Homophonic Substitution Ciphers Cracking the Code of a Killer Feb 9th, 2017 – Houston Perl Mongers Robert Stone BrainStorm Incubator Overview • Substitution Ciphers • Key Definition • Encryption / Decryption • Weaknesses / Attacks • Homophonic Substitution Ciphers • Key Definition • Encryption / Decryption • Overcoming Weakness of Substitution Ciphers • Zodiac Killer • • • • Biographical Information History of Z408 Analysis of Z408 Solution PERL MONGERS UHGD TZBRHGK Substitution Cipher - Key • Replaces One Letter With Another • Key A H J B C D E F G H I I D X M V C J N K L M N O P Q R U E S Q Y P Z B T S T U V W X Y Z R L W O K F G A Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E G R E A T N E S S I S M E A S U R E D Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E L G R E A T N E S S I S M E A S U R E D Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E L T G R E A T N E S S I S M E A S U R E D Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E L T W G R E A T N E S S I S M E A S U R E D Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E L T W M G R E A T N E S S I S M E A S U R E D Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E L T W M G R E A T N E S S C T M H L Y M R R I S N R M E A S U R E D Q M H R W T M X Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL L T W M T C T M H L Y M R R N R Q M H R W T M X Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL L T W M T R C T M H L Y M R R N R Q M H R W T M X Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL L T W M T R U C T M H L Y M R R N R Q M H R W T M X Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL L T W M T R U E C T M H L Y M R R N R Q M H R W T M X Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL L T W M T R U E C T M H L Y M R R G R E A T N E S S N R I S Q M H R W T M X M E A S U R E D Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT Substitution Cipher - Summary • Symmetric Encryption • Same Key Used for Encryption and Decryption • NOT a Reciprocal Cipher • Length of Alphabet == Length of Key • Vulnerable To • *** Known Plaintext Attacks *** • Frequency Analysis Substitution Cipher - Attacks • Frequency Analysis • Count of Occurrences of Letters Letter Frequency e 12.70% t 9.06% a 8.17% o 7.51% i 6.97% n 6.75% s 6.33% h 6.09% r 5.99% d 4.25% l 4.03% c 2.78% u 2.76% m 2.41% w 2.36% f 2.23% g 2.02% y 1.97% p 1.93% b 1.49% v 0.98% k 0.77% j 0.15% x 0.15% q 0.10% z 0.07% 14.00% 12.00% 10.00% 8.00% 6.00% 4.00% 2.00% 0.00% a b c d e f g h i j k l m n o p q r s t u v w x y z Substitution Cipher – Frequency Analysis 15 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 10 5 0 A B C D E F G H I M N O R S T U V W Y 15 LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 10 5 0 C D G H I J K L M N O P Q R T V W X Y Substitution Cipher – Frequency Analysis 15 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 10 5 0 A B C D E F G H I M N O R S T U V W Y 15 LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 10 5 0 C D G H I J K L M N O P Q R T V W X Y Substitution Cipher – Frequency Analysis 15 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 10 5 0 A B C D E F G H I M N O R S T U V W Y 15 LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 10 5 0 C D G H I J K L M N O P Q R T V W X Y Substitution Cipher – Frequency Analysis • Frequency Analysis • Count of Occurrences of N-Grams BiGram Frequency TH 3.56% HE 3.07% IN 2.43% ER 2.05% AN 1.99% RE 1.85% ON 1.76% AT 1.49% EN 1.45% ND 1.35% TI 1.34% ES 1.34% OR 1.28% TE 1.20% OF 1.17% ED 1.17% IS 1.13% IT 1.12% AL 1.09% AR 1.07% ST 1.05% TO 1.04% NT 1.04% NG 0.95% SE 0.93% 4.00% 3.50% 3.00% 2.50% 2.00% 1.50% 1.00% 0.50% 0.00% AL AN AR AT ED EN ER ES HE IN IS IT ND NG NT OF ON OR RE SE ST TE TH TI TO Substitution Cipher – Frequency Analysis 4 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 3 2 1 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO 0 4 3 2 1 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL Substitution Cipher – Frequency Analysis 4 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 3 2 1 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO 0 4 3 2 1 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL Substitution Cipher – Frequency Analysis 4 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 3 2 1 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO 0 4 3 2 1 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL Homophonic Substitution Cipher - Key • Replaces One Letter With One From A List of Letters • Key A B C D E F G H I H I D X M V C J N ( * $ 5 ^ & 4 J K L M N O P Q R U E S Q Y ! ) P 1 Z B T S T U V W X Y Z R 3 # L % 2 W O K F G A Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E G R E A T N E S S I S M E A S U R E D Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E % G R E A T N E S S I S M E A S U R E D Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E % T G R E A T N E S S I S M E A S U R E D Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E % T W G R E A T N E S S I S M E A S U R E D Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E % T W 0 G R E A T N E S S I S M E A S U R E D Homophonic Substitution Cipher – Encrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT T R U E % T W 0 G R E A T N E S S C T M ( 2 ) * 3 # I S N 3 M E A S U R E D Q 0 ( R W T 0 X Homophonic Substitution Cipher – Encrypt TRUE GREATNESS IS OTHERS NOT BY HOW %TW0 CTM(2)*3# N3 P%5MT3 !PL IG ^1K MEASURED MUCH YOU Q0(RWT0X QWDJ GPW BY HOW MUCH FREEDOM YOU CAN COERCE OTHERS TO DO IG 5PK QWDJ VT0MXPQ G1W D() D1MTD0 125*T# %1 XP GIVE WHAT CNOM KJ(2 TO YOU WANT 2P GPW KH!L 2TWM CT0H2)*33 &# Q*HRWT*X IG JPK QWD^ VT*0X1Q GPW C4OM %P 12JMT# )1% IG 5PK QWD^ GPW DH! D1MTD* P%5MT# LP XP K5(% GPW K(!L LTW* CT0(L!MR# N3 QMH3WT0X IG 51K QWD^ VT**X1Q GPW C4OM LP 12J0TR )P2 IG J1K QWDJ G1W D(Y D1MTD0 125*TR 2P X1 K^H% G1W KH!% 2TW0 CT*H%Y0#3 NR Q*(RWTMX IG ^PK QWDJ VT*MXPQ G1W C4OM 21 PL^0TR )P2 IG JPK QWD5 GPW D(Y D1*TD0 P%J*T# 2P XP K5(% G1W K()% LTW0 CT*H2Y*33 43 QM(RWT0X IG J1K QWD^ VT*0XPQ G1W CNO0 21 PL5MT# )PL IG 51K QWD5 G1W DHY D10TDM 1%5*TR 2P X1 K5(2 G1W KH)% %TW* CTMH%!0R# N3 Q*H3WT0X IG J1K QWDJ VTM*X1Q G1W C&O0 L1 P%JMT3 !1L IG 51K QWDJ GPW D(! D1MTD* PL^*T# %1 X1 K^HL G1W K()2 %TW* CT0(2)03R NR Q0H#WT0X IG 5PK QWD^ VT**X1Q G1W C4OM 21 1250T3 )1% IG 51K QWD^ GPW D(! DP*TDM PL^*TR LP XP KJ(% G1W KH!% Homophonic Substitution Cipher – Encrypt TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 2TWM 2TW0 %TW0 %TW* %TW* LTWM 2TW0 2TW* %TW* %TW0 LTWM %TW* LTWM LTWM LTW* 2TW* 2TWM %TWM %TW* LTWM 2TW* LTW0 LTW0 CTMH%Y*## CT*(%)0#3 CTMH%!033 CTMHL)0RR CT*H2)0#3 CTM(L!0#3 CT0HL)0R3 CT*H%YM## CTMH2YM## CTM(%!M3# CTMHL!03# CT*(LY*RR CT*HLYM## CT*(2)0#R CT*(2)M#3 CTMHL!M#R CT0HL)0## CT*H%!*RR CT*(2Y0## CTM(%)*## CT0H2YM## CTM(2)*3R CT*(%)0#R 43 &# &# 43 &# &# NR &3 4R N3 N# NR &# &R N3 NR 43 N# N3 &3 NR &3 4R Q*HRWT0X Q0(3WTMX Q0H3WTMX QM(3WT*X QM(RWT*X Q*(RWTMX Q*(RWT*X Q0(#WT0X QM(#WT0X Q0(#WTMX Q*H#WT*X Q*H3WT*X Q*HRWT0X QM(#WT*X Q0(RWT0X Q0HRWTMX Q*H3WTMX QM(RWT0X QM(3WT*X Q*(3WT0X QM(#WT0X Q*HRWT0X QM(#WT0X IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG 5PK 51K 5PK ^PK 5PK ^PK ^PK ^1K 5PK JPK J1K ^PK 51K 5PK ^1K 51K JPK ^PK JPK JPK 5PK J1K JPK QWDJ QWD^ QWDJ QWDJ QWD^ QWD^ QWDJ QWD^ QWDJ QWD^ QWD^ QWD^ QWD^ QWDJ QWDJ QWD^ QWDJ QWDJ QWD5 QWD^ QWDJ QWDJ QWD^ VT*MXPQ VTMMX1Q VTM*X1Q VTMMXPQ VTM0XPQ VT*MXPQ VT*0X1Q VTM*XPQ VT00XPQ VT0*X1Q VTMMXPQ VT*0X1Q VT*0X1Q VT0MX1Q VT0MXPQ VTM0XPQ VT**XPQ VTM*X1Q VT**XPQ VTMMXPQ VT00X1Q VT**XPQ VTM*X1Q GPW G1W GPW GPW GPW G1W GPW GPW G1W G1W G1W G1W GPW G1W G1W GPW GPW GPW G1W GPW GPW G1W GPW CNO0 CNO0 C4OM C4O* C4O0 C&OM C&O0 C4O0 C4O0 C&O0 C4O0 CNO0 C4OM C4OM C4OM CNOM C4OM CNO* C4O* C4O* C&O0 C4OM C4OM 21 %1 21 2P %1 21 %1 21 L1 2P L1 LP 2P L1 %P %P 2P %P L1 %1 %P %P %1 P2^*T# 1%^0TR 1LJMT3 1L5*T# 125*T# P%J0T# 1L5MTR 1LJ*T# 1%J*T3 P%5*T3 PL^0T3 P2^0T3 P2^*T# 1%J*TR P2^0T# P%^0TR PLJ*T# P2^MT3 PL^MT# P250T# 1%5MT# 1250T3 PLJMT# YP% )P% !PL YPL )P2 !1% !12 Y12 !P% YP% )PL !P% !1L YP2 !P2 )1% )1% Y12 Y12 )P% Y12 )12 !1% IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG J1K J1K ^PK JPK JPK JPK 51K JPK ^1K 51K ^1K 51K J1K 51K 51K JPK 51K 51K 5PK ^PK 5PK ^PK 5PK QWD^ QWD5 QWDJ QWD5 QWD5 QWD^ QWDJ QWD5 QWDJ QWD5 QWD5 QWDJ QWD^ QWD^ QWD^ QWDJ QWDJ QWD5 QWD^ QWD^ QWDJ QWDJ QWDJ GPW GPW GPW G1W G1W GPW GPW G1W G1W GPW G1W G1W GPW GPW G1W G1W GPW GPW G1W GPW GPW GPW GPW D(! DH! DH) DHY D(! DH) D(! D(Y DH! D() D(Y DHY D(! DH) DH) DH! DH! DHY DH! DH! DH) D(Y DHY D1*TDM DP0TD0 DP0TDM DP0TD0 D1*TD* D1*TD* DP*TDM DPMTD0 D1*TD0 D10TDM DP0TD* D10TD0 DP0TD0 DP0TD0 D1MTD* D1MTDM DP0TD0 D1*TDM D1MTD* DP0TD0 DP*TD* DPMTDM D10TD0 P25*TR PL^MT# P%J*T# 1%50T# PL^*T# P2^*T3 P2^MT# PL^*TR PL^MT# PL50T3 P25MTR PLJMT3 125*TR PLJ*T# 1%5MTR P%J0T# P2^*TR 1%^0T3 PLJMTR 1L^*T3 12J*TR P%5*T3 12^MTR LP 21 2P L1 %1 LP 2P %1 L1 %1 %P %P %P 2P LP 2P %P L1 LP %1 L1 LP %1 X1 X1 XP X1 XP X1 X1 XP XP X1 XP X1 X1 X1 X1 XP X1 XP XP XP XP XP XP KJ(L K5H2 K5(L K^H2 KJH% K^H% K^(2 KJ(% KJ(% K^HL KJ(% K5(L KJH% K5(2 K^HL KJHL K^(L K5(% KJ(2 K^(2 K5H% KJ(% K^(L G1W G1W G1W G1W GPW GPW GPW GPW GPW GPW G1W GPW G1W GPW G1W GPW GPW GPW GPW G1W G1W G1W G1W K(YL KH!2 KH!2 K()% KH!L KH)2 KH)% KH)L K()2 KH)L K()L K(Y2 KHYL KHY2 K(!2 K()2 K()% K(Y% KH)% KH!% K()L KH!% K(YL Homophonic Substitution Cipher – Encrypt TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 2TW0 LTW0 %TW* LTW0 %TWM 2TWM LTW* LTW0 LTWM %TW* LTW0 LTWM 2TWM 2TW* LTW* %TWM 2TWM %TW0 2TWM 2TWM %TWM 2TW* 2TWM %TW* LTWM LTWM 2TWM 2TWM %TW* LTW* LTWM 2TWM %TWM 2TW0 2TW0 LTW* 2TW0 LTW0 %TW* LTW0 %TWM 2TWM LTW* LTW0 LTWM %TW* LTW0 LTWM 2TWM CT0H%!MR# CT*(L!M33 CT0(%!0R# CT0(L!03# CTM(LY03# CT0(2)M#3 CTM(2)03# CT0HL)033 CT*(L)*RR CT0HLY*33 CT0(2!*3R CT0(LY03R CTMHL)03# CT*(2Y0#3 CT0H%)0#3 CT*(%)M#3 CT*HLY0## CT0HL)*## CT0(2Y*R# CT0H%Y*## CT*HL)03R CT0(LY0RR CT0(%)*3# CTMH%)03R CT0HL!*3R CT*(LY*3R CTMH2)M3R CTMHL!0R# CT*(L!M33 CT0(L!M3R CT*(L)M## CT0H%!*RR CTM(2)*## CT0H%)*## CT*(%!033 CTMH2!*## CT0H%!MR# CT*(L!M33 CT0(%!0R# CT0(L!03# CTM(LY03# CT0(2)M#3 CTM(2)03# CT0HL)033 CT*(L)*RR CT0HLY*33 CT0(2!*3R CT0(LY03R CTMHL)03# &# 4R &3 &# N3 4# &R NR 4R 4# 4# 4# 43 4R 4R &R 4R 43 NR &# &3 43 N3 N# &3 N# &# &# 4# 43 &3 4R 4# 4# 43 N3 &# 4R &3 &# N3 4# &R NR 4R 4# 4# 4# 43 Q*HRWT0X QM(RWT0X Q0(#WT*X Q*H#WT0X Q0H#WTMX Q0(RWT*X Q0H3WTMX Q0(RWTMX Q0HRWTMX QM(RWT*X QMH#WT*X QMH#WT*X Q*(RWT*X Q0(#WTMX QM(RWT*X Q0H3WTMX Q*(3WT0X QM(RWT*X QMH3WT0X QM(RWT*X QMH3WT*X Q*H3WT*X QMH#WT0X QMH#WT*X Q*(3WTMX Q0HRWTMX QMHRWT0X Q0(RWT*X Q*H#WT*X Q0HRWTMX Q0(3WTMX Q*H#WTMX QMH#WT*X Q0(RWT*X Q0H#WTMX Q*H3WT*X Q*HRWT0X QM(RWT0X Q0(#WT*X Q*H#WT0X Q0H#WTMX Q0(RWT*X Q0H3WTMX Q0(RWTMX Q0HRWTMX QM(RWT*X QMH#WT*X QMH#WT*X Q*(RWT*X IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG ^1K ^1K J1K ^1K ^PK ^1K ^PK ^1K 5PK J1K J1K J1K ^1K JPK 5PK ^PK ^1K ^PK ^1K 51K J1K ^PK ^PK JPK 5PK 5PK JPK 5PK 51K 51K 5PK 5PK 51K ^1K 5PK 51K ^1K ^1K J1K ^1K ^PK ^1K ^PK ^1K 5PK J1K J1K J1K ^1K QWDJ QWD^ QWD^ QWD5 QWDJ QWDJ QWDJ QWDJ QWD^ QWD5 QWD5 QWD5 QWD^ QWD5 QWD5 QWD5 QWD5 QWDJ QWD5 QWDJ QWD5 QWD^ QWD5 QWD^ QWD5 QWD^ QWD5 QWD5 QWD^ QWD^ QWDJ QWD5 QWD^ QWD^ QWDJ QWD5 QWDJ QWD^ QWD^ QWD5 QWDJ QWDJ QWDJ QWDJ QWD^ QWD5 QWD5 QWD5 QWD^ VT00X1Q VTMMX1Q VT0MXPQ VTM*X1Q VT*MX1Q VTMMX1Q VT*MX1Q VT0*X1Q VT0*XPQ VT0*X1Q VT*0X1Q VT0MX1Q VTM*X1Q VT*MX1Q VTM*XPQ VT0MX1Q VT*0X1Q VTM0XPQ VT0*XPQ VT**X1Q VT0*XPQ VTM*X1Q VT00XPQ VTM0X1Q VT0*XPQ VTM*X1Q VT00X1Q VTM0XPQ VTM0X1Q VT**X1Q VTM*X1Q VT**X1Q VT*MXPQ VTM0X1Q VTMMX1Q VT*MX1Q VT00X1Q VTMMX1Q VT0MXPQ VTM*X1Q VT*MX1Q VTMMX1Q VT*MX1Q VT0*X1Q VT0*XPQ VT0*X1Q VT*0X1Q VT0MX1Q VTM*X1Q GPW GPW GPW G1W GPW G1W GPW GPW GPW GPW GPW G1W GPW G1W G1W GPW G1W G1W G1W GPW G1W GPW G1W G1W GPW GPW GPW GPW G1W GPW G1W GPW GPW GPW GPW GPW GPW GPW GPW G1W GPW G1W GPW GPW GPW GPW GPW G1W GPW CNO* C&OM C&O* CNOM C&O* CNO0 CNO0 C&O0 CNO* C&O0 C4O* C&O0 C&O0 C4O* C4O* C4OM CNO0 C&O0 C4O0 C&O0 C&O* C&OM CNO* CNO* C4OM C4O* C4OM CNO* C4O0 C4O0 CNO0 C4O* C&O0 CNOM C4O* CNO0 CNO* C&OM C&O* CNOM C&O* CNO0 CNO0 C&O0 CNO* C&O0 C4O* C&O0 C&O0 2P %1 LP L1 LP LP L1 LP LP LP %P LP 21 LP 21 %P L1 %1 2P 21 LP %1 21 LP %1 %1 LP LP LP 2P LP 2P %P LP L1 21 2P %1 LP L1 LP LP L1 LP LP LP %P LP 21 12JMT3 1LJ*T3 1%^0T# P2^0TR 12^*T3 12JMT# 1%5MT# PL5*T3 P2^0TR 1%^MTR 1L^*TR PLJ*TR 1LJ0T# P%50TR 125*T3 12^0T# 1L5MTR PL^*TR P2J*T# P2J0T3 1L5*T# PLJMTR 1%5MT# 1%^*TR P25MTR PLJ*T3 1L50T# 1L^0TR P2^0T# P2J0T3 P2^0T3 PL^MT# P25*TR PLJ*T# P%^*T# P%JMT3 12JMT3 1LJ*T3 1%^0T# P2^0TR 12^*T3 12JMT# 1%5MT# PL5*T3 P2^0TR 1%^MTR 1L^*TR PLJ*TR 1LJ0T# )1% !P2 )P2 YPL YP2 Y1L )P2 )P% !P% !P2 !1% YPL )1% )P% )PL !1% Y12 Y12 Y1L )PL !P% Y1L )P% !P% !1L YPL !P% !PL )P% )1L )P% )1% Y1% !1L YP2 )1% )1% !P2 )P2 YPL YP2 Y1L )P2 )P% !P% !P2 !1% YPL )1% IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG 51K 51K ^PK ^1K 51K 5PK J1K ^1K ^1K ^1K JPK 5PK 5PK J1K J1K JPK ^PK JPK ^PK JPK 51K 51K ^PK 5PK J1K J1K JPK 51K J1K JPK JPK ^PK ^PK J1K 51K ^PK 51K 51K ^PK ^1K 51K 5PK J1K ^1K ^1K ^1K JPK 5PK 5PK QWD5 QWDJ QWD^ QWDJ QWDJ QWDJ QWDJ QWD^ QWDJ QWDJ QWD5 QWD5 QWD^ QWD5 QWDJ QWD5 QWDJ QWD^ QWD5 QWD^ QWD5 QWD^ QWDJ QWD^ QWDJ QWD5 QWD5 QWD5 QWD5 QWDJ QWD5 QWDJ QWDJ QWD5 QWD5 QWDJ QWD5 QWDJ QWD^ QWDJ QWDJ QWDJ QWDJ QWD^ QWDJ QWDJ QWD5 QWD5 QWD^ G1W G1W GPW GPW GPW G1W GPW GPW GPW G1W G1W GPW GPW GPW GPW G1W GPW GPW G1W G1W GPW GPW GPW GPW GPW G1W GPW GPW G1W G1W G1W GPW G1W GPW G1W G1W G1W G1W GPW GPW GPW G1W GPW GPW GPW G1W G1W GPW GPW D(Y DHY D() D(Y D(! DH! D(! DH) D(Y D() DH) D(Y D() D(! D(Y D() D(! DH! DHY D(Y DH! DH! D(Y DHY D(! DHY DH! D(Y D(! DH! D(Y DHY D() DH) DH! D() D(Y DHY D() D(Y D(! DH! D(! DH) D(Y D() DH) D(Y D() DPMTDM DP*TD0 DP*TDM D1MTD0 DPMTD* D1MTDM DPMTDM DPMTD0 DPMTDM D1MTD* D10TD0 DP0TD* DP*TD* DP0TDM D10TDM DP0TD0 D1*TD* DP0TDM D10TD* DPMTD* D10TD* D10TD0 D10TD* DP*TD* DP*TDM DP0TDM D10TDM D1MTD* DP*TD* DP*TD* D10TD* D1*TD* D1*TD0 D1*TD0 DP*TD0 DP*TD0 DPMTDM DP*TD0 DP*TDM D1MTD0 DPMTD* D1MTDM DPMTDM DPMTD0 DPMTDM D1MTD* D10TD0 DP0TD* DP*TD* 125*T# 1L5MTR P2J0TR P250TR P250T3 1%^MT# P250T3 12^0T# PL50T# 1LJ0T# 1%JMT3 P25*T# 1%50T# PLJMTR 1L^*TR PL5MT3 1%^MTR P2J*T# 12^0T# PL^0TR 12^0T3 1L^0TR P%^0TR P%JMT3 1%^MTR P%JMTR P2^0T3 125*TR 1%5MTR 1%^MT# P%J0T3 P%^0T3 P%^0T# 12JMT# 12^MTR 12JMTR 125*T# 1L5MTR P2J0TR P250TR P250T3 1%^MT# P250T3 12^0T# PL50T# 1LJ0T# 1%JMT3 P25*T# 1%50T# %1 21 2P 21 %1 %1 %P L1 L1 LP 2P %1 21 21 LP LP %P L1 LP %P L1 %1 2P LP 21 2P 21 21 %P LP L1 21 21 LP L1 L1 %1 21 2P 21 %1 %1 %P L1 L1 LP 2P %1 21 XP XP X1 X1 X1 XP X1 XP X1 X1 X1 X1 X1 X1 X1 XP X1 X1 X1 XP X1 X1 XP X1 X1 X1 X1 XP XP X1 XP XP X1 X1 X1 XP XP XP X1 X1 X1 XP X1 XP X1 X1 X1 X1 X1 K5HL K5(2 KJ(% KJ(% K5HL K^H2 K^HL K5(2 K5(L KJ(% KJ(% K5(L K^(L K5(% K5H% K5H% K5H2 KJH2 KJ(% K5(L K^H% K5(L K^HL KJH2 K^H2 KJ(L K^(% KJ(% K^(L KJ(2 KJ(2 K^H% K^(2 KJHL K^H% K^(2 K5HL K5(2 KJ(% KJ(% K5HL K^H2 K^HL K5(2 K5(L KJ(% KJ(% K5(L K^(L GPW G1W G1W GPW GPW G1W GPW GPW G1W G1W G1W G1W G1W G1W GPW GPW G1W G1W GPW G1W G1W G1W G1W GPW GPW GPW G1W GPW G1W G1W G1W G1W GPW G1W G1W G1W GPW G1W G1W GPW GPW G1W GPW GPW G1W G1W G1W G1W G1W K(!L K(Y% KHYL K(!% KHY2 K(Y2 KHY% KH)2 KH!% KHYL KHYL K(!2 KHY2 KH)% KH)L KH!2 KH!2 KHY2 K(YL K()2 K()L K()% KHY% K(Y% KH)L KH!L K()L KH)% K(Y% KHY2 KHY% K(!L KHY2 K()2 K(Y2 K(!% K(!L K(Y% KHYL K(!% KHY2 K(Y2 KHY% KH)2 KH!% KHYL KHYL K(!2 KHY2 %TW* LTW0 %TW* LTW0 %TW0 2TW0 LTW* LTW* %TW0 2TW0 LTWM %TWM %TW* LTW* LTWM 2TW0 LTWM %TW0 2TW0 2TW0 2TWM 2TW0 %TW0 2TW0 LTW* 2TW* %TW* LTW0 2TWM 2TWM %TW0 2TWM LTW0 LTWM 2TW* %TW* %TW* LTW0 %TW* LTW0 %TW0 2TW0 LTW* LTW* %TW0 2TW0 LTWM %TWM %TW* CTM(2!MRR CTMH2!*#3 CTMH2)MRR CT0H2)0R3 CTMHL)*3R CT0(%Y*R3 CT*(LY0RR CTM(L!*R# CT0H%)*#3 CTMH2!033 CT*HLY0R3 CT0H2Y*3R CT0H2!03R CTM(2!03R CT*HL)MR3 CTMH2!M33 CT0(%)M#3 CT0(%YMR3 CT*(%)MRR CTM(2YM## CT*HLYMRR CT*(LY*R# CT*(%YM#3 CTMH2)0R3 CT0(%)M## CT*(%YMR3 CTM(%!0#R CT0HL)MRR CT0(%!033 CT0H%!*3# CT0(2)03# CT*H2)03R CTMHLY*R3 CT*(%!MR3 CTMH%!*R3 CT0(LY0RR CTM(2!MRR CTMH2!*#3 CTMH2)MRR CT0H2)0R3 CTMHL)*3R CT0(%Y*R3 CT*(LY0RR CTM(L!*R# CT0H%)*#3 CTMH2!033 CT*HLY0R3 CT0H2Y*3R CT0H2!03R 4R &3 NR NR 43 N# &R 4R 43 43 NR &R NR 4# NR &3 4R N3 4R 43 43 43 NR 4# 43 N# &R NR 43 N# 4R &R 4R &3 &3 &R 4R &3 NR NR 43 N# &R 4R 43 43 NR &R NR Q*(3WT*X Q0H3WT*X Q*H#WT*X QM(#WTMX QM(#WTMX Q*H3WT0X Q*H3WTMX Q0(3WTMX QMH#WT0X Q0HRWT*X Q*H#WT0X Q0(#WT0X Q*(RWT0X QM(#WTMX Q*(3WT0X Q0(3WTMX Q*(#WT*X Q0(RWT0X Q*(#WTMX Q*H3WT*X Q*HRWTMX Q0(3WT*X Q*(RWTMX Q0(RWT0X Q*HRWTMX Q0(3WT0X Q0H3WT0X QMH#WT0X QMH3WT*X QMH3WT*X Q*(RWT0X Q0HRWTMX Q*(3WTMX Q0(#WT*X Q*(#WT*X QMHRWTMX Q*(3WT*X Q0H3WT*X Q*H#WT*X QM(#WTMX QM(#WTMX Q*H3WT0X Q*H3WTMX Q0(3WTMX QMH#WT0X Q0HRWT*X Q*H#WT0X Q0(#WT0X Q*(RWT0X IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG J1K ^1K JPK JPK JPK J1K 5PK 51K ^1K 5PK JPK ^PK J1K ^PK J1K J1K ^PK JPK 51K JPK ^1K 5PK ^1K 51K JPK J1K ^PK J1K ^1K 51K J1K JPK ^PK 5PK 5PK JPK J1K ^1K JPK JPK JPK J1K 5PK 51K ^1K 5PK JPK ^PK J1K QWDJ QWD5 QWDJ QWDJ QWD5 QWDJ QWD5 QWD^ QWD5 QWDJ QWD^ QWD5 QWD5 QWDJ QWD5 QWD^ QWD5 QWDJ QWD^ QWD5 QWD^ QWDJ QWD5 QWD5 QWD5 QWD5 QWDJ QWD^ QWDJ QWD5 QWD^ QWD5 QWDJ QWD^ QWD5 QWD5 QWDJ QWD5 QWDJ QWDJ QWD5 QWDJ QWD5 QWD^ QWD5 QWDJ QWD^ QWD5 QWD5 VTM0X1Q VT00XPQ VTMMXPQ VT*MXPQ VT0MXPQ VT*0X1Q VT0MXPQ VTMMX1Q VT00X1Q VT00XPQ VT0*X1Q VT**XPQ VTM0XPQ VTMMXPQ VTM0XPQ VT**XPQ VTM0X1Q VT00X1Q VTM0XPQ VT*MX1Q VTM0XPQ VT*0X1Q VT0*XPQ VTM0X1Q VT*MX1Q VT*MXPQ VT**XPQ VTM0XPQ VTM0XPQ VTM*XPQ VTM0X1Q VT**X1Q VT*MXPQ VTMMX1Q VT0*XPQ VT0MX1Q VTM0X1Q VT00XPQ VTMMXPQ VT*MXPQ VT0MXPQ VT*0X1Q VT0MXPQ VTMMX1Q VT00X1Q VT00XPQ VT0*X1Q VT**XPQ VTM0XPQ G1W GPW G1W G1W GPW G1W GPW GPW GPW GPW GPW GPW G1W GPW G1W G1W GPW G1W G1W GPW GPW GPW GPW GPW G1W GPW GPW G1W G1W GPW GPW GPW G1W GPW G1W G1W G1W GPW G1W G1W GPW G1W GPW GPW GPW GPW GPW GPW G1W CNO* C&OM CNO0 CNO0 C&OM C4O0 C4O0 CNOM C4O* C4OM C&O0 CNO0 CNO* CNOM C4OM C4O* CNO* C&O* C4OM CNO* C4OM C4OM C4O* C&O0 CNOM C&O0 C&O* C&OM C&OM C4O* C4O* C4OM C4O0 C&OM C&O* CNO0 CNO* C&OM CNO0 CNO0 C&OM C4O0 C4O0 CNOM C4O* C4OM C&O0 CNO0 CNO* %1 %1 21 %1 2P 21 21 LP %1 %P %1 LP %1 L1 L1 L1 %1 L1 %P %1 L1 LP L1 2P LP %1 %1 %P LP %1 %P L1 21 2P LP %1 %1 %1 21 %1 2P 21 21 LP %1 %P %1 LP %1 1L5MT# 1LJ*T3 1%^MT# 1%5*T3 1LJ*TR 12^MT3 1L5*T3 1LJ*T3 1LJMT3 PL50T3 PL50TR 1%^MT3 12J0TR P%J*T# 1L^0TR 1LJMT# 1250TR P2^*T# 1L5*TR 12^MT# P%^0TR P%^*TR P250TR P%5MT3 PL5*T3 1250TR P25*TR 1%^*T# PL5MT3 P2^0T# 1250TR P2J*TR 12^MT# P%^0TR P2J0T# 1L5MT3 1L5MT# 1LJ*T3 1%^MT# 1%5*T3 1LJ*TR 12^MT3 1L5*T3 1LJ*T3 1LJMT3 PL50T3 PL50TR 1%^MT3 12J0TR Y12 )PL Y1% Y1% )1% )1% !1% !PL )P% YPL Y1L !PL !P2 !P2 )12 YP% YPL !1L )PL )1L )1% YP2 )1% YP% )PL )P2 )P% !P% )P2 )1L YP2 !P2 !P% )1% !PL YP% Y12 )PL Y1% Y1% )1% )1% !1% !PL )P% YPL Y1L !PL !P2 IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG IG JPK 5PK J1K ^PK J1K JPK 5PK JPK JPK JPK JPK ^PK ^PK 5PK ^PK J1K ^1K 51K ^PK 51K J1K 5PK 5PK J1K ^1K ^PK ^PK 51K JPK ^1K JPK J1K ^PK ^1K JPK ^PK JPK 5PK J1K ^PK J1K JPK 5PK JPK JPK JPK JPK ^PK ^PK QWD^ QWD^ QWD^ QWD^ QWDJ QWD^ QWD^ QWD^ QWDJ QWDJ QWD5 QWD^ QWDJ QWD5 QWDJ QWDJ QWD^ QWD5 QWD5 QWD^ QWD5 QWD^ QWD^ QWDJ QWD^ QWDJ QWD5 QWD^ QWDJ QWD^ QWD5 QWDJ QWDJ QWD5 QWD5 QWD^ QWD^ QWD^ QWD^ QWD^ QWDJ QWD^ QWD^ QWD^ QWDJ QWDJ QWD5 QWD^ QWDJ G1W G1W G1W G1W G1W GPW GPW GPW G1W G1W G1W G1W G1W GPW G1W GPW G1W GPW G1W GPW G1W GPW GPW GPW G1W G1W GPW GPW G1W G1W G1W GPW G1W G1W GPW G1W G1W G1W G1W G1W G1W GPW GPW GPW G1W G1W G1W G1W G1W D(! DHY D(! DH! DHY D() D(! DH) DH! D() D() D() D(Y DHY D() D(Y DH! D() DH! DHY DH! DH! D() D(Y DH) D(! DHY DH! D(! DH! D(! DHY D(Y D(Y DHY DHY D(! DHY D(! DH! DHY D() D(! DH) DH! D() D() D() D(Y DPMTDM D1*TD* D10TD0 D1MTD* D1MTDM DP0TD* D1*TD* D10TD0 DP0TD* DPMTD* DP0TD0 DP*TD* DP*TDM DP*TDM DP0TD0 D1MTD0 D1MTDM D1MTD* D1MTD0 DP0TDM DPMTD* D1*TD* D1MTD0 DP*TD0 D1MTD* D1*TD0 D1*TDM D1MTDM D1*TD0 D1MTDM D1MTD0 D1*TD* D1*TDM DPMTD0 DP0TD* D10TD* DPMTDM D1*TD* D10TD0 D1MTD* D1MTDM DP0TD* D1*TD* D10TD0 DP0TD* DPMTD* DP0TD0 DP*TD* DP*TDM P%J*T3 P%^MT# P%^MT# P%5*T3 P%5*TR 125*TR 1L^*T3 P2JMTR 1%J*T3 1%5MT3 P25MT# 1%^*T3 PLJ*T# 12^0TR 1%5*T3 1L5*T# 1%^0TR P2^0TR 1%J0T# P%5*TR 12JMTR PL5*TR PL^0T3 1250T# P2^0TR P2^MT# P%50T# PL^0T3 P25*T# PL5MT# P%^MTR P%^*T# P%^MT# 1%JMTR PLJ*T3 P%JMT3 P%J*T3 P%^MT# P%^MT# P%5*T3 P%5*TR 125*TR 1L^*T3 P2JMTR 1%J*T3 1%5MT3 P25MT# 1%^*T3 PLJ*T# %P %P %1 2P %1 L1 L1 2P %1 %1 LP %P LP 2P %P L1 %P 21 L1 LP L1 %1 L1 21 %1 21 2P %1 2P %1 2P 21 %P 2P %1 %1 %P %P %1 2P %1 L1 L1 2P %1 %1 LP %P LP X1 XP XP XP X1 X1 X1 XP XP X1 XP XP X1 X1 XP XP XP XP XP XP XP X1 XP XP XP XP XP X1 XP XP XP XP XP X1 XP XP X1 XP XP XP X1 X1 X1 XP XP X1 XP XP X1 K5H% K^(2 KJHL K^H2 KJ(L K^H2 K5H2 K^H2 K5(L K^(L KJ(% KJH% K5(L K^H% K^HL K^H% K^H% KJH% KJ(2 KJH2 K^HL K5(L K^HL K5H% K^(2 KJ(L K^HL K^H2 K5H% K^(L K^(% KJ(2 K5(L K5(L K^H% KJ(% K5H% K^(2 KJHL K^H2 KJ(L K^H2 K5H2 K^H2 K5(L K^(L KJ(% KJH% K5(L GPW GPW GPW GPW GPW G1W GPW G1W GPW GPW GPW GPW GPW G1W G1W GPW G1W GPW G1W G1W GPW G1W GPW GPW G1W G1W G1W G1W GPW G1W GPW GPW G1W G1W G1W GPW GPW GPW GPW GPW GPW G1W GPW G1W GPW GPW GPW GPW GPW KH)2 K(Y% K()2 KH!2 K(!L K()L K(!% KH)% KH!L K(Y2 KH)2 KH)2 KH)2 K(!% K()2 K()% K(!% KHY2 KH)2 K(Y% KH!2 KH)% KH!% KHY% KHYL K(Y% K(Y2 K(!L K(YL KH)2 K(Y% K(Y2 KH!% KH!2 K()2 KH)% KH)2 K(Y% K()2 KH!2 K(!L K()L K(!% KH)% KH!L K(Y2 KH)2 KH)2 KH)2 Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L % T W 0 T C T M ( 2 ) * 3 # N 3 Q 0 ( R W T 0 X Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L % T W 0 T R C T M ( 2 ) * 3 # N 3 Q 0 ( R W T 0 X Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L % T W 0 T R U C T M ( 2 ) * 3 # N 3 Q 0 ( R W T 0 X Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L % T W 0 T R U E C T M ( 2 ) * 3 # N 3 Q 0 ( R W T 0 X Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L % T W 0 T R U E C T M ( 2 ) * 3 # G R E A T N E S S N 3 I S Q 0 ( R W T 0 X M E A S U R E D Homophonic Substitution Cipher – Decrypt ABCDEFGHIJKLMNOPQRSTUVWXYZ HIDXMVCJNUESQYPZBTRLWOKFGA ( * 5& !1 3% 0 ^4 ) #2 %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() 125*T# %1 XP KJ(2 GPW KH!L TRUE GREATNESS IS MEASURED BY HOW MUCH GIVE TO OTHERS NOT BY HOW MUCH YOU CAN OTHERS TO DO WHAT YOU WANT VT0MXPQ G1W D1MTD0 FREEDOM YOU COERCE Homophonic Substitution Cipher - Summary • (Not Quite But Mostly) Symmetric Encryption • Same Key Used for Encryption and Decryption • Complexity Introduced Due to Homophones • Length of Alphabet > Length of Key • Additional “Letters” are needed to accommodate Homophones • Vulnerable to Frequency Analysis? Homophonic Substitution Cipher – Frequency Analysis TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 20 10 0 A B C D E F G H LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 20 10 0 C D G H %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L I M N O R S T U V W Y I J K L M N O P Q R T V W X Y 10 5 0 0 1 2 3 5 P W T D GMQ ( K J X % ! N ) C I * L # H ^ R V O Homophonic Substitution Cipher – Frequency Analysis TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 20 10 0 A B C D E F G H LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 20 10 0 C D G H %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L I M N O R S T U V W Y I J K L M N O P Q R T V W X Y 10 5 0 0 1 2 3 5 P W T D GMQ ( K J X % ! N ) C I * L # H ^ R V O Homophonic Substitution Cipher – Frequency Analysis TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 20 10 0 A B C D E F G H LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 20 10 0 C D G H %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L I M N O R S T U V W Y I J K L M N O P Q R T V W X Y 10 5 0 0 1 2 3 5 P W T D GMQ ( K J X % ! N ) C I * L # H ^ R V O Substitution Cipher – Frequency Analysis 4 0 4 2 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 2 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 4 2 0 12 25 WD GP XP DJ QW MT PW KQ IG PK (2 T0 5% #% *T OM 5M 5* )* CN %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L Substitution Cipher – Frequency Analysis 4 0 4 2 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 2 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 4 2 0 12 25 WD GP XP DJ QW MT PW KQ IG PK (2 T0 5% #% *T OM 5M 5* )* CN %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L Substitution Cipher – Frequency Analysis 4 0 4 2 0 DJ GJ GP HL HY IG JM JP KQ LJ LP MH MT MX PK PL PW QW TM TR WD XP LTWM CTMHLYMRR NR QMHRWTMX IG JPK QWDJ VTMMXPQ GPW CNOM LP PLJMTR YPL IG JPK QWDJ GPW DHY DPMTDM PLJMTR LP XP KJHL GPW KHYL 2 AN AT BY CH DO EA ED ER HE HO MU OT OU OW RE RS TH TO UC WM YH YO TRUE GREATNESS IS MEASURED BY HOW MUCH FREEDOM YOU GIVE TO OTHERS NOT BY HOW MUCH YOU CAN COERCE OTHERS TO DO WHAT YOU WANT 4 2 0 12 25 WD GP XP DJ QW MT PW KQ IG PK (2 T0 5% #% *T OM 5M 5* )* CN %TW0 CTM(2)*3# N3 Q0(RWT0X IG 5PK QWDJ VT0MXPQ G1W CNOM 2P P%5MT3 !PL IG ^1K QWDJ GPW D() D1MTD0 125*T# %1 XP KJ(2 GPW KH!L Zodiac Killer – Biographical Information • Zodiac Killer • Active Late 1960s – Early 1970s • Northern California • Victims Wikipedia • Confirmed 5 Murders – 2 Attacked But Escaped • Claimed 37 Murders aftermath.com • Investigated By • • • • San Francisco Police Department United States Navy Federal Bureau of Investigation Fun Loving Amateur Cryptographers! Revenge of the Nerds Zodiac Killer – History of Z408 Cipher • August 1st 1969 - 3 Letters Were Received By Major Newspapers • Vallejo Times Herald • The San Francisco Examiner • San Francisco Chronicle zodiackillerciphers.com Zodiac Killer – History of Z408 Cipher • If not Published, Zodiac Killer Threatened to • “cruse [sic] around all weekend killing lone people in the night then move on to kill again, until I end up with a dozen people over the weekend” • In materials that accompanied the letters, Zodiac Killer claims that the encrypted messages contain his identity. • All three letters are published zodiackillerciphers.com Zodiac Killer – Analysis of Z408 Cipher • Three parts • Unique • In Unknown Order • All Contain Exactly 136 Characters • Expanded Alphabet • Hints towards Homophonic Substitution Cipher • Why would he uses a Homophonic Substitution Cipher? zodiackillerciphers.com Zodiac Killer – Analysis of Z408 Cipher • Due to “Strange” Characters, Remap each Z408 Letter to a Computer Friendly Letter • Single Letter Frequency 18 16 14 12 10 8 6 4 2 0 5 6 7 8 9 q R B % I P # e U Y VW E k X _ ) A L M Z + H O = t T r G / p d c S J @ ^ N F D l ! Q \ K ( z f j Zodiac Killer – Analysis of Z408 Cipher • Due to “Strange” Characters, Remap each Z408 Letter to a Computer Friendly Letter • BiGram Frequency 7 6 5 4 3 2 1 0 9% 85 #B %% )S /9 @X ^R _T 6q 9# A9 AP B% BP BV c+ cZ DR eG EH GY HM I) Ik L) LM OR P# PO q_ qE qG qW r\ r9 RU S( Tt TY UI VE VW WI Wq WV Xq Zodiac Killer – Solution of Z408 Cipher • Frequency Analysis is a bust! • Or is it…? • Frequency Analysis in concert with a Known Plaintext attack • If you were a homicidal serial killer with severe mental problems, a superiority complex, reaching out for help so that someone can stop you, AND a flair for cryptography, what do you think would be the most common word in your lexicon? • Hint – It’s not “Perl” :p Zodiac Killer – Solution of Z408 Cipher 10 5 0 9% 85 #B %% )S /9 @X ^R _T 6q 9# A9 AP B% BP BV c+ cZ DR eG EH GY HM I) Ik L) LM OR P# PO q_ qE qG qW r\ r9 RU S( Tt TY UI VE VW WI Wq WV Xq / 9 # B ? ? L L A 9 # B ? ? L L / P # B ? ? L L A P # B ? ? L L Q S # B ? ? L L r 9 # B ? ? L L Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z 9 % P / Z / U B % k O R = p X = B W V + e G Y F 6 9 H P@ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( / 9 # B P O R A U% f R l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D 9 K I ) 6 q X 8 5 z S ( R N t I Y E l O 8 q G B T Q S # B L d / P # B @ X q E HMU ^ R R k c Z K q p I ) Wq ! 8 5 L M r 9 # B P D R + j = 6 \ N ( e E U H k F Z c p O V W I 5 + t L ) l ^ R 6 H I 9 D R _ T Y r \ d e / @ X J Q A P 5 M 8 R U t % L ) N V E K H = G r I ! J k 5 9 8 L M l N A ) Z ( P z U p k A 9 # B VW\ + V T t O P ^ = S r l f U e 6 7 D z G %% I M N k ) S c E / 9 %% Z f A P # B V p e X q W q _ F # 8 c + @ 9 A 9 B % O T 5 R U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A 9 % # L t _ H ! F B X 9 z X A D d \ 7 L ! = q _ e d # # 6 e 5 P O R X Q F %G c Z @ J T t q _ 8 J I + r B P QW 6 V E X r 9 W I 6 q E HM ) = U I k 9 % P / Z / U L % k O R = p X = L W V + e G Y F 6 9 H P@ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( / 9 L L P O R A U% f R l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D 9 K I ) 6 q X 8 5 z S ( R N t I Y E l O 8 q G L T Q S L L L d / P L L @ X q E HMU ^ R R k c Z K q p I ) Wq ! 8 5 L M r 9 L L P D R + j = 6 \ N ( e E U H k F Z c p O V W I 5 + t L ) l ^ R 6 H I 9 D R _ T Y r \ d e / @ X J Q A P 5 M 8 R U t % L ) N V E K H = G r I ! J k 5 9 8 L M l N A ) Z ( P z U p k A 9 L L VW\ + V T t O P ^ = S r l f U e 6 7 D z G %% I M N k ) S c E / 9 %% Z f A P L L V p e X q W q _ F L 8 c + @ 9 A 9 L % O T 5 R U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A 9 % L L t _ H ! F L X 9 z X A D d \ 7 L ! = q _ e d L L 6 e 5 P O R X Q F %G c Z @ J T t q _ 8 J I + r L P QW 6 V E X r 9 W I 6 q E HM ) = U I k Zodiac Killer – Solution of Z408 Cipher 10 5 0 9% 85 #B %% )S /9 @X ^R _T 6q 9# A9 AP B% BP BV c+ cZ DR eG EH GY HM I) Ik L) LM OR P# PO q_ qE qG qW r\ r9 RU S( Tt TY UI VE VW WI Wq WV Xq / 9 # B K I L L A 9 # B ? I L L / P # B K I L L A P # B ? I L L Q S # B ? ? L L r 9 # B ? I L L Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L K I L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z I 9 % P / Z / U L % k O R = p X = L W V + e G Y F 6 9 H P@ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( / 9 L L P O R A U% f R l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D 9 K I ) 6 q X 8 5 z S ( R N t I Y E l O 8 q G L T Q S L L L d / P L L @ X q E HM U ^ R R k c Z K q p I ) Wq ! 8 5 L M r 9 L L P D R + j = 6 \ N ( e E U H k F Z c p O V W I 5 + t L ) l ^ R 6 H I 9 D R _ T Y r \ d e / @ X J Q A P 5 M 8 R U t % L ) N V E K H = G r I ! J k 5 9 8 L M l N A ) Z ( P z U p k A 9 L L VW\ + V T t O P ^ = S r l f U e 6 7 D z G %% I M N k ) S c E / 9 %% Z f A P L L V p e X q W q _ F L 8 c + @ 9 A 9 L % O T 5 R U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A 9 % L L t _ H ! F L X 9 z X A D d \ 7 L ! = q _ e d L L 6 e 5 P O R X Q F % G c Z @ J T t q _ 8 J I + r L P QW 6 V E X r 9 W I 6 q E HM ) = U I k I % I K Z K U L % k O R = p X = L W V + e G Y F 6 I H I @ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( K I L L I O R A U% f R l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D I K I ) 6 q X 8 5 z S ( R N t I Y E l O 8 q G L T Q S L L L d K I L L @ X q E HMU ^ R R k c Z K q p I ) Wq ! 8 5 L M r I L L I D R + j = 6 \ N ( e E U H k F Z c p O V W I 5 + t L ) l ^ R 6 H I I D R _ T Y r \ d e K @ X J Q A I 5 M 8 R U t % L ) N V E K H = G r I ! J k 5 I 8 L M l N A ) Z ( I z U p k A I L L VW\ + V T t O I ^ = S r l f U e 6 7 D z G %% I M N k ) S c E K I %% Z f A I L L V p e X q W q _ F L 8 c + @ I A I L % O T 5 R U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A I % L L t _ H ! F L X I z X A D d \ 7 L ! = q _ e d L L 6 e 5 I O R X Q F %G c Z @ J T t q _ 8 J I + r L I QW 6 V E X r I W I 6 q E HM ) = U I k Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L K I L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I % I K Z K U L % k O R = p X = L W V + e G Y F 6 I H I @ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( K I L L I O R A U% f R l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D I K I ) 6 q X 8 5 z S ( R N t I Y E l O 8 q G L T Q S L L L d K I L L @ X q E HMU ^ R R k c Z K q p I ) Wq ! 8 5 L M r I L L I D R + j = 6 \ N ( e E U H k F Z c p O V W I 5 + t L ) l ^ R 6 H I I D R _ T Y r \ d e K@ X J Q A I 5 M 8 R U t % L ) N V E K H = G r I ! J k 5 I 8 L M l N A ) Z ( I z U p k A I L L VW\ + V T t O I ^ = S r l f U e 6 7 D z G %% I M N k ) S c E K I %% Z f A I L L V p e X q W q _ F L 8 c + @ I A I L % O T 5 R U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A I % L L t _ H ! F L X I z X A D d \ 7 L ! = q _ e d L L 6 e 5 I O R X Q F % G c Z @ J T t q _ 8 J I + r L I QW 6 V E X r I W I 6 q E HM ) = U I k I % I K Z K U L % k N W V + e G Y F 6 I H I M J Y ^ U I k 7 q T t S ( K I L L I N G A U k ^ L M Z J d r \ p F @ + q G D I K I ) 6 q G N t I Y E l N 8 q G L d K I L L @ X q E H c Z K q p I ) Wq ! 8 L I D G + j = 6 \ N ( Z c p N V W I 5 + t L I I D G _ T Y r \ d e I 5 M 8 G U t % L ) N r I ! J k 5 I 8 L M l z U p k A I L L VW \ ^ = S r l f U e 6 7 D N k ) S c E K I %% Z p e X q W q _ F L 8 c % N T 5 G U c + _ d Y V Z e G Y K E _ T Y A H ! F L X I z X A D d _ e d L L 6 e 5 I N G Z @ J T t q _ 8 J I + V E X r I W I 6 q E H G = p X = L @ K ! q Y e N Q Y D 5 ) % f G l q E H V We 8 Y X 8 5 z S ( L T Q S L L MU ^ G G k 5 L M r I L e E U H k F ) l ^ G 6 H K @ X J Q A V E K H = G N A ) Z ( I + V T t N I z G %% I M f A I L L V + @ I A I L q _ ^ S q W I % L L t _ \ 7 L ! = q X Q F % G c r L I QW 6 M ) = U I k Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I % I K Z K U L % k NG = p X = L W V + e G Y F 6 I H I @ K ! q Y e M J Y ^ U I k 7 q T t N Q Y D 5 ) S ( K I L L I N G A U% f G l q E k ^ L M Z J d r \ p F H V We 8 Y @ + q G D I K I ) 6 q X 8 5 z S ( G N t I Y E l N 8 q G L T Q S L L L d K I L L @ X q E HMU ^ G G k c Z K q p I ) Wq ! 8 5 L M r I L L I D G + j = 6 \ N ( e E U H k F Z c p N V W I 5 + t L ) l ^ G 6 H I I D G _ T Y r \ d e K@ X J Q A I 5 M 8 G U t % L ) N V E K H = G r I ! J k 5 I 8 L M l N A ) Z ( I z U p k A I L L VW\ + V T t N I ^ = S r l f U e 6 7 D z G %% I M N k ) S c E K I %% Z f A I L L V p e X q W q _ F L 8 c + @ I A I L % N T 5 G U c + _ d Y q _ ^ S q W V Z e G Y K E _ T Y A I % L L t _ H ! F L X I z X A D d \ 7 L ! = q _ e d L L 6 e 5 I N G X Q F % G c Z @ J T t q _ 8 J I + r L I QW 6 V E X r I W I 6 q E HM ) = U I k I L I K Z K U L L W V + e G Y F 6 I M J Y ^ U I k 7 q S ( K I L L I N G k ^ L M Z J d r \ @ + q G D I K I ) G N t I Y E l N 8 L d K I L L @ X q c Z K q p I ) Wq L I D G + j = 6 \ Z c p N V W I 5 + I I D G _ T Y r \ I 5 M 8 G U t L L r I ! J k 5 I 8 L z U p k A I L L V ^ = S r l f U e 6 N k ) S c E K I L p e X q W q _ F L L N T 5 G U c + _ V Z e G Y K E _ T H ! F L X I z X A _ e d L L 6 e 5 I Z @ J T t q _ 8 J V E X r I W I 6 q k N H I T t A U p F 6 q q G E H ! 8 N ( t L d e ) N M l W \ 7 D L Z 8 c d Y Y A D d N G I + E H G = p X = L @ K ! q Y e N Q Y D 5 ) L f G l q E H V We 8 Y X 8 5 z S ( L T Q S L L MU ^ G G k 5 L M r I L e E U H k F ) l ^ G 6 H K @ X J Q A V E K H = G N A ) Z ( I + V T t N I z G L L I M f A I L L V + @ I A I L q _ ^ S q W I L L L t _ \ 7 L ! = q X Q F L G c r L I QW 6 M ) = U I k Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E I I L I K Z K U L W V + e G Y F 6 M J Y ^ U I k 7 S ( K I L L I N k ^ L M Z J d r @ + q G D I K I G N t I Y E l N L d K I L L @ X c Z K q p I ) W L I D G + j = 6 Z c p N V W I 5 I I D G _ T Y r I 5 M 8 G U t L r I ! J k 5 I 8 z U p k A I L L ^ = S r l f U e N k ) S c E K I p e X q W q _ F L N T 5 G U c + V Z e G Y K E _ H ! F L X I z X _ e d L L 6 e 5 Z @ J T t q _ 8 V E X r I W I 6 L I q G \ ) 8 q q \ + \ L L V 6 L L _ T A I J q k NG = p X H I @ K ! q T t N Q Y D A U L f G l p F H V We 6 q X 8 5 z q G L T Q S E HMU ^ G ! 8 5 L M r N ( e E U H t L ) l ^ G d e K@ X J ) N V E K H M l N A ) Z W\ + V T t 7 D z G L L L Z f A I L 8 c + @ I A d Y q _ ^ S Y A I L L L D d \ 7 L ! N G X Q F L I + r L I Q E HM ) = U = L Y e 5 ) q E 8 Y S ( L L G k I L k F 6 H Q A = G ( I N I I M L V I L q W t _ = q G c W 6 I k I L I K E K I L L W V + e G Y F 6 I M J Y ^ I I I 7 q S ( K I L L I N G I ^ L M E J d r \ @ + q G D I K I ) G N t I Y E l N 8 L d K I L L @ X q c E K q p I ) Wq L I D G + j = 6 \ E c p N V W I 5 + I I D G _ T Y r \ I 5 M 8 G I t L L r I ! J I 5 I 8 L z I p I A I L L V ^ = S r l f I e 6 N I ) S c E K I L p e X q W q _ F L L N T 5 G I c + _ V E e G Y K E _ T H ! F L X I z X A _ e d L L 6 e 5 I E @ J T t q _ 8 J V E X r I W I 6 q I N H I T t A I p F 6 q q G E H ! 8 N ( t L d e ) N M l W \ 7 D L E 8 c d Y Y A D d N G I + E H G = p X = L @ K ! q Y e N Q Y D 5 ) L f G l q E H V We 8 Y X 8 5 z S ( L T Q S L L M I ^ G G I 5 L M r I L e E I H I F ) l ^ G 6 H K @ X J Q A V E K H = G N A ) E ( I + V T t N I z G L L I M f A I L L V + @ I A I L q _ ^ S q W I L L L t _ \ 7 L ! = q X Q F L G c r L I QW 6 M ) = I I I Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I I L I K E W V + e G M J Y ^ I S ( K I L I ^ L M E @ + q G D G N t I Y L d K I L c E K q p L I D G + E c p N V I I D G _ I 5 M 8 G r I ! J I z I p I A ^ = S r l N I ) S c p e X q W L N T 5 G V E e G Y H ! F L X _ e d L L E @ J T t V E X r I K I L Y F 6 I I 7 L I N J d r I K I E l N L @ X I ) W j = 6 W I 5 T Y r I t L 5 I 8 I L L f I e E K I q _ F I c + K E _ I z X 6 e 5 q _ 8 W I 6 L I q G \ ) 8 q q \ + \ L L V 6 L L _ T A I J q I NG = p H I @ K ! T t N Q Y A I L f G p F H V W 6 q X 8 5 q G L T Q E HM I ^ ! 8 5 L M N ( e E I t L ) l ^ d e K @ X ) N V E K M l N A ) W \ + V T 7 D z G L L E f A I 8 c + @ I d Y q _ ^ Y A I L L D d \ 7 L N G X Q F I + r L I E HM ) = X q D l e z S G r H G J H E t L L A S L ! L Q I = Y 5 q 8 S L G I I 6 Q = ( N I L I q t = G W I L e ) E Y ( L I L F H A G I I M V L W _ q c 6 I I L I W V + M J Y S ( K I ^ L @ + q G N t L d K c E K L I D E c p I I D I 5 M r I ! z I p ^ = S N I ) p e X L N T V E e H ! F _ e d E @ J V E X K E K I L e G Y F 6 ^ I I I 7 I L L I N M E J d r G D I K I I Y E l N I L L @ X q p I ) W G + j = 6 N V W I 5 G _ T Y r 8 G I t L J I 5 I 8 I A I L L r l D I e S c E K I q W q _ F 5 G I c + G Y K E _ L X I z X L L 6 e 5 T t q _ 8 r I W I 6 L I q G \ ) 8 q q \ + \ L L V 6 L L _ T A I J q I H T A p 6 q E ! N t d ) M W 7 L 8 d Y D N I E N I t I F q G H 8 ( L e N l \ D E c Y A d G + H G = p X = L @ K ! q Y e N Q Y D 5 ) L D G l q E H V We 8 Y X 8 5 z S ( L T Q S L L M I ^ G G I 5 L M r I L e E I H I F ) l ^ G 6 H K @ X J Q A V E K H = G N A ) E ( I + V T t N I z G L L I M D A I L L V + @ I A I L q _ ^ S q W I L L L t _ \ 7 L ! = q X Q F L G c r L I QW 6 M ) = I I I Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I W L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I I L I K E W V + e G M J Y ^ I S ( K I L I ^ L M E @ + q G D G N t I Y L d K I L c E K q p L I D G + E c p N V I I D G _ I 5 M 8 G r I ! J I z I p I A ^ = S r l N I ) S c p e X q W L N T 5 G V E e G Y H ! F L X _ e d L L E @ J T t V E X r I K I L Y F 6 I I 7 L I N J d r I K I E l N L @ X I ) W j = 6 W I 5 T Y r I t L 5 I 8 I L L D I e E K I q _ F I c + K E _ I z X 6 e 5 q _ 8 W I 6 L I q G \ ) 8 q q \ + \ L L V 6 L L _ T A I J q I NG = p H I @ K ! T t N Q Y A I L D G p F H V W 6 q X 8 5 q G L T Q E HM I ^ ! 8 5 L M N ( e E I t L ) l ^ d e K @ X ) N V E K M l N A ) W \ + V T 7 D z G L L E D A I 8 c + @ I d Y q _ ^ Y A I L L D d \ 7 L N G X Q F I + r L I E HM ) = X q D l e z S G r H G J H E t L L A S L ! L Q I = Y 5 q 8 S L G I I 6 Q = ( N I L I q t = G W I L e ) E Y ( L I L F H A G I I M V L W _ q c 6 I I L I W V + M J Y S ( K I ^ L @ + q G N t L d K c E K L I D E c p I I D I 5 M r I ! z I p ^ = S N I ) p e X L N T V E e H ! F _ e d E @ J V E X K E K I L L I N G = p X = L e G Y F 6 I H I @ K ! q Y e ^ I I I 7 q T t N Q Y D 5 ) I L L I N GW I L D G l q E M E J d r \ p F H V We 8 Y G D I K I ) 6 q X 8 5 z S ( I Y E l N 8 q G L T Q S L L I L L @ X q E HM I ^ G G I q p I ) Wq ! 8 5 L M r I L G + j = 6 \ N ( e E I H I F N V W I 5 + t L ) l ^ G 6 H G _ T Y r \ d e K @ X J QW 8 G I t L L ) N V E K H = G J I 5 I 8 L M l NW ) E ( I I W I L L VW \ + V T t N I r l D I e 6 7 D z G L L I M S c E K I L L E D W I L L V q W q _ F L 8 c + @ I W I L 5 G I c + _ d Y q _ ^ S q W G Y K E _ T YW I L L L t _ L X I z XWD d \ 7 L ! = q L L 6 e 5 I N G X Q F L G c T t q _ 8 J I + r L I QW 6 r I W I 6 q E HM ) = I I I Zodiac Killer – Solution of Z408 Cipher • Lets Look at BiGrams • Most Common BiGram in English is ‘TH’ Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I W L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I I L I K E W V + e G M J Y ^ I S ( K I L I ^ L M E @ + q G D G N t I Y L d K I L c E K q p L I D G + E c p N V I I D G _ I 5 M 8 G r I ! J I z I p I W ^ = S r l N I ) S c p e X q W L N T 5 G V E e G Y H ! F L X _ e d L L E @ J T t V E X r I K I L L I NG = p X = Y F 6 I H I @ K ! q Y I I 7 q T t N Q Y D 5 L I N GW I L D G l q J d r \ p F H V W e 8 I K I ) 6 q X 8 5 z S E l N 8 q G L T Q S L L @ X q E HM I ^ G G I ) Wq ! 8 5 L M r I j = 6 \ N ( e E I H I W I 5 + t L ) l ^ G 6 T Y r \ d e K @ X J Q I t L L ) N V E K H = 5 I 8 L M l NW ) E ( I L L VW \ + V T t N D I e 6 7 D z G L L I E K I L L E DW I L L q _ F L 8 c + @ I W I I c + _ d Y q _ ^ S q K E _ T YW I L L L t I z XWD d \ 7 L ! = 6 e 5 I N G X Q F L G q _ 8 J I + r L I QW W I 6 q E HM ) = I I L e ) E Y ( L I L F H W G I I M V L W _ q c 6 I • ‘VW’ 3.5 3 2.5 2 1.5 1 0.5 0 58 85 VW LM qG tL S( qE pV EH c @X I) ( L) r\ 6H MJ Tt Zodiac Killer – Solution of Z408 Cipher • Lets Look at BiGrams • Most Common BiGram in English is ‘TH’ Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I W L O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I I L I K E W V + e G M J Y ^ I S ( K I L I ^ L M E @ + q G D G N t I Y L d K I L c E K q p L I D G + E c p N V I I D G _ I 5 M 8 G r I ! J I z I p I W ^ = S r l N I ) S c p e X q W L N T 5 G V E e G Y H ! F L X _ e d L L E @ J T t V E X r I K I L L I NG = p X = Y F 6 I H I @ K ! q Y I I 7 q T t N Q Y D 5 L I N GW I L D G l q J d r \ p F H V W e 8 I K I ) 6 q X 8 5 z S E l N 8 q G L T Q S L L @ X q E HM I ^ G G I ) Wq ! 8 5 L M r I j = 6 \ N ( e E I H I W I 5 + t L ) l ^ G 6 T Y r \ d e K @ X J Q I t L L ) N V E K H = 5 I 8 L M l NW ) E ( I L L VW \ + V T t N D I e 6 7 D z G L L I E K I L L E DW I L L q _ F L 8 c + @ I W I I c + _ d Y q _ ^ S q K E _ T YW I L L L t I z XWD d \ 7 L ! = 6 e 5 I N G X Q F L G q _ 8 J I + r L I QW W I 6 q E HM ) = I I L e ) E Y ( L I L F H W G I I M V L W _ q c 6 I • ‘VW’ • ‘LM’ 3.5 3 2.5 2 1.5 1 0.5 0 58 85 VW LM qG tL S( qE pV EH c @X I) ( L) r\ 6H MJ Tt Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I W L T H O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I I L I K E W V + e G M J Y ^ I S ( K I L I ^ L M E @ + q G D G N t I Y L d K I L c E K q p L I D G + E c p N V I I D G _ I 5 M 8 G r I ! J I z I p I W ^ = S r l N I ) S c p e X q W L N T 5 G V E e G Y H ! F L X _ e d L L E @ J T t V E X r I K I L L I NG = p X = Y F 6 I H I @ K ! q Y I I 7 q T t N Q Y D 5 L I N GW I L D G l q J d r \ p F H V W e 8 I K I ) 6 q X 8 5 z S E l N 8 q G L T Q S L L @ X q E HM I ^ G G I ) Wq ! 8 5 L M r I j = 6 \ N ( e E I H I W I 5 + t L ) l ^ G 6 T Y r \ d e K @ X J Q I t L L ) N V E K H = 5 I 8 L M l NW ) E ( I L L VW \ + V T t N D I e 6 7 D z G L L I E K I L L E DW I L L q _ F L 8 c + @ I W I I c + _ d Y q _ ^ S q K E _ T YW I L L L t I z XWD d \ 7 L ! = 6 e 5 I N G X Q F L G q _ 8 J I + r L I QW W I 6 q E HM ) = I I L e ) E Y ( L I L F H W G I I M V L W _ q c 6 I I L W V H J S ( I ^ @ + G N T d c E L I E c I I I 5 r I z I ^ = N I p e L N V E H ! _ e E @ V E I + Y K T q t K K D p D H ! p S ) X T e F d J X K e ^ I H G I I q G N G 8 J I r S q 5 G L L T r E K I L L I N G = p X = L G Y F 6 I H I @ K ! q Y e I I I 7 q T t N Q Y D 5 ) L L I N GW I L D G l q E E J d r \ p F H V We 8 Y D I K I ) 6 q X 8 5 z S ( Y E l N 8 q G L T Q S L L L L @ X q E H H I ^ G G I p I ) Wq ! 8 5 T H r I L + j = 6 \ N ( e E I H I F V W I 5 + t T ) l ^ G 6 H _ T Y r \ d e K @ X J QW G I t L T ) N V E K H = G I 5 I 8 T H l NW ) E ( I W I L L VW \ + V T t N I l D I e 6 7 D z G L L I H c E K I L L E D W I L L V W q _ F L 8 c + @ I W I L G I c + _ d Y q _ ^ S q W Y K E _ T YW I L L T t _ X I z XWD d \ 7 T ! = q L 6 e 5 I N G X Q F L G c t q _ 8 J I + r L I QW 6 I W I 6 q E H H ) = I I I Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K I W L N T H O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G I E D I R I L W V H J S ( I ^ @ + G N T d c E L I E c I I I 5 r I z I ^ = N I p e L N V E H ! _ e E @ V E I + Y K T q t K K D p D H ! p S ) X T e F d J X K e ^ I H G I I q G N G 8 J I r S q 5 G L L T r E G I L E D Y L p + V _ G I W l c W G Y X L t I K I L L I NG = p X = Y F 6 I H I @ K ! q Y I I 7 q T t N Q Y D 5 L I N GW I L D G l q J d r \ p F H V W e 8 I K I ) 6 q X 8 5 z S E l N 8 q G L T Q S L L @ X q E H H I ^ G G I ) Wq ! 8 5 T H r I j = 6 \ N ( e E I H I W I 5 + t T ) l ^ G 6 T Y r \ d e K @ X J Q I t L T ) N V E K H = 5 I 8 T H l NW ) E ( I L L VW \ + V T t N D I e 6 7 D z G L L I E K I L L E DW I L L q _ F L 8 c + @ I W I I c + _ d Y q _ ^ S q K E _ T YW I L L T t I z XWD d \ 7 T ! = 6 e 5 I N G X Q F L G q _ 8 J I + r L I QW W I 6 q E H H ) = I I L e ) E Y ( L I L F H W G I I H V L W _ q c 6 I I L W V H J S ( I ^ @ + G N T d c E L I E c I I I 5 R I z I ^ = N I p e L N V E H ! _ e E @ V E I + Y K T q t K K N p N H ! p S ) X T e F d J X K e ^ I H G I I q G N G 8 J I R S q 5 G L L T r E K I L L I N G = p X = L G Y F 6 I H I @ K ! q Y e I I I 7 q T t N Q Y N 5 ) L L I N GW I L D G l q E E J d R \ p F H V We 8 Y N I K I ) 6 q X 8 5 z S ( Y E l N 8 q G L T Q S L L L L @ X q E H H I ^ G G I p I ) Wq ! 8 5 T H R I L + j = 6 \ N ( e E I H I F V W I 5 + t T ) l ^ G 6 H _ T Y R \ d e K @ X J QW G I t L T ) N V E K H = G I 5 I 8 T H l NW ) E ( I W I L L VW \ + V T t N I l D I e 6 7 N z G L L I H c E K I L L E D W I L L V W q _ F L 8 c + @ I W I L G I c + _ d Y q _ ^ S q W Y K E _ T YW I L L T t _ X I z XWN d \ 7 T ! = q L 6 e 5 I N G X Q F L G c t q _ 8 J I + R L I QW 6 I W I 6 q E H H ) = I I I Zodiac Killer – Solution of Z408 Cipher Decryption Key ! # % ( ) + / 5 6 7 8 9 = @ A B D E F G H I J K L M N L L K T I W L N T H O P Q R S T U V W X Y Z \ ^ _ c d e f j k l p q r t z N I G O I E O D I R I L W V H J S ( I ^ @ + G N T d c E L I E c I I I 5 R I z I ^ = N I p e L N V E H ! _ e E @ V E I + Y K T q t K K N p N H ! p S ) X T e F d J X K e ^ I H G I I q G N G 8 J I R S q 5 G L L T r E G I L E N Y L p + V _ G I W l c W G Y X L t I K I L L I NG = p X = Y F 6 I H I @ K ! q Y I I 7 q T t N Q Y N 5 L I N GW I L D G l q J d R \ p F H V W e 8 I K I ) 6 q X 8 5 z S E l N 8 q G L T Q S L L @ X q E H H I ^ G G I ) Wq ! 8 5 T H R I j = 6 \ N ( e E I H I W I 5 + t T ) l ^ G 6 T Y R \ d e K @ X J Q I t L T ) N V E K H = 5 I 8 T H l NW ) E ( I L L VW \ + V T t N D I e 6 7 N z G L L I E K I L L E DW I L L q _ F L 8 c + @ I W I I c + _ d Y q _ ^ S q K E _ T YW I L L T t I z XWN d \ 7 T ! = 6 e 5 I N G X Q F L G q _ 8 J I + R L I QW W I 6 q E H H ) = I I L e ) E Y ( L I L F H W G I I H V L W _ q c 6 I I L WV H J S ( I ^ @ + G N T O c E L I E c I I I T R I z I ^ = N I p e L N V E H ! _ e E @ V E I + Y K T q t K K N p N H ! p S ) X O e F O J X K e ^ I H G I I q G N G 8 J I R S q T G L L O r E K I L L I N G = p X = L G Y F 6 I H I @ K ! q Y e I I I 7 q O t N Q Y N T ) L L I N GW I L D G l q E E J O R \ p F H V We 8 Y N I K I ) 6 q X 8 T z S ( Y E l N 8 q G L O Q S L L L L @ X q E H H I ^ G G I p I ) Wq ! 8 T T H R I L + j = 6 \ N ( e E I H I F V W I T + t T ) l ^ G 6 H _ O Y R \ O e K @ X J QW G I t L T ) N V E K H = G I T I 8 T H l NW ) E ( I W I L L VW\ + V O t N I l D I e 6 7 N z G L L I H c E K I L L E DW I L L V W q _ F L 8 c + @ I W I L G I c + _ O Y q _ ^ S q W Y K E _ O YW I L L T t _ X I z XWN O \ 7 T ! = q L 6 e T I N G X Q F L G c t q _ 8 J I + R L I QW 6 I W I 6 q E H H ) = I I I Zodiac Killer – Solution of Z408 Cipher • Donald and Bettye Harden • High School History and Economics Teacher • Cracked the Cipher in 8 Days I LIKE KILLING PEOPLE BECAUSE IT IS SO MUCH FUN IT IS MORE FUN THAN KILLING WILD GAME IN THE FORREST BECAUSE MAN IS THE MOST DANGEROUE ANAMAL OF ALL TO KILL SOMETHING GIVES ME THE MOST THRILLING EXPERENCE IT IS EVEN BETTER THAN GETTING YOUR ROCKS OFF WITH A GIRL THE BEST PART OF IT IS THAE WHEN I DIE I WILL BE REBORN IN PARADICE AND THEI HAVE KILLED WILL BECOME MY SLAVES I WILL NOT GIVE YOU MY NAME BECAUSE YOU WILL TRY TO SLOI DOWN OR ATOP MY COLLECTIOG OF SLAVES FOR MY AFTERLIFE EBEORIETEMETHHPITI zodiackillerciphers.com Zodiac Killer – Solution of Z408 Cipher • The Final 18 Characters • No Agreed Upon Solution/Meaning • Possibilities • Filler for Sizing • The Zodiac Killer’s Real Name • As an anagram • Encrypted with another cipher • Due to small size, we’ll likely never know conclusively EBEORIETEMETHHPITI Closing Thoughts • Homophonic Substitution is an effective, but imperfect cipher • Very challenging to write a program to solve • Creating a Fitness Function • Based on Letter Frequencies • Ngram Frequencies • Large Solution Space • BTW… • The Zodiac Killer was never caught • OMG What’s that behind you!!! • Questions? References / Links • Web Based Frequency Analysis • http://www.dcode.fr/frequency-analysis • English Language Letter Frequency • https://en.wikipedia.org/wiki/Letter_frequency • English Language Bigram Frequency • http://norvig.com/mayzner.html • Newspaper Article About z408 Solution • https://www.flickr.com/photos/seanutbutter/2462841231 • Zodiac Killer Cipher Wiki • http://zodiackillerciphers.com/wiki/index.php?title=Main_Page
© Copyright 2026 Paperzz