Canonical cipher 3: Z13 vol.1. Entropy based solution of Z13

 An entropy-based solution of the Z13 based on a cascade consideration of ciphers

Comment: Originally proposed in May 2024 on Tom Voigt’s Tapatalk Zodiac Killer forum and message board, this solve has undergone revision that does not take away from the step-1 solution (Table III) nor the end solution (Table IV). The solution wishes to explain the process of step-2 better and contextualize with the solution proposed by Dr. Ryan Garlick. Moreover, it offers a step-3 for the validation of symbols order.

Z13 has been considered time and time again as per its short length which does not allow for an inclusion (and therefore discovery) of an internal key. Various suggestions have been provided and various solutions have been proposed, including some very plausible and interesting solutions by zodiac researchers and cipher scholars in this forum, such as cipher (comment: SolidSnake1990) and rando.

My approach, based on my signal processing/information theory background, is based in a direct confrontation of the Z13 on two simple criteria of hypothesis:

Criterion 1: Any chain of time-discrete symbols of information is bound to form a certain alphabet. This alphabet defines the alphabet length of the symbol series. The occurrences and frequencies of each alphabet variable produce the overall cipher length, but more importantly, define the entropy of the information piece (here: the cipher) based on the definition provided by Claude Shannon.

Criterion 2: Even though the Shannon-Fanno table is not as successful in achieving approximation of Entropy as the Huffman tree, it is to be employed because it provides the tiers of the symbols (cipher alphabets) within the confines of the Z13. It also allows for respective retrieval of information as per the previous ciphers. If the Z13 is not long enough to provide “key from within” then we must acquire external information. Since the alphabet variables are independent in their “making” and uncorrelated to the previous or next symbol (as opposed to DPCM methods, lets say), then we must not seek inside the Z13 for their interpretation, but to the previous ciphers. This validates the unified consideration of Z408-Z340-Z13 as a cascade of systems, where each sub-system consists of a table of statistical metrics and attributes. Indeed, Shannon’s entropy stands at the very centre of these metrics.

 The well known cipher length is 13:

Figure 1. Cipher length

However, the alphabet length is 8. Seven out of the eight unique symbols appear in Z340. They are:

A    E    N     (ZODIAC CROSS)   K     M     _I_

It is interesting to note that the H/8 symbol characterizes the very length of the cipher alphabet: for 8==H. The three occurrences of the “8-ball” could very well stand for 3xH and/or 3x8: a reference to the three sections of Z408. In a follow-up note I will try to offer further outliers towards that direction.

STEP-1: THE SEVEN SYMBOLS

 

Table I. Frequencies and Entropy of the Z13 Cipher Alphabet



We see that the total entropy is 2.873. This of course can be validated from [https://onlinetexttools.com/calculate-text-entropy]:

 

Εικόνα που περιέχει κείμενο, στιγμιότυπο οθόνης, λογισμικό

Περιγραφή που δημιουργήθηκε αυτόματα

Figure 2. Fast-track calculation of entropy for a cipher alphabet of 8 that produces a cipher length of 13 based on the frequencies of Table I.

 

But if the symbols are uncorrelated and independent “in their making” and only their order is correlated to the desired output of the Z13 (the name), then we need to establish a liaison between the definitions/assignments of these alphabet variables from the previous sub-systems of the cascade. The directly previous is Z340. It is also referenced (in taunting manner) in the April 20, 1970 communique.

The results are shown in Table II.

 

 

 

 

Table II. Assignments from the previous sub-systems of the cipher-cascade


 

A direct feed of Table II assignments to the Z13 provides:

Table III. Z13 substitution: step-1

Α

Ε

Ν

ZODIAC

HBALL

K

HBALL

M

HBALL

_I_

N

A

M

D

R

E

A

Α

O

L

E

D

O

 

Comment: in Spring 2025 Dr Ryan Garlick presented his solve on “DREATATORPEDO”. This can be considered as a variant of step-1 evolving into an independent step2 where the 8-ball values can be assigned any given letter of the Latin alphabet pending on any given hypothesis. Dr Garlick’s solve assumes that the anchor-like symbol of position 10 equals “P” whereas I follow the respective Z340 symbol, with the key assigning a value of “L”.

 

 

 

 

 

 

 

 

STEP-2: THE 8-BALL

In my original proposal of May 2024 I offered a convoluted explanation that utilized the position of the 8-ball symbols (pos 5 -7 – 9) as a basis for the assignment of “J L N” values. Offering a direct schematic in Figure 3, we have:

A diagram of a diagram

AI-generated content may be incorrect.

Figure 3. Substitution of 8-ball values based on their position on the cipher

AEN {ZODIAC CROSS AS PUNCT.MARK 1} J K L M N {ANCHOR AS PUNCT.MARK 2} NAM

These are letters J, L, N respectively. Therefore, we have for Z13:

Table IV. Z13 substitution: step-2



Why the shift?

From an entropy-perspective, the-8ball is the strongest symbol in the Z13 (tier-1).

The second tier of Z13 is A N M. This the order as we traverse Z13 from L to R.

From the symbols in the tier-2, only “N” appears as a substitution letter for the-ball. The last triad places the “N” letter at position1 of the triad.

Following this “hint”, we shift JLN by the same manner, therefore NJL.

Thus Table IV is produced on this simple shift:

N is part of the tier-2 triad (entropy-wise).

It appears in first section (AEN), last section (NAM) and in the triad of letters for the 8ball substitution (JLN).

The last triad places N at pos1. We follow that logic for the final arrangement of the 8-ball substitutes: JLN becomes NJL.

J is in the middle. Two clusters of six-symbols in either side.

The name produced reads: Andrea J. Odell

 

STEP 3: READ SEQUENCE / PRINT OF MESSAGE

Comment: The read sequence compels us to devise (or try to grasp) a self-indulgent teletype system as it may have been introduced by the killer. The reason is that the order of the plaintext must follow a systemic method based on rules of conduct.

1.        No symbols must be left unread/not accessed.

2.        Read sequence begins from right to left (accessing the alphabet from Z to A).

3.        Boundary points: first (far-right) and last (far-left) points of message block.

4.        Each “8-ball” can be seen as carrying content and added functionality as a “Paragraph/Change order of symbol read” break point. A variant of the “Paragraph” command in the ASCII system (code: 244).

5.        Next read routine begins with shifted order at the next “8-ball” break point. Each break point is to the nearest/next left available.

6.        All symbols can be accessed only once (clear content after read/print).

7.        The ZODIAC CROSS is a superior break point (“end-point”) which carries content and added functionality: it activates “ETB” and “EOT” (“End of transmission block / end of transmission”). It is the last, as it is the killer’s signature, as in the letters.

FIRST READ ROUTINE




SECOND READ ROUTINE






THIRD READ ROUTINE


 


FOURTH READ ROUTINE

For the current read routine, the change of reading order means we read/access symbols from left to right from the furthermost boundary point on the left.




We read the final “DREA”.

The ZODIAC CROSS carries the content “A” and then activates the “end-point” functionality.

So, the process ends (ASCII: ETB/EOT/).

The last symbol is the ZODIAC CROSS (the killer’s signature) with content “A”, the first letter of the Latin alphabet, which is read as the last, validating the original “right to left” order of read (from “Z” / ZODIAC as first to “A” as last / ZODIAC CROSS). The message ends with the last symbol being the ZODIAC CROSS, as in the killer’s letters.

The final printout is:

ODELL   “Paragraph/Change order of symbol read”

J.               “Paragraph/Change order of symbol read”

AN            “Paragraph/Change order of symbol read”

DREA       “End of transmission block / end of transmission”

 

The name produced reads: Andrea J. Odell

Andrea Jeanette Odell, born in 1958 and d. 1959 (see Figure 5) is genealogically linked to all seven Zodiac canonical victims, as well as non-canonical victims and victims from notable murder cases. And what was the purpose of the killer? In my opinion, to validate his most importance of all the “Zodiac semiotics”: genealogy and murder. But even this would have to be yet another “treasure hunt” of riddles.

Comment: this solution does not dispute the existence of many other solutions, including Dr Garlick’s or any other for that matter.

The plausibility of each proposal, including the many deeply interesting proposals of Solidsnake1990 who has put time and effort to highlight through his rational proposals a systemic pool of significant data.

The very length of the cipher means no key is inherent. However, on this approach I can offer a robust key built on the Z340 key for seven of the eight symbols and a logical function for the substitution of the 8-ball which can have a singular expression, applicable to all occurrences of the 8-ball throughout the cipher. This provides a higher resilience, in my opinion, compared to Dr Garlick’s method (Figure 4).

A screenshot of a computer

AI-generated content may be incorrect.

Figure 4. My proposal vs Dr Garlick’s on the common foundation of Z340 key: a comparative approach

 

A singular function for the 8-ball substitution: POSITION RIGHT SHIFTED BY E (5)

1st  8ball: Position 5 à Right shift by 5 à 5+5=10 == J

2nd 8ball: Position 7 à Right shift by 5 à 7+5=12 == L

3rd 8ball: Position 9 à Right shift by 5 à 9+5=14  == N

FINAL KEY

Z13 key= {Z340 key} AND {8ball: POSITION RIGHT SHIFT BY E}

 

CONCLUSION

 In this proposal, resilience lies in the following foundation:

1.        The systemic sequence of Z408àZ340àZ13 reflects a logical cascade.

2.        Seven of the eight symbols are “fed” directly from the Z340 based on this cascade.

3.        The multi-variate 8-ball hints at a higher functionality from a systemic perspective. The substitution of J L N assumes the middle section as an alphabet sequence proper, where the content (J L N) are the positions of the symbols (5-7-9) shifted by “E” (dominant Z408 element). The fact-checking lies in the logical sequence of “J K L M N”.

4.        Final placement (order) of 8-ball content “J L N” is based on the shift of the N in the last triad (NAM) at position-1. This is based on identifying the “N” as being in the tier-2 class on an entropy-based classification of symbols. It is the only one of the tier-2 symbols that is part of the proposed “8-ball” content triad.

5.        The final placement of the plaintext content is justified and indeed validates a rational teletype system on ASCII basis where fundamental “reading logic” obeys the rules of conduct without overlapped reads or missed symbols. The printout gives the name “ODELL J. AN DREA”.

6.        The Zodiac Cross is also a symbol with added teletype functionality as it offers ETB/EOT command. Thus, the last symbol is the killer’s signature, as in letters.

7.        The method offers a singular key based for the most part on the Z340 key (cascade logic flow).

8.        A name leading to a further “riddle” is compatible with the killer’s taunting method.

Εικόνα που περιέχει κείμενο, γραμματοσειρά, γραφικός χαρακτήρας, έγγραφο

Περιγραφή που δημιουργήθηκε αυτόματα

Figure 5. Obituary of Andrea J. (Jeanette) Odell

SDS

Version1: May 5, 2024

Version 2 (revised): April 23, 2025

Comments

Popular posts from this blog

Commentary vol. 1: The Joost Name and the Cartography of Power

About this blog