Skip to main content
CipherChronicle

Cipher methods Pop culture

Dancing Men cipher

A monoalphabetic substitution using stylised human silhouettes. Made famous by Conan Doyle's Sherlock Holmes story The Adventure of the Dancing Men, published in 1903.

Family :
Pop culture
Difficulty :
Intermediate
Era :
1903, Arthur Conan Doyle
Inventor :
Arthur Conan Doyle (fiction)

Also known as : Sherlock Holmes cipher · stick-figure cipher

The Dancing Men cipher is a fictional example of monoalphabetic substitution, made famous by Arthur Conan Doyle’s short story The Adventure of the Dancing Men, published in 1903 in The Strand Magazine. Sherlock Holmes decrypts a series of messages drawn as dancing stick figures and, in doing so, exposes a deadly blackmail.

Principle

Every letter of the alphabet is represented by a stylised human silhouette, arms and legs in varied postures. Unlike Pig Pen, the figures have no underlying geometric grid: the cipher rests purely on the visual inventiveness of the artist.

In the story, Conan Doyle provides 26 distinct poses, one per letter. When a letter ends a word, the figure holds a flag in its right hand — the only typographic convention of the cipher, used to mark word boundaries.

The 26 silhouettes

The full alphabet, as reproduced in Conan Doyle’s story. Each letter maps to a unique posture.

A A A
B B B
C C C
D D D
E E E
F F F
G G G
H H H
I I I
J J J
K K K
L L L
M M M
N N N
O O O
P P P
Q Q Q
R R R
S S S
T T T
U U U
V V V
W W W
X X X
Y Y Y
Z Z Z

End-of-word variants (flag)

When a figure holds a flag in its right hand it marks the end of a word — the cipher’s only typographic convention, standing in for a space.

A A A
B B B
C C C
D D D
E E E
F F F
G G G
H H H
I I I
J J J
K K K
L L L
M M M
N N N
O O O
P P P
Q Q Q
R R R
S S S
T T T
U U U
V V V
W W W
X X X
Y Y Y
Z Z Z

The story’s puzzle

  • Mr Hilton Cubitt starts finding strange chalk drawings on his windowsills and garden walls.
  • His American wife Elsie is visibly shaken but refuses to explain.
  • Hilton brings the messages to Sherlock Holmes, who decrypts them one by one: AM HERE ABE SLANEY, then AT ELRIGES, then COME ELSIE, and finally ELSIE PREPARE TO MEET THY GOD.
  • The last message prompts Holmes to act — too late: Hilton has already been shot.

Holmes’s technique is classical frequency analysis:

  1. The most common silhouette probably maps to E (English).
  2. Three-letter words ending in that figure are candidates for THE.
  3. Step by step, he reconstructs the table by leveraging recurring proper nouns (ELSIE, ABE SLANEY).

It is the most celebrated depiction of classical cryptanalysis in popular literature.

Why the cipher is weak

The Dancing Men cipher is a monoalphabetic substitution in pictogram disguise. Its security relies entirely on:

  • The secrecy of the glyph-to-letter mapping.
  • The shortness of messages (frequency analysis needs a minimum statistical base).

Against a cryptanalyst — especially one with cribs like known proper nouns or greetings — it falls in minutes. Conan Doyle stages the process explicitly: Holmes uses no secret key, just flair.

Cultural legacy

  • Baker Street Irregulars logo — a Holmes fan club founded in 1934.
  • Dancing Men Cipher font — freely distributed online, faithfully reproducing the original 26 glyphs.
  • Pop-culture treasure hunts — used in escape rooms and teaching kits to introduce cryptanalysis.
  • Nods in BBC’s Sherlock — visually referenced in the Moffat & Gatiss series.

Close relatives

  • Pig Pen / Freemason cipher — same mechanics (monoalphabetic, glyphic), 3×3 grid instead of silhouettes.
  • Templar / Rosicrucian ciphers — same idea with different glyph packs.
  • Poe’s Gold Bug (1843) — direct antecedent: a tale in which the hero cracks a substitution by frequency. Conan Doyle acknowledges the inspiration openly.