The Baconian Cipher, also known as Francis Bacon’s Substitution Cipher, was developed by Francis Bacon around 1605 and described in his work De Augmentis Scientiarum (1623). It is a steganographic substitution system that encodes each letter of the alphabet into a unique five-character pattern composed of two symbols, traditionally “A” and “B”.
Unlike many classical ciphers that substitute one letter for another, the Baconian system converts each plaintext letter into a five-bit binary-like sequence. These sequences can then be hidden inside seemingly ordinary text by using two typefaces, two fonts, bold vs. regular styling, or any other pair of visual variations.
Baconian Cipher: The 5-Bit Alphabet
Bacon’s original version used a 24-letter alphabet, combining I/J and U/V. Each letter is represented by a five-character sequence of A’s and B’s:
A = AAAAA G = AABBA N = ABBAA T = BAABA
B = AAAAB H = AABBB O = ABBAB U/V = BAABB
C = AAABA I/J = ABAAA P = ABBBA W = BABAA
D = AAABB K = ABAAB Q = ABBBB X = BABAB
E = AABAA L = ABABA R = BAAAA Y = BABBA
F = AABAB M = ABABB S = BAAAB Z = BABBBBaconian Cipher: Encoding
To encode a message, replace each plaintext letter with its corresponding five-character A/B sequence. For example, encrypting “HELLO”:
Plaintext: H E L L O
H = AABBB
E = AABAA
L = ABABA
L = ABABA
O = ABBAB
Ciphertext:
AABBB AABAA ABABA ABABA ABBABIn practice, these A and B symbols are often disguised. For example, A could be represented by normal text and B by italic text, allowing the message to be hidden inside an innocent-looking paragraph.
Baconian Cipher: Decoding
To decode, group the ciphertext into five-character blocks and translate each block back into its corresponding letter.
Ciphertext:
AABBB AABAA ABABA ABABA ABBAB
AABBB → H
AABAA → E
ABABA → L
ABABA → L
ABBAB → O
Plaintext: HELLOBaconian Cipher: Notes
The brilliance of the Baconian Cipher lies in its early use of binary encoding principles — long before modern computing formalized binary systems. Each letter is effectively reduced to a five-bit pattern. While the cipher itself is simple to break if discovered, its true strength lies in concealment. It represents one of the earliest structured attempts to hide information inside other information — a foundational idea in steganography.