Tool to try to understand the Zodiac Killer cipher, still partially unsolved. This code is associated with a killer who sent several letters justifying multiple homicides in the United States.
Zodiac Killer Cipher - dCode
Tag(s) : Symbol Substitution
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
The Zodiac cipher is the generic name given to a series of ciphers used by a serial killer in the United States in the 1960s and 1970s. Zodiac is the name given to this serial killer who would be responsible for at least 7 victims in California, USA (according to the authorities/FBI because he claims 37 victims).
The murderer has never been apprehended and his story has been the subject of numerous reports, documentaries and movies.
The Zodiac sent at least 17 letters to local newspapers. These letters sometimes contained evidence of crimes and sometimes cryptograms. It is these 4 cryptograms (called Z408, Z340, Z32 and Z13 depending on their length) made up of symbols that contributed to the mysterious reputation of the killer. The first cryptogram Z408 was resolved quickly. The second cryptogram Z340 was solved in 2020 and the mystery remains unsolved for Z13 and Z32.
The Z408 and Z340 messages are homophonic substitution ciphers: the same letter can be encrypted by several different symbols.
The Z340 cryptogram also uses a character transposition, resembling a route cipher (reading diagonally).
All other cryptograms use common symbols but do not share the same alphabet and the encryption method may be different.
The letters J, Q, X or Z have no known equivalent in Z408, dCode uses an arbitrary symbol (present in Z340, Z32 or Z13).
The letters J, K, Q', X or Z have no known equivalent in Z340, dCode uses an arbitrary symbol (present in Z408, Z32 or Z13).
The decryption based on Z408 is that of a homophonic substitution, each character / symbol is associated with a plain letter, and several symbols can be associated with the same letter.
The decryption based on Z340 is also a homophonic substitution, but the resulting text must then undergo a transposition (mixing of letters). The rule is a diagonal reading (knight moves) in a grid of 17 columns. First letter of the first line, then third letter of the second line, then the 5th letter of the third line, etc.
The cryptograms Z32 or Z13 do not necessarily use the same technique and do not have the same letter-symbol correspondences.
The Crypto Z-340 was sent on November 8, 1969, it was resolved 51 years later in December 2020 here (link) The message is written in a grid of 17 columns:
The message begins with I hope you are having lots of fun to catch me…
It is again a homophonic substitution but this time, the letters of the message have been transposed so as to read diagonally on 9 lines: the reading order is:
→1 | 10 | 19 | 28 | 37 | 46 | 55 | 64 | 73 | 82 | 91 | 100 | 109 | 118 | 127 | 136 | 145 |
137 | 146 | →2 | 11 | 20 | 29 | 38 | 47 | 56 | 65 | 74 | 83 | 92 | 101 | 110 | 119 | 128 |
120 | 129 | 138 | 147 | →3 | 12 | 21 | 30 | 39 | 48 | 57 | 66 | 75 | 84 | 93 | 102 | 111 |
103 | 112 | 121 | 130 | 139 | 148 | 4 | 13 | 22 | 31 | 40 | 49 | 58 | 67 | 76 | 85 | 94 |
86 | 95 | 104 | 113 | 122 | 131 | 140 | 149 | 5 | 14 | 23 | 32 | 41 | 50 | 59 | 68 | 77 |
69 | 78 | 87 | 96 | 105 | 114 | 123 | 132 | 141 | 150 | 6 | 15 | 24 | 33 | 42 | 51 | 60 |
52 | 61 | 70 | 79 | 88 | 97 | 106 | 115 | 124 | 133 | 142 | 151 | 7 | 16 | 25 | 34 | 43 |
35 | 44 | 53 | 62 | 71 | 80 | 89 | 98 | 107 | 116 | 125 | 134 | 143 | 152 | 8 | 17 | 26 |
18 | 27 | 36 | 45 | 54 | 63 | 72 | 81 | 90 | 99 | 108 | 117 | 126 | 135 | 144 | 153 | 9 |
154 | 163 | 172 | 181 | 190 | 199 | 208 | 217 | 226 | 235 | 244 | 301 | 302 | 303 | 304 | 305 | 306 |
285 | 293 | 155 | 164 | 173 | 182 | 191 | 200 | 209 | 218 | 227 | 236 | 245 | 253 | 261 | 269 | 277 |
270 | 278 | 286 | 294 | 156 | 165 | 174 | 183 | 192 | 201 | 210 | 219 | 228 | 237 | 246 | 254 | 262 |
255 | 263 | 271 | 279 | 287 | 295 | 157 | 166 | 175 | 184 | 193 | 202 | 211 | 220 | 229 | 238 | 247 |
239 | 248 | 256 | 264 | 272 | 280 | 288 | 296 | 158 | 167 | 176 | 185 | 194 | 203 | 212 | 221 | 230 |
222 | 231 | 240 | 257 | 265 | 273 | 281 | 289 | 297 | 159 | 168 | 177 | 186 | 195 | 204 | 213 | 249 |
205 | 214 | 223 | 232 | 241 | 250 | 258 | 266 | 274 | 282 | 290 | 298 | 160 | 169 | 178 | 187 | 196 |
188 | 197 | 206 | 215 | 224 | 233 | 242 | 251 | 259 | 267 | 275 | 283 | 291 | 299 | 161 | 170 | 179 |
171 | 180 | 189 | 198 | 207 | 216 | 225 | 234 | 243 | 252 | 260 | 268 | 276 | 284 | 292 | 300 | 162 |
310 | 309 | 308 | 307 | 311 | 312 | 313 | 314 | 316 | 315 | 318 | 317 | 319 | 320 | 321 | 322 | 325 |
324 | 323 | 327 | 326 | 335 | 334 | 333 | 332 | 331 | 330 | 329 | 328 | 336 | 337 | 338 | 339 | 340 |
By having deciphered 2 of the messages, a hope of understanding the last 2 arose. Unfortunately, although the symbols are similar, the transliterations common to the two cryptograms are rare. Here are the symbols and their correspondences:
z408 | z340 | z408 | z340 | z408 | z340 | z408 | z340 | ||||
---|---|---|---|---|---|---|---|---|---|---|---|
![]() | W | D | ![]() | L | E | ![]() | Y | ![]() | N | N | |
![]() | E | R | ![]() | S | F | ![]() | A | T | ![]() | T | I |
![]() | T | ![]() | F | S | ![]() | S | A | ![]() | T | G | |
![]() | H | O | ![]() | E | E | ![]() | N | A | ![]() | I | I |
![]() | F | ![]() | G | O | ![]() | A | D | ![]() | O | R | |
![]() | I | S | ![]() | B | O | ![]() | E | W | ![]() | O | R |
![]() | U | N | ![]() | E | R | ![]() | E | ![]() | V | E | |
![]() | O | L | ![]() | C | X | ![]() | D | B | ![]() | P | |
![]() | I | I | ![]() | A | A | ![]() | E | C | ![]() | M | U |
![]() | R | Z | ![]() | R | L | ![]() | I | ![]() | D | A | |
![]() | O | ![]() | L | T | ![]() | L | T | ![]() | I | S | |
![]() | N | T | ![]() | H | W | ![]() | L | A | ![]() | E | H |
![]() | S | ![]() | N | ![]() | K | U | ![]() | ||||
![]() | R | ![]() | M | ![]() | Y | ![]() | E | ||||
![]() | T | V | ![]() | E | D | ![]() | A | L | ![]() | S | P |
![]() | I | N | ![]() | T | ![]() | T | ![]() | I | |||
![]() | P | Q | ![]() | N | ![]() | J | ![]() | S | U | ||
![]() | ![]() | R | K | ![]() | N | O | ![]() | Y | B | ||
![]() | E |
There are only 5 symbols with a common key: (=N),
(=I),
(=A),
(=E),
(=I).
The symbol in Z13 do not appear in any of these 2 decrypted messages.
dCode retains ownership of the "Zodiac Killer Cipher" source code. Except explicit open source licence (indicated Creative Commons / free), the "Zodiac Killer Cipher" algorithm, the applet or snippet (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or the "Zodiac Killer Cipher" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) and all data download, script, or API access for "Zodiac Killer Cipher" are not public, same for offline use on PC, mobile, tablet, iPhone or Android app!
Reminder : dCode is free to use.
The copy-paste of the page "Zodiac Killer Cipher" or any of its results, is allowed (even for commercial purposes) as long as you cite dCode!
Exporting results as a .csv or .txt file is free by clicking on the export icon
Cite as source (bibliography):
Zodiac Killer Cipher on dCode.fr [online website], retrieved on 2023-05-31,