answersLogoWhite

0


Best Answer

ANSWER: Well you have to find the book or text that correspondes with the Cipher. Then there should be three numbers separated by a hyphen, (-).

EX)

Book Text: The people of the village are going to live on forever.

Their ways can never be copied.

Decode: 1-5-2 2-4-1

1-5-4 2-6-2 2-4-3 1-1-3

The first number is the line on that page. The second number is the word in that line. The third number is the letter in that word. This is on'y for a one page text

If you have a book that your using to decode the cipher, then you use the first number as the page in the book, the second number is the line on that page, and the third number is the first letter of that word on that page. Hopefully this helps. This is also fun to do with your friends so you can pass secret notes, but it does take a while to decode if it's a long message.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
User Avatar

Anonymous

Lvl 1
4y ago
From your explanation: inaove.
User Avatar

Anonymous

Lvl 1
4y ago
In love
More answers
User Avatar

Anonymous

Lvl 1
4y ago

and erected abuses self-evident the such

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How do you decode a Ottendorf Cipher?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

When was Ottendorf's Corps created?

Ottendorf's Corps was created in 1776.


What is a Xor cypher used for?

XOR cipher is a form of encryption algorithm. In simple terms, the cipher is used to decode binary language. For more details, Wikipedia is a great resource.


What has the author W Ottendorf-Simrock written?

W. Ottendorf-Simrock has written: 'Castles on the Rhine'


How does the beale cipher work?

The Beale cipher is a form of book cipher where a key document, such as an existing book, is used to encode a message. Each word or phrase in the message is converted into a number that corresponds to a page, line, and word in the key document. The recipient can then use the key to decode the message by looking up the corresponding words.


Has anyone used today's modern computers to decode Zodiac's ciphers?

FBI cryptanalyst Dan Olsen has tried to break the code on many of the Zodiac's cipher with no luck.


What decryption method was used to decode Mary Queen of Scots treasonous cipher?

Mary used a substitution cipher, to decode Mary Queen of Scots cipher Frequency analysis was used. That means looking for letters (or symbols) that have the same number of appearances in the cypher text as common letters in the language the plain text message is thought to be in. E is very common in english, so are the other vowels, you make some educated guesses and start to fill in words which gets you the meaning of more symbols and so on. Treasonous is simply a matter of opinion. (She was quite possibly set up!)


How BAUDOT code made?

The BAUDOT code is made from a cipher. The cipher that does this is also known as a Bacon cipher.


How to you read pigpen cipher?

how to read pigpen cipher


When did Cipher Complex happen?

Cipher Complex happened in 360.


When was Cipher System created?

Cipher System was created in 1995.


When was Cipher - album - created?

Cipher - album - was created in 2001.


When was Cipher in the Snow created?

Cipher in the Snow was created in 1973.