Masonic Cipher & Symbols© Font (TrueType)

Version 1.0 (Freeware)

© 5999 A.L., Oakland-Durant-Rockridge Lodge #188,

F&AM of California

All Rights Reserved
This TrueType font file (FAM-Code.ttf) is offered as "freeware". It is provided "as is". It is not warranted against any direct or consequent damages. You have a non-exclusive license to use it in its present form for any non-commercial purpose under those terms, which you accept by installing the font on any computer or computers. You do not have a license to alter it in any way. Use for any purpose detrimental to Freemasonry is sincerely discouraged.

This "monospace" font is for use in MS Windows. The graphic symbol set may be typed in MS Word by choosing Insert/Symbol/(normal text) from the program menu, or by using MS Word special characters Alt+Ctrl-? through Alt+`-U, which correspond with ANSI symbol keys Alt+0191 through Alt+0249.

You may download a copy of this Masonic font for your use by clicking on the following link. FAM-Code.ZIP

Masonic Cipher & Symbols© contains the Masonic "poundex" substitution cipher characters in upper and lower case, as well as the numerals and a complete set of common punctuation marks (not shown). The symbol set includes the jewels of the officer line and all the symbolic emblems explicated in the three Degrees of Blue Lodge Masonry (F&AM of California), except the very most esoteric.

There are two related versions of the Masonic cipher. The version used here is that explained informally to Blue Lodge members, and is  not an official part of any authentic Masonic teachings in the Grand Lodge of California. The other is sometimes taught in Royal Arch Masonry, and differs in that the first half of the alphabet (A-M) is assigned to the plain outlines, while the second half (N-Z) are the dotted characters. It should be noted that as simple "substitution ciphers" neither provides more than a superficial cryptographic security. 

The security afforded by this cipher is enhanced somewhat by combining it with a simple, separately communicated keyword, as follows:

  • Select a keyword of any length, for example 'MASONS'. Use a different keyword for every message, because this will still be a substitution cipher, even though the specific substitutions change. The longer the message using the same keyword, the easier it is to decode a substitution cipher without knowing the keyword.

  • Write the unique letters of the keyword in the "poundex" pattern (in our example, just M, A, S, O and N, since 'S' appears twice in 'MASONS'):

  • Then continue to fill in the pattern with the remainder of the alphabet, remembering not to repeat any letters of the keyword:

  • Now, for each letter in the pattern, the substitution symbol is the outline of the cell, with a dot for the second letter in each pair:

M =         H =       X =, etc.