Search for a tool
Bacon Cipher

Tool to decrypt/encrypt Bacon cipher, a 2-letter substitution alphabet which replace a character with a group of 5 formed with two letters (often A and B).

Results

Bacon Cipher -

Tag(s) : Substitution Cipher

Share
dCode and more

dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!

Feedback and suggestions are welcome so that dCode offers the best 'Bacon Cipher' tool for free! Thank you!

# Bacon Cipher

## Bacon Encoder

 Alphabet Original (24 letters, I=J and U=V) Full (26 letters

### What is the Bacon cipher? (Definition)

Bacon's encryption uses a substitution alphabet based on 2 letters (sometimes called biliteral or baconian), often A and B, replacing the letters of the alphabet.

This encryption method is often accompanied by over-encryption.

### How to encrypt using Bacon cipher?

Baconian encryption uses the substitution table:

A B AAAAA AAAAB AAABA AAABB AABAA AABAB AABBA AABBB ABAAA ABAAB ABABA ABABB ABBAA ABBAB ABBBA ABBBB BAAAA BAAAB BAABA BAABB BABAA BABAB BABBA BABBB

Example: DCODE is encrypted AAABB,AAABA,ABBAB,AAABB,AABAA

In this original alphabet (🔤1), the letter V does not exist, it is replaced by U, likewise the letter J does not exist, it is replaced by I.

Another bacon's alphabet (🔤2) is sometimes preferred, more complete, it uses a unique code for each letter:

A B AAAAA AAAAB AAABA AAABB AABAA AABAB AABBA AABBB ABAAA ABAAB ABABA ABABB ABBAA ABBAB ABBBA ABBBB BAAAA BAAAB BAABA BAABB BABAA BABAB BABBA BABBB BBAAA BBAAB

The 2-letter code used can be hidden in an over-encryption. A classic method is to write a random message with upper case (for A) or lower case (for B) or vice versa; in this case see the binarization of uppercase and lowercase. Other methods are possible such as writing certain characters in italics (or in bold), or even mixing 2 fonts.

### How to decrypt Bacon cipher?

Baconian decryption is a substitution with Bacon alphabet.

Example: AAABB AAABA ABBAB AAABB AABAA is equivalent to DCODE.

If over-encryption has been applied, convert the message into 2 characters (preferably A and B) first.

### How to recognize a Bacon ciphertext?

The ciphered message is a binary code (with 2 distinct characters), and maybe spaces every 5 characters.

Typical cases of over-encryption are alternating upper-lower case letters, bold or italic letters or encoding different character fonts.

All references to Françis Bacon (the painter or the philosopher), Kevin Bacon (actor of Batman), to Novum organum, or to bacon slices (pork, larding, smoked, salted, english breakfast, etc.) are clues.

### What are the variants of the Bacon cipher?

The letters A and B can be replaced by others characters, such as 0 and 1, to transform the message into binary format.

Sometimes the letters o and l are used: lolol loolo lolol.

The over-encryptions (of the steganographic type) are sometimes used to mask the binary form (upper case, lower case, variant characters or fonts, etc.).

### When was Bacon cipher invented?

Francis Bacon first described the Bacon alphabet around 1605

## Source code

dCode retains ownership of the "Bacon Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "Bacon Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Bacon Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Bacon Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.

## Cite dCode

The copy-paste of the page "Bacon Cipher" or any of its results, is allowed (even for commercial purposes) as long as you credit dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
Bacon Cipher on dCode.fr [online website], retrieved on 2024-09-13, https://www.dcode.fr/bacon-cipher

## Need Help ?

Please, check our dCode Discord community for help requests!
NB: for encrypted messages, test our automatic cipher identifier!