Bacon Cipher (Baconian)

A steganographic-style cipher that encodes letters as patterns of A and B (often hidden in text styling).

Family: Encoding / Steganography (binary pattern mapping) Era: 1600s (Francis Bacon), modern puzzle usage Strength: Weak (pattern extraction is the main challenge)

History & context

Bacon’s cipher is historically famous because it’s as much about hiding a message as encrypting it. The classic idea is to encode letters using two symbols (A/B), often disguised as two text styles (uppercase/lowercase, bold/normal, serif/sans). In modern puzzles, the hardest part isn’t the substitution—it’s noticing the two-channel signal and extracting it cleanly.

How Bacon Cipher (Baconian) works

1) Decide which visible feature means A vs B (e.g., lowercase=A, uppercase=B). 2) Read the cover text and convert each character into A or B. 3) Group A/B into chunks of 5. 4) Convert each chunk into a letter using the Baconian table. Classic tables often merge I/J and U/V, but modern variants may not.

Core rules

Worked example

A/B stream: AABAA AABAB ABBAB → HELLO (example mapping; depends on table variant) If hiding in case: aAbAA aAbAb aBBaB Lowercase=A, Uppercase=B → same A/B stream.

How to encode / decode

Step-by-step

  1. Pick a Bacon table variant (classic vs full 26).
  2. Convert plaintext letters into A/B 5-tuples.
  3. Choose a carrier: text where you can encode A/B via styling (case/bold/font).
  4. Apply styling for each carrier letter to represent the next A/B symbol.
  5. Verify extraction survives the medium (screenshots/HTML preserve better than plain copy).
💡 Tip: Bacon is often broken because formatting disappears. If you suspect Bacon, inspect the HTML/CSS, or use a screenshot, or look for consistent alternations like upper/lower patterns.

How to break a Bacon Cipher (Baconian)

Breaking Baconian is mostly: 1) detect the two-channel signal, 2) extract A/B reliably, 3) pick the correct table. Once extracted, try both A/B polarity assignments (swap A↔B) and try classic vs full-26 tables.

Practical checklist

What frequency looks like

Frequency analysis on letters isn’t the main tool—Bacon hides a binary stream. The tell is often *visual*: two styles appear with roughly balanced counts. After extraction, you’re effectively decoding 5-bit symbols, not cracking natural-language frequencies.

Signals to look for:
  • Look for two visual/textual states that alternate (case, boldness, font).
  • A/B distribution often near-balanced over long text (not always).
  • If copy/paste normalizes everything, the cipher ‘disappears’.
  • Try shifting grouping alignment if the decode looks off by one.

Mini example

If you extract: ABBAB AABAA ... Try decoding using classic Bacon mapping; if nonsense, swap A↔B and retry; then try a full 26-letter mapping.

Common mistakes

Variants

Practice

Practice by hiding a short secret in case (upper/lower) inside an innocent sentence, then try extracting it from different mediums.

Try these prompts

FAQ

It’s often treated as steganography because the message is hidden in an innocuous carrier.
Because many carriers rely on formatting that gets normalized when you copy as plain text.
Swap A/B polarity, try a different table variant, and check grouping offset.