaa | 10100 |
X | babab | 10101 |
Y | babba | 10110 |
Z | babbb | 10111 |
26-letter Baconian Code
This is a second version, that covers all letters in the English alphabet.
Letter | Code | Binary |
---|---|---|
A | aaaaa | 00000 |
B | aaaab | 00001 |
C | aaaba | 00010 |
D | aaabb | 00011 |
E | aabaa | 00100 |
F | aabab | 00101 |
G | aabba | 00110 |
H | aabbb | 00111 |
I | abaaa | 01000 |
J | abaab | 01001 |
K | ababa | 01010 |
L | ababb | 01011 |
M | abbaa | 01100 |
N | abbab | 01101 |
O | abbba | 01110 |
P | abbbb | 01111 |
Q | baaaa | 10000 |
R | baaab | 10001 |
S | baaba | 10010 |
T | baabb | 10011 |
U | babaa | 10100 |
V | babab | 10101 |
W | babba | 10110 |
X | babbb | 10111 |
Y | bbaaa | 11000 |
Z | bbaab | 11001 |
See also: Code-Breaking overview | Adfgvx cipher | Adfgx cipher | Affine cipher | Atbash cipher | Beaufort cipher | Bifid cipher | Caesar cipher | Columnar transposition | Cryptogram | Double transposition | Enigma machine | Four-square cipher | Gronsfeld cipher | Keyed caesar cipher | One-time pad | Pigpen cipher | Playfair cipher | Rail fence cipher | Rot13 | Route transposition | Trifid cipher | Variant beaufort cipher | Vigenere cipher