Baconian

Baconian Cipher History: Francis Bacon, Steganography & the Shakespeare Debate

Explore the history of Francis Bacon's cipher from its 1605 invention through the Shakespeare authorship debate to modern steganography. Learn how Bacon's bilateral alphabet pioneered binary encoding.

Published March 19, 2026
13 minute read
Cryptography Guide

Introduction: A Cipher Built to Hide Itself

Most ciphers are designed to scramble a message so that an interceptor cannot read it. The Baconian cipher was built for a different and in many ways more ambitious goal: to hide the fact that a message exists at all.

This distinction — between cryptography and steganography — sits at the heart of everything interesting about Francis Bacon's invention. Cryptography protects the contents of a message. Steganography protects the existence of the message. When you encrypt a letter, an observer knows a secret is being kept but cannot read it. When you apply Baconian steganography, the observer sees nothing but ordinary text and has no reason to look further.

Francis Bacon described this system in 1605, using the techniques of the printer's craft — the subtle difference between typeface A and typeface B — to conceal arbitrary text inside innocent documents. In the four centuries since, his invention has touched the Shakespeare authorship debate, shaped two of America's greatest cryptanalysts, and found a new life in digital steganography, escape room puzzles, and competitive cryptography.

This article traces that history in full.

Try our Baconian Cipher Decoder to experiment with the cipher yourself.


Francis Bacon: Philosopher, Statesman, Cryptographer

Francis Bacon was born in London on 22 January 1561, the second son of Sir Nicholas Bacon, Lord Keeper of the Great Seal under Elizabeth I. He entered Trinity College, Cambridge, at age twelve and later studied law at Gray's Inn. By his thirties he was established as a barrister and a Member of Parliament; by his forties he was one of the most influential advisors to the Crown.

Under James I, Bacon rose to the highest legal office in England. He became Solicitor General in 1607, Attorney General in 1613, Lord Chief Justice of the Court of Common Pleas in 1613, and finally Lord Chancellor in 1618, the same year he was created Baron Verulam. He was later created Viscount St Alban. His political career ended abruptly in 1621 when he was convicted of accepting bribes and barred from public office, but his intellectual legacy was already secure.

Bacon is remembered primarily as the philosopher who articulated the inductive scientific method — the idea that knowledge must be built from careful observation and systematic experiment rather than derived by pure reason from first principles. His Novum Organum (1620) and The Advancement of Learning (1605) laid the groundwork for the scientific revolution that followed in the seventeenth century.

What is less well known is that Bacon had a lifelong interest in the mechanics of secret communication. He understood that information itself could be a tool of power, and he was fascinated by the problem of how to transmit information covertly. The Baconian cipher was his practical answer to that problem — not a theoretical curiosity, but a working system he believed could be genuinely used.


The Bilateral Alphabet: Bacon's 1605 Invention

Bacon first described his cipher system in The Advancement of Learning, published in 1605. He elaborated it in the expanded Latin version, De Augmentis Scientiarum, which appeared in 1623. He called it the "Biliteral Cipher" — from the Latin bi (two) and littera (letter) — because the entire system rests on the use of exactly two distinct symbols.

The principle is elegant. Bacon observed that with five binary positions, each of which can take one of two values, you can produce 2 x 2 x 2 x 2 x 2 = 32 distinct combinations. The English alphabet of his era had 24 letters (I and J were treated as the same letter, as were U and V, following Latin convention). Thirty-two combinations were more than sufficient to encode all 24, with eight left over.

Bacon assigned a unique five-character sequence of A's and B's to each letter:

  • A = AAAAA
  • B = AAAAB
  • C = AAABA
  • D = AAABB
  • E = AABAA

...and so on through the alphabet. The sequences follow a strict binary counting order, so the system is entirely regular and requires no memorization beyond the basic principle.

To encode a message, you convert each letter to its five-character code, producing a long string of A's and B's. That string — the ciphertext — can then be transmitted in two ways. You can send it as it is, which is obviously coded. Or you can conceal it inside an ordinary piece of text by using two visually similar but distinguishable forms to represent A and B.

The second approach is the steganographic use that Bacon emphasized. He proposed using two typefaces — Type A and Type B — that looked nearly identical to a casual reader but were distinguishable on close inspection. A printer who knew the secret could set any innocuous text in these two typefaces according to the Baconian pattern, and the resulting document would look entirely normal while carrying a hidden message in its typographic variation.

This is why the Baconian cipher belongs to the history of steganography as much as the history of cryptography. The encoding method is cryptographic; the concealment method is steganographic. The combination made it, in Bacon's view, essentially undetectable by anyone not already looking for it.


How Bacon's Steganography Works

To understand the practical power of the Baconian system, it helps to walk through a worked example.

Suppose the secret message is the word BACON itself.

First, encode each letter using the 24-letter Baconian alphabet:

  • B = AAAAB
  • A = AAAAA
  • C = AAABA
  • O = ABBAB
  • N = ABBAA

The full ciphertext is: AAAAB AAAAA AAABA ABBAB ABBAA

This is a 25-character string. To hide it, you need a cover text of at least 25 letters. Suppose the cover text is: "The art of secret writing is a noble and ancient study."

You then set the cover text in two typefaces according to the pattern. The first letter of the cover text (T) corresponds to the first character of the ciphertext (A) — so T is set in typeface A. The second letter (h) corresponds to A — typeface A. And so on. The fifth letter of the cover text corresponds to B — that letter is set in typeface B.

A reader who sees the printed document sees a perfectly normal sentence. A reader who knows to look at the typeface pattern extracts the A/B sequence, groups it into fives, and recovers the original word BACON.

Bacon explicitly described several methods for creating the two distinct forms:

  • Two typefaces that differ slightly in serifs or stroke weight
  • Italic versus roman (upright) letterforms
  • Larger versus smaller point size
  • Bold versus regular weight

In modern applications, people commonly use uppercase versus lowercase, or 1 versus 0 in binary notation. The principle is identical regardless of the specific symbols chosen. What matters is that two visually distinct forms exist and that a reader who knows the key can reliably distinguish them.

Explore our Baconian Steganography Tool to see this concealment process in action with live text.


The Shakespeare Authorship Debate

No aspect of the Baconian cipher's history has attracted more public attention — or generated more controversy — than its role in the Shakespeare authorship debate.

The "Baconian theory" holds that Francis Bacon was the true author of the plays and poems attributed to William Shakespeare. The theory has a long history, but its most famous cryptographic chapter began in 1888 when Ignatius Donnelly, a Minnesota politician and amateur scholar, published The Great Cryptogram: Francis Bacon's Cipher in the So-Called Shakespeare Plays.

Donnelly claimed to have discovered hidden messages in Shakespeare's First Folio (1623) that proved Bacon's authorship. He argued that by applying a complex arithmetic method to the page and column numbers of the Folio, one could extract Baconian cipher messages revealing Bacon's identity. The book caused a sensation in the popular press and went through multiple printings.

The cryptographic establishment was less impressed. Professional cryptanalysts pointed out that Donnelly's method was not really the Baconian cipher at all — Bacon's cipher depends on typographic variation, not arithmetic manipulation of page numbers. More fundamentally, critics demonstrated that Donnelly's method was so flexible that it could extract virtually any message from virtually any text. This is the problem of apophenia — the human tendency to find meaningful patterns in random data — compounded by confirmation bias. If you are motivated to find a hidden message, you will find one, whether it is there or not.

William and Elizebeth Friedman, whose careers we will examine in the next section, published a rigorous study of the Baconian theory in 1957 titled The Shakespearean Ciphers Examined. Their conclusion was decisive: there are no genuine Baconian cipher messages in the Shakespeare texts, and the methods used by Baconian theorists are not scientifically valid. The book is considered the definitive refutation.

The mainstream scholarly consensus today is that William Shakespeare of Stratford-upon-Avon wrote the works attributed to him. The authorship debate continues among enthusiasts, but no credible cryptographic evidence has ever been produced to support the Baconian theory.

The irony is considerable: the controversy made the Baconian cipher famous to a general audience precisely because Donnelly's claims were so dramatic and so wrong. More people learned about Francis Bacon's steganographic invention through the Shakespeare debate than through any legitimate cryptographic source.


William and Elizebeth Friedman: From Bacon to Bletchley

The most significant consequence of the Shakespeare authorship craze for the history of cryptography was entirely unintentional. It brought two young researchers into contact with cipher systems in a way that launched the careers of America's greatest cryptanalysts.

In 1915, George Fabyan, a wealthy Illinois textile merchant with an eccentric passion for unconventional science, hired a young botanist named William Friedman to work at Riverbank Laboratories, his private research estate outside Geneva, Illinois. Fabyan had become obsessed with the Baconian theory and was funding research into Baconian cipher messages allegedly hidden in the Shakespeare texts. William Friedman was put to work on this project.

He was joined by Elizebeth Smith, a recent college graduate whom Fabyan also recruited for the Shakespeare cipher research. William and Elizebeth worked alongside each other, married in 1917, and together discovered that the Baconian theory was unfounded. But in the process of systematically investigating cipher claims, both developed a deep and rigorous understanding of cryptographic principles that no formal education of the time could have provided.

When the United States entered the First World War in 1917, Riverbank Laboratories became one of the few organizations in America capable of serious cryptanalytic work. The Army sent intercepted messages to Riverbank to be broken. William and Elizebeth Friedman did the breaking. Their wartime work at Riverbank led directly to government careers in cryptography that would define American signals intelligence for the next three decades.

William Friedman went on to lead the Army's Signal Intelligence Service. His greatest achievement came in 1940 when his team broke PURPLE, the Japanese diplomatic cipher machine, without ever having seen the physical device. This feat provided the United States with access to Japanese diplomatic communications throughout the Second World War, including intelligence that shaped the planning at Midway.

Elizebeth Friedman built a parallel career in law enforcement cryptanalysis. During Prohibition, she broke the codes of rum-runner networks for the Coast Guard. During the Second World War, she worked for the Office of Strategic Services and the Coast Guard, breaking Axis spy networks operating in South America — work that resulted in the capture and prosecution of numerous Nazi agents.

Both William and Elizebeth Friedman were aware of the peculiar irony that their careers had originated in a fruitless search for Baconian cipher messages in Shakespeare. When they died — William in 1969, Elizebeth in 1980 — their tombstone at Arlington National Cemetery bore an inscription that paid tribute to this origin in the most fitting possible way.

The epitaph on their shared gravestone at Arlington reads, among other things: "Knowledge is Power." But the inscription itself is set in two distinct typefaces — and those typefaces encode, in authentic Baconian cipher, the same phrase: KNOWLEDGE IS POWER.

It is one of the most elegant cryptographic monuments in the world: a cipher hidden in a gravestone, honoring two people who spent their lives breaking ciphers, using the very system that first drew them into cryptography.


The 24-Letter vs 26-Letter Alphabet

Bacon's original 1605 cipher used a 24-letter alphabet. This was not arbitrary. In Renaissance English, as in classical Latin, I and J were considered variant forms of the same letter, as were U and V. The distinction between I and J as separate letters, and between U and V as separate letters, became standard in English only gradually during the seventeenth century.

In Bacon's 24-letter system:

  • I and J share the code ABAAA
  • U and V share the code BAABB

When decoding a message, the reader uses context to determine whether the intended letter was I or J, and whether it was U or V. In practice this rarely causes ambiguity because both options are visible from the surrounding words.

The modern 26-letter adaptation distinguishes all 26 letters individually:

  • I = ABAAA
  • J = ABAAB
  • U = BABAA
  • V = BABAB

The remaining letters shift accordingly to accommodate the two new distinct codes.

For historical research, encoding texts intended to be read as Renaissance documents, or working with sources that used the 24-letter version, the original Baconian alphabet is the appropriate choice. For modern applications — particularly Science Olympiad Code Busters competitions, geocaching puzzles, escape rooms, and any context where ambiguity between I/J or U/V would cause problems — the 26-letter version is standard.

Try the Baconian Cipher Encoder to experiment with both alphabet versions.


Baconian Cipher in Modern Culture

The Baconian cipher has outlasted its era by finding a comfortable niche in modern puzzle culture.

In geocaching — the outdoor activity where participants use GPS coordinates to find hidden containers — mystery caches (those that require solving a puzzle to obtain the final coordinates) frequently employ the Baconian cipher. Its distinctive A/B format and the need to group characters into fives make it recognizable to experienced geocachers while remaining challenging for newcomers. Databases of cipher types used in geocaching consistently list the Baconian cipher among the most common.

Escape rooms, which ask participants to solve puzzles to "escape" a themed environment within a time limit, have adopted the Baconian cipher as a recurring element. It is well-suited to the format: a prop document with unusual capitalization or typography can carry a hidden message that players must extract and decode to advance.

Competitive cryptography has embraced it as well. Science Olympiad, the American academic competition for middle and high school students, includes a Code Busters event that tests knowledge of historical ciphers. The Baconian cipher appears regularly in Science Olympiad competition materials, and preparation resources for the event treat it as a standard cipher type alongside Caesar, Vigenere, and Atbash.

In cryptography education more broadly, the Baconian cipher serves as an ideal introduction to two important concepts simultaneously: binary encoding (each letter requires exactly five binary symbols) and steganography (the encoded message can be hidden in plain sight). Few other classical ciphers demonstrate both principles so clearly and so concisely.


Legacy: From Binary Alphabet to Digital Age

Perhaps the most remarkable thing about Francis Bacon's cipher is how directly it anticipates the conceptual foundations of digital computing — not just in spirit but in precise mathematical structure.

Modern digital data is encoded in binary. Every piece of text, image, audio, and video on a computer ultimately reduces to sequences of 0s and 1s. The fundamental unit is the bit, a binary digit that takes one of two values.

Bacon's cipher is a five-bit binary encoding system. A is 0. B is 1. Each letter requires exactly five bits. The encoding table follows the natural binary counting sequence: AAAAA = 00000 = 0, AAAAB = 00001 = 1, AAABA = 00010 = 2, and so on.

This is not a metaphor or a loose analogy. The Baconian cipher is, in precise technical terms, a five-bit binary character encoding. The only difference between it and a modern character encoding standard is the number of characters it handles (24 or 26 versus the 128 of ASCII or the 1,114,112 of Unicode) and the fact that it predates the invention of the transistor by three centuries.

The French engineer Emile Baudot, working in the 1870s, invented what is now called the Baudot code for telegraphy — a five-bit encoding that assigned a unique binary pattern to each letter and symbol needed for telegraphy. Baudot code became the foundation of the ITA2 standard used in teletype machines throughout the twentieth century. The parallel with Bacon's five-bit system is exact, and it is not accidental: both Bacon and Baudot independently arrived at five bits as the minimum required for alphabetic encoding.

ASCII, the American Standard Code for Information Interchange adopted in 1963, extended the approach to seven bits to accommodate upper and lowercase letters, digits, and punctuation. Modern Unicode uses variable-length encoding of up to four bytes per character to handle every writing system in the world.

Francis Bacon, working with printer's typefaces in 1605, invented the conceptual blueprint for all of it. The two-symbol system, the fixed-length encoding, the bijective mapping from symbols to integers, the use of 2^n to calculate required bit depth — these are the foundational ideas of digital information theory, and they appear fully formed in Bacon's Biliteral Cipher.

This is why historians of computing and information theory regard Bacon's cipher as more than a cryptographic curiosity. It is a genuine intellectual precursor to the digital age, separated from modern binary encoding not by conceptual distance but only by time.


FAQ

Did Francis Bacon really write Shakespeare's plays?

No credible evidence supports this claim. The mainstream scholarly consensus, supported by detailed historical and literary analysis, is that William Shakespeare of Stratford-upon-Avon wrote the works attributed to him. The cryptographic claims made by Baconian theorists have been systematically refuted by professional cryptanalysts, most definitively by William and Elizebeth Friedman in their 1957 work The Shakespearean Ciphers Examined. The Friedmans demonstrated that the methods used to extract supposed Baconian cipher messages from the Shakespeare texts are not scientifically valid: they are flexible enough to find "messages" in any sufficiently long text.

Is the Baconian cipher secure?

By modern cryptographic standards, no. The Baconian cipher uses a fixed public encoding table with no key variation. Anyone who knows the system can decode any message immediately. Its security depends entirely on the steganographic concealment: if no one suspects a hidden message is present, it will not be found. If the encoding is detected, decryption is trivial. For protecting genuinely sensitive information, modern cryptographic algorithms such as AES-256 are required.

How is steganography different from cryptography?

Cryptography transforms a message into an unreadable form — an observer knows a secret exists but cannot read it without the key. Steganography hides the existence of the message — an observer has no reason to suspect that any secret is present. The Baconian cipher combines both: the message is encoded (cryptographic) and then the encoding is hidden within ordinary text (steganographic). Bacon believed the steganographic layer was more valuable than the cryptographic layer, because a message that attracts no suspicion cannot be attacked.

Can computers detect Baconian cipher steganography?

Potentially, yes. Statistical analysis of text can detect anomalous patterns in capitalization or typography that deviate from what would be expected in natural writing. Modern digital forensics tools can identify unusual font metadata in document files. However, well-executed steganography that uses plausible stylistic variation — such as a cover text that naturally mixes typefaces for design reasons — is much harder to detect automatically. In digital contexts, more sophisticated steganographic methods such as LSB (least significant bit) embedding in image files provide better concealment than text-based approaches.

What other steganographic methods did historical figures use?

Historical steganography was remarkably inventive. Ancient Greeks reportedly shaved a messenger's head, tattooed a message on the scalp, and sent him on his way after the hair grew back. Invisible ink made from milk, urine, or lemon juice was widely used — the writing appears only when heated. Microdots — photographs reduced to the size of a period — were used by German intelligence in both World Wars. Null ciphers embed a message in an acrostic pattern within innocent text (the first letter of each word or sentence spells the hidden message). The Baconian cipher's use of typographic variation is one of the more technically sophisticated historical methods because it does not require any unusual materials — only two typefaces and a knowledgeable printer.


Conclusion

The Baconian cipher is four hundred years old, but it has never stopped being useful in one context or another. Bacon invented it as a practical tool for covert communication by exploiting the resources of the print shop. It became famous — and somewhat notorious — through its entanglement with the Shakespeare authorship controversy. It gave America its greatest cryptanalysts by accident, training William and Elizebeth Friedman in the rigorous analysis of cipher claims before setting them loose on the world's real codes. And it has found a comfortable afterlife in geocaching, escape rooms, competitive cryptography, and the teaching of binary encoding principles.

Most significantly, the Baconian cipher stands as one of the earliest formal binary encoding systems in intellectual history — a five-bit alphabet invented three centuries before the transistor, three and a half centuries before ASCII, and four centuries before the Unicode Consortium began its work.

Francis Bacon called his invention the Biliteral Cipher: a cipher built from two letters. He might equally have called it the first practical binary encoding system in the Western tradition. Both descriptions are accurate, and both speak to why the Baconian cipher remains an object of genuine historical interest rather than mere antiquarian curiosity.

Try our Baconian Cipher DecoderBaconian Cipher EncoderExplore Baconian Steganography

About This Article

This article is part of our comprehensive baconian cipher tutorial series. Learn more about classical cryptography and explore our interactive cipher tools.

Try Baconian Cipher Cipher Tool

Put your knowledge into practice with our interactive baconian cipherencryption and decryption tool.

Try Baconian Cipher Tool