Encryption, anagrams, rebuses are not only an exciting workout for the mind, but also a very useful skill in extreme cases. Everyone can learn the art of encryption. And having acquired a certain practice, you will be able to compose your own copyright methods.
![Image Image](https://images.culturehatti.com/img/kultura-i-obshestvo/16/kak-zashifrovat-frazu.jpg)
You will need
- - paper and stationery;
- - computer keyboard.
Instruction manual
1
If you decide to learn how to encrypt text, then you probably have a need to hide certain information from others. Now this is especially true. After all, no information transmission channel is absolutely reliable. Constant hacker attacks on mail servers and databases of mobile operators make us think about our own information security.
2
When practicing text encryption, start with the basics. The easiest way is encryption using the first letters. You write the most ordinary text, but the first letter of each line vertically will be an encrypted message (Fig. 1).
3
This encryption method will help you if ill-wishers force you to write a note to your family and convince them that you are fine. Outwardly, the text will perfectly meet all their requirements, but you can give a "distress signal" (provided that the relatives also know this encryption method).
4
Another easy way to encrypt is using a computer keyboard. Each key for typing contains two letters - Russian and Latin. To encrypt the phrase "I'll be back tomorrow", type this text, switching to the English layout. Then you get "Z ghbtle pfdnhf" (Fig. 2). To decrypt your message, the interlocutor must do the opposite - type the English text in the Russian layout, or use the services of specialized sites (for example, http://klava.biz/index.php , http://androidpage.ru/text-converter- konverter-raskladok-klaviatury-v-te … et al.).
5
It is precisely because of the existence of such services that it is not necessary to transmit information of increased importance encrypted in this way by e-mail. If your mailbox is hacked, then third parties will be able to decode your message.
6
For truly effective protection of your messages, develop your own encoding system, the key to which will be known only to you and the person to whom you will address your messages.
7
You can also use a computer keyboard as the basis. Now come up with the coding principle. For example, conditionally designate the keys for typing with numbers (Fig. 3). Some letters will be denoted by you with a single digit, others with a two-digit number. To avoid confusion, put a "/" between the numbers. Now encrypt the phrase "He is not guilty." You should get "20/16 16/13 8/15/16/20/8/13/16".