<s>
The	O
pigpen	B-Algorithm
cipher	I-Algorithm
(	O
alternatively	O
referred	O
to	O
as	O
the	O
masonic	B-Algorithm
cipher	I-Algorithm
,	O
Freemason	B-Algorithm
's	I-Algorithm
cipher	I-Algorithm
,	O
Napoleon	O
cipher	B-Application
,	O
and	O
tic-tac-toe	O
cipher	B-Application
)	O
is	O
a	O
geometric	O
simple	O
substitution	O
cipher	B-Application
,	O
which	O
exchanges	O
letters	O
for	O
symbols	O
which	O
are	O
fragments	O
of	O
a	O
grid	O
.	O
</s>
<s>
Although	O
Pigpen	O
might	O
be	O
regarded	O
as	O
a	O
fun	O
cipher	B-Application
to	O
use	O
,	O
it	O
offers	O
almost	O
no	O
cryptographic	O
security	O
at	O
all	O
.	O
</s>
<s>
Its	O
use	O
of	O
symbols	O
instead	O
of	O
letters	O
in	O
no	O
way	O
impedes	O
cryptanalysis	O
,	O
and	O
this	O
cipher	B-Application
is	O
not	O
otherwise	O
different	O
from	O
any	O
other	O
simple	O
monoalphabetic	O
substitution	O
cipher	B-Application
.	O
</s>
<s>
Worse	O
,	O
because	O
it	O
is	O
both	O
very	O
well-known	O
and	O
instantly	O
recognizable	O
,	O
it	O
is	O
arguably	O
among	O
the	O
worst	O
ciphers	B-Application
one	O
can	O
possibly	O
choose	O
from	O
a	O
security	O
standpoint	O
.	O
</s>
<s>
Indeed	O
,	O
knowledge	O
of	O
Pigpen	O
is	O
so	O
ubiquitous	O
that	O
an	O
interceptor	O
might	O
not	O
need	O
to	O
actually	O
break	O
this	O
cipher	B-Application
at	O
all	O
,	O
but	O
merely	O
decipher	O
it	O
,	O
in	O
the	O
same	O
way	O
that	O
the	O
intended	O
recipient	O
would	O
.	O
</s>
<s>
Due	O
to	O
Pigpen	O
's	O
simplicity	O
,	O
it	O
is	O
very	O
often	O
included	O
in	O
children	O
's	O
books	O
on	O
ciphers	B-Application
and	O
secret	O
writing	O
.	O
</s>
<s>
The	O
cipher	B-Application
is	O
believed	O
to	O
be	O
an	O
ancient	O
cipher	B-Application
and	O
is	O
said	O
to	O
have	O
originated	O
with	O
the	O
Hebrew	O
rabbis	O
.	O
</s>
<s>
Thompson	O
writes	O
that	O
,	O
“	O
there	O
is	O
evidence	O
that	O
suggests	O
that	O
the	O
Knights	O
Templar	O
utilized	O
a	O
pig-pen	O
cipher	B-Application
”	O
during	O
the	O
Christian	O
Crusades	O
.	O
</s>
<s>
In	O
1531	O
Cornelius	O
Agrippa	O
described	O
an	O
early	O
form	O
of	O
the	O
Rosicrucian	B-Algorithm
cipher	I-Algorithm
,	O
which	O
he	O
attributes	O
to	O
an	O
existing	O
Jewish	O
Kabbalistic	O
tradition	O
.	O
</s>
<s>
Variations	O
of	O
this	O
cipher	B-Application
were	O
used	O
by	O
both	O
the	O
Rosicrucian	O
brotherhood	O
and	O
the	O
Freemasons	O
,	O
though	O
the	O
latter	O
used	O
the	O
pigpen	B-Algorithm
cipher	I-Algorithm
so	O
often	O
that	O
the	O
system	O
is	O
frequently	O
called	O
the	O
Freemason	B-Algorithm
's	I-Algorithm
cipher	I-Algorithm
.	O
</s>
<s>
One	O
of	O
the	O
earliest	O
stones	O
in	O
Trinity	O
Church	O
Cemetery	O
in	O
New	O
York	O
City	O
,	O
which	O
opened	O
in	O
1697	O
,	O
contains	O
a	O
cipher	B-Application
of	O
this	O
type	O
which	O
deciphers	O
to	O
"	O
Remember	O
death	O
"	O
(	O
cf	O
.	O
</s>
<s>
"	O
memento	B-Application
mori	I-Application
"	O
)	O
.	O
</s>
<s>
Another	O
variation	O
of	O
this	O
last	O
one	O
is	O
called	O
the	O
Newark	B-Algorithm
Cipher	I-Algorithm
,	O
which	O
instead	O
of	O
dots	O
uses	O
one	O
to	O
three	O
short	O
lines	O
which	O
may	O
be	O
projecting	O
in	O
any	O
length	O
or	O
orientation	O
.	O
</s>
<s>
The	O
Templar	O
cipher	B-Application
is	O
a	O
method	O
claimed	O
to	O
have	O
been	O
used	O
by	O
the	O
Knights	O
Templar	O
and	O
uses	O
a	O
variant	O
of	O
a	O
Maltese	O
Cross	O
.	O
</s>
<s>
This	O
is	O
likely	O
a	O
cipher	B-Application
used	O
by	O
the	O
Neo-Templars	O
(	O
Freemasons	O
)	O
of	O
the	O
18th	O
century	O
,	O
and	O
not	O
that	O
of	O
the	O
religious	O
order	O
of	O
the	O
Knights	O
Templar	O
from	O
the	O
12th-14th	O
centuries	O
during	O
the	O
Crusades	O
.	O
</s>
