Puzzles in Plain Sight: Coded Puzzles!

Given the nature of my line of work, I think about puzzles a lot. But, as it turns out, even when I’m not thinking about puzzles, puzzles seem to find me anyway.

As followers of our Instagram account know, last night I was reading a collection of supernatural short stories, Dark Detectives, edited by Stephen Jones. Partway through a story titled “Vultures Gather,” I encountered the following passage:

That’s right, an encrypted passage smack dab in the middle of my supernatural mystery story!

As it turns out, our investigators uncover a message left behind by the deceased, indicating that he was murdered! Not only that, but he makes a cagey reference to one of my favorite horror movies in order to provide a method for both exposing and punishing his duplicitous attackers.

It all starts with a letter and two pieces of parchment with Greek lettering. The letter entrusts the paper and their secret contents to the two men, in case anything suspicious should happen. (Fortuitous!)

The investigators, with the help of two of their friend’s books — The Boy’s Book of General Knowledge and The Boy’s Book of Puzzles and Brain Teasers — try to crack it with a simple transposition code, meaning one letter or number represents another. This is the basis of standard cryptograms and many other crypto-puzzles.

[Leela tackling an alien code in Futurama.]

But this only yields gibberish. That is, until they remember something from the letter he left them: “The locks are my favorite books, the key is seven.”

The seventh letter is G, meaning that should be the starting letter of their transposition pattern.

Unraveling the encryption reveals some sinister-sounding magical incantations, which they put aside for the moment.

Then they turn their attention to the remaining bits of code in the letter: the strings (5,2,2,5) and 831214926142252425798. Assuming their friend would want these codes cracked quickly, they employ a simple alphanumeric cipher.

Now, alphanumerics can work several ways.

  • Sometimes, the numbers coincide with those of a push-button telephone, meaning 5 can be J, K, or L.
  • Other times, the numbers represent that letter’s position in the alphabet. A is 1, B is 2, Z is 26, etc.
  • They can also be transposition codes, where each letter corresponds to a random number. This is the case in Codewords.

8312149261422524225798 uses the second style of alphanumeric code. So 8 would be H, 3 would be C…

Wait, that doesn’t work! Unless you remember that “the key is seven,” as mentioned above. Which means that G would be 1, H would be 2, etc.

So now, with some trial and error, 831214926142252425798 becomes 8/3/1/2/14/9/26/14/2/25/24/25/7/9/8, or NIGHTOFTHEDEMON. As it turns out, (5,2,2,5) is a hint to breaking up your answer into words, like the indicator of word length that follows a British-style crossword clue or cryptic crossword clue. This makes the answer NIGHT OF THE DEMON.

[Unfortunately, no one in the story seems to notice that THE is 3 letters, and the clue should’ve read (5,2,3,5). Oops.]


So, in the end, not only did I get a great supernatural detective story (with mystical revenge to boot!), I got a brief refresher on some of the most popular encryption styles employed by puzzlers today.

Not too shabby at all.

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!

You’ll never guess this Viking secret message…

I write about codebreaking a lot in this blog. For me, it’s one of the most fascinating real-world applications of puzzle-solving skills. The fact that so many of these stories involve momentous and fascinating times in history — like the Civil War, World War II, and even the identity of the Man in the Iron Mask — is just icing on the cake.

But it’s nice to be reminded that playing around with codes for fun is an equally long-lasting tradition.

K. Jonas Nordby (probably my favorite name that has ever appeared on the blog, by the way), is a runologist — a scholar of runes — at the University of Oslo, and he recently cracked a runic code employed by the Vikings, the jotunvillur code, based on samples scratched into a stick from the 13th century.

From an article on Medievalists.net (though I first spotted the story on IO9):

For the jötunvillur code, one would replace the original runic character with the last sound of the rune name. For example, the rune for ‘f’, pronounced fe, would be turned into an ‘e’, while the rune for ‘k’, pronounced kaun, became ‘n’.

The messages themselves range from simple expressions — “Kiss me” — to taunts by confident codesmiths daring readers to try to crack a given runic code.

Heck, some of the encoded messages even included a Viking cryptographer boasting about his skills!

It’s fun to imagine Vikings toying with various codes and runes during their downtime. Even marauders take time out for some quality puzzling, it seems. =)

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!

George Washington: Commander in Chief (and Codes)

George Washington was the first American president, the Father of Our Country, a general, a farmer, and an inventor. He invigorated and empowered the role of the president far beyond what the Framers of the Constitution originally envisioned, and is widely regarded as the standard against which all presidents are measured.

But did you know he also created America’s first spy ring?

The story is fascinating, and you get the full scoop in Brian Kilmeade and Don Yeager’s book George Washington’s Secret Six: The Spy Ring That Saved the American Revolution.

As the Revolutionary War raged on and America struggled to rout the British forces, Washington realized that British spycraft was heavily responsible for American losses. Determined to even the playing field, Washington marshalled trusted associates to form America’s first spy ring, known as the Culper Ring.

Originally, Washington and his agents employed code names and a few numerical substitutions for words in their messages. The two key agents, Benjamin Tallmadge and Abraham Woodhull, were designated Culper Junior and Culper Senior, respectively, while a still-unidentified female agent is known only as Agent 355. (355 was Tallmadge’s code for “lady.”)

10 stood for New York and 20 for Setauket, so that the recipient would know the source of the information contained in the reports. Two additional numbers, 30 and 40, were used to designate Jonas Hawkins and Austin Roe as post riders delivering the messages to their next destination.

But after two close calls with key agents and information endangered by the British, they followed the French model and developed a more elaborate code system.

Making a list from 1 to 763, he [Benjamin Tallmadge] … assigned each pertinent word, location, or name a numerical code. He became 721, Woodhull as Culper Senior 722, Townsend as Culper Junior 723, Roe 724, and Brewster 725. General Washington was 711 and his British counterpart, General Clinton, was 712. Numbers were often represented by letters, so that the year “1779,” for example, might read as “ennq.”

Could you decipher this message, a rudimentary version of the code eventually used by the Culper Ring?

[In this example of Tallmadge’s ever-evolving code,
“Setauket” went from “20” in the earlier code to “729.”]

They delivered their coded messages through some tried-and-true spying methods, including employing invisible ink and disguising vital communiques as bland family letters. And the Culper Ring had some stunning victories to its credit, including rooting out Benedict Arnold’s traitorous plot to hand over West Point to the British.

[An example of the more elaborate, French-inspired code system
employed later in the war by Washington and the Culper Ring.]

The Culper Ring even saved American aspiring cryptographers one heck of a headache. There was a standing order for agents to “learn as many of the British navy’s code signals as possible, so that the French fleet could decipher what the enemy ships were communicating to one another during naval engagements.”

As you might imagine, even skilled codebreakers would’ve had a nearly impossible time memorizing the codes AND deciphering them in the midst of battle. Thankfully, the Culper Ring obtained a copy of the entire British Naval Codebook, not only saving the eyes and sanity of numerous Americans, but delivering Yorktown to American Revolutionary forces.

In fact, British intelligence agent Major George Beckwith commented, “Washington did not really outfight the British, he simply outspied us!”

And he used some puzzly cryptography skills to do it.

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!

An iron mask and an uncrackable code…

I’ll probably never get tired of writing blog posts about cryptography. It’s a puzzly skill with plenty of real-world applications. Heck, England hosts a yearly codebreaking challenge in order to identify people with topnotch cryptographic abilities in the hopes of recruiting them for government work!

We’ve explored how modern codebreaking has cracked secret messages from the Civil War as well as how cryptographic skill caught a murderer and helped decipher the lost language Linear B. We’ve even talked about the time that enterprising codebreakers saved Christmas!

And, as it turns out, a nineteenth-century codebreaker may have solved the mystery of the Man in the Iron Mask.

For centuries, French communiques were unreadable because the French employed Le Grand Chiffre, or the Great Cipher, a substitution code devised by Antoine and Bonaventure Rossignol that employed numbers standing in for letters. (There were several variations of the Great Cipher, ranging between 580 and 720 code numbers.)

But the Great Cipher was cracked by Etienne Bazeries, a French military cryptoanalyst who deduced that each number stood not for a single letter, but for pairings of letters. More specifically, syllables. Over the course of three years (from 1891 to 1893), by working his way through the patterns and identifying common letter patterns based on frequency of use, he deciphered first a few words, and eventually, the entire cipher. (Supposedly the key was the numeric combination “124-22-125-46-345,” which stood for “the enemies.”)

One of the encoded messages from King Louis XIV concerned a disgraced general named Vivien de Bulonde, who endangered an entire French campaign against the Austrians by fleeing an Italian town instead of attacking it.

His Majesty knows better than any other person the consequences of this act, and he is also aware of how deeply our failure to take the place will prejudice our cause, a failure which must be repaired during the winter. His Majesty desires that you immediately arrest General Bulonde and cause him to be conducted to the fortress of Pignerole, where he will be locked in a cell under guard at night, and permitted to walk the battlement during the day with a 330 309.

Bazeries believes that “330” and “309” stood for the syllables “mas” and “que,” meaning that General Bulonde was masked for his daily walks, but since those Great Cipher codes were apparently only used once, it’s impossible to confirm Bazeries’ suspicions.

It took Bazeries three years to crack an “uncrackable” code, and quite possibly solve a centuries-old mystery. Another testament to where puzzly skills can take you.

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!

Let’s crack some Confederate codes!

[A table for cracking Vigenere ciphers.]

Cryptography is probably the only puzzly skill in history upon which lives have depended. The movements of troops, plans for invasion, locations of key officers, spies, and personnel… all of these vital pieces of information have been encoded numerous times across numerous conflicts, all in the hopes of keeping that data from prying eyes.

It’s not as if anyone has to solve a crossword to prevent a Dennis Hopper-esque madman from wreaking havoc on Los Angeles, or the outcome of a pivotal battle hinged on someone finding all the words in a word seek faster than the enemy.

But cryptography is both a delightful diversion and deadly serious, depending on the context.

Which makes it all the more curious that it took more than a hundred years for a Confederate message from the Civil War to be decoded.

The coded message was first displayed in The Museum of the Confederacy in Richmond, Virginia in 1896, after being donated by Captain William A. Smith, a member of Walker’s Greyhounds, a division of Texans fighting for the Confederacy.

The actual message was unknown. The rolled-up slip of paper was tied with a linen thread and placed in a small glass vial along with a .36-caliber lead pistol bullet, and stoppered shut. (The bullet was included in order to make the vial heavy enough to be tossed into the river and sink if the scout carrying it was in danger of being captured.)

The mysterious message was meant for General John C. Pemberton, the Confederate general attempting to protect and defend Vicksburg from the army of Union Major General Ulysses S Grant. The same general who would surrender Vicksburg to Grant on July 4, 1863 after 47 days under siege.

But the message never got to Pemberton. Instead, it ended up as part of a Civil War museum, its message undelivered, its code unbroken.

Until 2008, when curiosity among museum staff led to an unveiling a century later than intended. The message was photographed and then returned to the glass vial, which itself was then returned to its display.

And the message intended for General Pemberton?

SEAN WIEUIIZH DTG CNP LBNXGK OZ BJQB FEQT FEQT XZBW JJOA TK FHR TPZWK PBW RYSQ VOWPZXGG OEPF EK UASFKIPW PLVO JKZ HMN NVAEUD XYE DWRJ BOYPA SX MLV FYYRDE LVPL MEYSIN XY FQEO NPK M OBPC FYXJFHOHT AS ETOV B OCAJDSVQU M ZTZV TPJY DAW FQTI WTTJ J DQGOAIA FLWHTXTI QMTR SEA LVLFLXFO.

Unlike many simple coding techniques, this is not a Caesar cipher where each letter is simply another letter of the alphabet in disguise. (Every E is actually an L, every F an M, etc.)

This is a Vigenere cipher, where a key word or phrase is required to unlock the letter substitution involved. For centuries, this cipher was considered unbreakable, though this was no longer the case by the time of the Civil War. (The Union regularly cracked coded Confederate messages.)

By 2008, Vigenere ciphers were easily cracked by amateur and professional cryptographers alike, and the Confederate message was finally revealed to the world:

Gen’l Pemberton, you can expect no help from this side of the river. Let Gen’l Johnston know, if possible, when you can attack the same point on the enemy’s line. Inform me also and I will endeavor to make a diversion. I have sent some caps. I subjoin despatch from Gen. Johnston.

Essentially, the message means that the reinforcements Pemberton was hoping for to shore up Vicksburg’s defenses weren’t coming.

But the message never got to the general, because before the scout arrived with the bad news, Vicksburg had already fallen, and Pemberton had surrendered.

So instead, the scout, having somehow realized from afar that Vicksburg was lost, returned to his camp and handed the unopened message to a Captain Smith, the same man who would later donate the message to the Museum.

And an enduring mystery was born.

[I learned of this story in the book Hidden Treasures: What Museums Can’t or Won’t Show You by Harriet Baskas, which also inspired my post a few weeks ago about the Morris Museum music box.]

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!

It’s Follow-Up Friday!

Welcome to Follow-Up Friday!

For those new to PuzzleNation Blog, Follow-Up Friday is a chance for us to revisit the subjects of previous posts and update the PuzzleNation audience on how these projects are doing and what these people have been up to in the meantime.

Today, I’ve got two short updates for you.

First, there’s a new page on the blog for information about our apps and iBooks. For pictures, links, and details on our crossword, sudoku, and word seek puzzles, click here!

And be sure to bookmark it, since new apps will be added to the page as they’re released!

Second, a PuzzleNationer requested an update on this year’s Cicada 3301 puzzle.

Back in January, I wrote about the mysterious Cicada 3301, an elaborate multilayered scavenger hunt across the Internet that involves cryptography, research, and some serious cleverness to unravel.

It first appeared in January of 2012, until a few diligent and dedicated solvers unraveled its secrets, and the puzzle was shut down. Then in January of 2013, a new Cicada 3301 puzzle emerged, similarly challenging and just as short-lived.

January 2014 was no different, as the latest Cicada 3301 puzzle appeared. Unfortunately, as far as we know, no one has yet cracked it.

But one of the code wizards who solved Cicada 3301’s 2012 puzzle has come forward to offer advice to aspiring Cicada solvers:

Make sure that you have a good understanding of every part of the previous Cicada 3301 puzzles. If there is a subject you are not already well acquainted with, take your time to read and learn more about it.

Try to solve as much as possible of the earlier puzzles by yourself rather than just reading through a write-up.

For parts you do read, make sure you understand each step completely and try to think about how you would have arrived at the same conclusions by yourself.

Last but not least, enjoy the ride.

Are there any stories or features from the PuzzleNation Blog you’d like an update on? Let us know and your suggestion could be the focus of our next Follow-Up Friday!

Thanks for visiting PuzzleNation Blog today! You can share your pictures with us on Instagram, friend us on Facebook, check us out on Twitter, Pinterest, and Tumblr, and be sure to check out the growing library of PuzzleNation apps and games!