Advice 1: How to speak the language of the brick

Brick language — a kind of gibberish, that is primitive varieties of ciphers, is intended primarily for oral use. Gibberish sounds meaningless set of sounds for someone who is not trained to understand it by ear.
The name "gibberish comes from the jargon of wandering merchants — ofen. To hide their conversations from the uninitiated, who might have overheard, ofen encrypted them by adding before each syllable alternately "container "bar . For example, the phrase "Senya went to Moscow was: "Тарасебаранятарапобарашелтаравбарамотараскву .This simple encoding system was so successful that the word "gibberish was in the Russian language the designation for any illegible nonsense.
According to the principle ofen can think of many similar systems of encryption. In the most simple of them is only one code style, added before (or after) each syllable encrypted phrase.For example, if the code syllable "bi , famous patter becomes: "Bibical of byrebecca bicepirus Berbice, bidibidi of byrebecca biv Berbice Birak. Have bisbino of byrebecca bironico biv to Berbice, Birak biza bironico bahrabise bicep .
Directly brick language originated, perhaps, in the environment of students, but it and its variants became widespread outside of the school environment. Its principle of doubling every syllable with the replacement of the consonant after each vowel in the encoded phrase is added to the syllable with the same vowel, but the same code for the consonant.The greeting "Hey how's it going? develops after a "brick encrypt "Sokratova, kakak decalage? .
The name "brick this kind of gibberish was probably from the fact that most of the code for the consonant is "K — first letter of the word "brick and also because awkward, "stumbling nature of the speech at such encoding.
Of course, instead of "it is possible to use any other consonant. Sometimes these "dialects receive their own names. For example, a brick language the consonant "called solar or salty. However, these names bring some confusion, so it is better to consider all of these options are variations of the same brick of language.

Advice 2: How to come up with a coded message

Not all information needs to be available for public viewing. One of the ways of information protection – encryption, i.e. the preparation of a special algorithm, which allows to encode information in a clear only some people form.
The most primitive cipher – the use of auxiliary words or letters. In childhood, many have tried to speak a fictional language, for example, adding each vowel after the syllable "mA." This method only works during a conversation, the surrounding is unlikely to be able to understand you. To encrypt the thus written information are unlikely to succeed, since such algorithm may be easily calculated.

Another children's code – removal of any letters from the word. Most often, eliminate all vowels, or every second letter. For example, from the sentence "Come visit us" might get "PhD in GST. To decode without the extra hints is easy.

Symmetric ciphers

In another way, they are called symmetric cryptosystems. The peculiarity of this method of encryption is that encryption and decryption use the same key. The algorithm needs to be agreed by the parties in advance.

One of the most common ways in which an encryption is writing text horizontally and vertically. Is a table with fixed height and variable length. Necessary information is written vertically. Once the text reaches a certain size, it rolls over to the next column. Then the table is removed, and the resulting cipher sends to the second party. To make the decryption need to know the height of the table.

If the information is very valuable and should be carefully encrypted, it is possible to apply a double permutation. That is, the previous method is repeated again with the change in table height. Moreover, in the second table you can use columns and rows, it will only complicate the decoding. Some encrypt entries zigzag diagonally or helically.

Called asymmetric ciphers, the key of which is known in advance. It is used primarily on the Internet. For example, using asymmetric cryptosystems digital signature function.

Replacement letters

The advantage of this method of encryption before it, is that it is almost impossible to solve independently. At the very least will need a very large amount of time.

The easiest way is when one letter is mapped to another. For example, A=B, G=D, and so on. First, you write the text, and then replace the letters one at a time. The advantage of this method is that can be a time to learn the table of required substitutions, and then constantly use it. Best to just split the alphabet in half, put the letters around to match them up that way.
Is the advice useful?