thingymuwatsit said:
Looks like a one-time cypher: the letters likely represent a specific word or letter on a code sheet of either this man's or somebody else's device. Nobody will be able to solve it unless you have the original code sheet.
That'd be a simple, reasonable solution, yes.
mazeut said:
Wouldn't your average high school dropouts amateur code be harder to break. He will likely not conform to any rules normally used in cryptography, hes making it up as he goes. Being a high school drop out also makes it less likely for him to have studied books on the subject. He could have just seen the Da Vinc Code, thought it was cool and began making his own.
No, that wouldn't help, unless everyone involving in trying to break it (and by extension, the world) has somehow overlooked something fundamental about ciphers that he managed to think up himself.
mazeut said:
For that mater it might not be a code, just short hand mixed with a homemade language or mutant phonetic spellings. There's several letter combos there that could be interpenetrated as shortened words but no recognizable punctuation or word structure otherwise. Punctuation could be hidden or nonexistent. It takes forever to piece together ancient, lost languages, and that's with a library of examples, not just two scraps of paper.
That would be perfectly possible, yes. If you're mucking around with some form of language you've invented yourself, it's much more like a code than a cipher.
No one else seems to have mentioned it yet, but a code isn't the same as a cipher. A cipher is where you play around with the letters and replace them with other letters or numbers or so on. A code is completely different, it's where you replace entire words or phrases.
For example, if I say "Hello there", I mean "Hello there", but if I say "Hi there" I mean "the lizard people are coming for you".
You can't crack a code simply by sticking in a computer, you have to find a codebook or someone who knows the code. Alternatively, you can wait until the code has been used lots of times, and carefully watch the people giving and sending the messages and see what they do, but there's no guarantees that way.