The Founding Fathers of Cryptography?

It’s Veterans Day, and on an occasion dedicated to giving thanks to all those who served the United States honorably during either war or peacetime, it seemed appropriate to turn our puzzly gaze toward at American history for today’s post.

In fact, let’s look to America’s formative days. We’ve written in the past about George Washington and his creation of America’s first spy ring, and how heavily they relied on encryption and codebreaking techniques to protect America’s earliest secrets.

But as it turns out, Washington was far from the only Founding Father who was a strong proponent of cryptography.

Second president John Adams used a cipher to send letters to his wife Abigail when he was traveling. That cipher was designed by James Lovell, a member of the Continental Congress Committee on Foreign Affairs.

President #3 also relied heavily on ciphers and secret methods of communication. Thomas Jefferson created special ciphers specifically for Meriwether Lewis to use during the Lewis and Clark Expedition to protect the intrepid duo’s findings.

He even developed his own method for encryption. Some call it the wheel cypher, but it’s more commonly referred to as the Jefferson Disk.

These 36 wheels, threaded onto an iron spindle, allow the user to twist them until a message reads out. Each wheel has the letters of the alphabet in a random order.

So how did it work? Well, according to Monticello.org:

As an example, the sender of the message shown in the picture, “COOL JEFFERSON WHEEL CIPHER,” spells the message out and then looks to any other line of text – possibly the one directly above, which on this version of the cipher begins with the letter “N.” The sender then copies the rest of the letters from that line into the correspondence to spell out “NKYG NSUS NXML CQYO TYUH HFTD.”

The man who succeeded Jefferson as president, James Madison, employed encryption for both official documents — like letters between himself and members of the Continental Congress — and communication with other key figures. For instance, he sent a partially encrypted letter to Jefferson that described his plan to introduce a Bill of Rights.

Madison’s fellow contributor to the Federalist Papers, John Jay (later the first Chief Justice of the Supreme Court) always employed ciphers for diplomatic correspondence when traveling outside the US.

[This wooden puzzle is known as Franklin’s Kite.]

And as you might expect, the influential inventor, statesman, and polymath Benjamin Franklin had his hands in codecracking and cryptography as well. He not only created some of the ciphers employed by the Continental Congress, but he also published a book about encryption in the 1740s: George Fisher’s The American Instructor.

The Continental Congress, for their part, passed a resolution ordering ciphers to be used for all messages that couldn’t be safely transmitted otherwise.

In the end, as in the beginning, America doesn’t just love puzzles, it’s founded on puzzly principles.

[For more content involving American history and puzzles, check out our multi-part series on the history of the NSA, as well as the story of how a Tap Code and other puzzly spycraft techniques kept a soldier’s love story alive.]


dailypopwsicon

Treat yourself to some delightful deals on puzzles. You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

The D’Agapeyeff Cipher, Unsolved for 80 Years!

[Image courtesy of Derek Bruff.org.]

One of my all-time favorite cryptography stories comes from the book The Spy That Couldn’t Spell, a true-life espionage story about a dyslexic man who hid, then encrypted the locations of, thousands of pages of sensitive documents he had stolen from the U.S government.

Why is it one of my favorite stories? Well, because the man in question FORGOT one of the cipher words he used to encrypt the location of his caches.

And it sort of unravels your master plan when you can’t remember a key element of it.

Amazingly enough, this isn’t the only example of a self-trained cryptographer who forgot how to solve his own creation. In fact, one example of this very dilemma remains one of the most famous unsolved codes and ciphers in the world:

The D’Agapeyeff Cipher.

daga

This is the D’Agapeyeff Cipher. This seemingly simple list of numbers contains a secret message. The only problem is… the creator, Alexander D’Agapeyeff, can’t remember how to decrypt it.

When he published a starter book on cryptography — Codes and Ciphers, first edition — D’Agapeyeff included this chain of 5-digit number bundles as a final challenge for the readers to unravel.

One of the first steps many aspiring cryptographers take is to break the numbers down into pairs instead of groups of five:

daga 2

One result of this is the pattern that every pair has 6, 7, 8, 9, or 0 in the tens column and 1, 2, 3, 4, or 5 in the ones column, which doesn’t seem like a coincidence.

And see those sequences where the same number appears three times in a row? Some cryptographers believe that is also not a coincidence.

Then, they cut off the two double-zero pairings at the end — because they believe they were nulls, empty space-filling characters simply designed to fit the 5-letter groupings pattern of the original code as a way to throw off codecrackers. (And, to be fair, D’Agapeyeff himself wrote about null entries in the book Codes and Ciphers.)

If you remove those double-zero pairings, you can arrange the numbers into a 14×14 pairing grid, like so:

daga 3

See those sequences where the same number appears three times in a row? More of them now.

Many cryptographers consider this to be the true starting point of cracking the D’Agapeyeff Cipher.

But then what?

Some believe that the key to solving the grid lies in the Polybius Square, another encryption device mentioned by D’Agapeyeff.

Essentially, you place the alphabet into a 5×5 grid, and use those numbers to encrypt the letters. Here’s a straightforward example:

daga 4

In this case, the word PUZZLE would be 35 45 55 55 31 15.

Another way to use the cipher is to pick a keyword to start it. For instance, if you chose POLYBIUS as the key word, then you go across, then down, writing POLYBIUS and then the rest of the unused letters of the alphabet in order, like so:

daga 5

Instead of 1-5 both across and down, you could do 1-5 across the top and 6-0 across the side, reflecting the pairings in the D’Agapeyeff Cipher.

Or, as someone pointed out, perhaps we’re thinking in the wrong language. Triple-letters are uncommon in English words, but more common in Russian words, and D’Agapeyeff was Russian born.

Overlooking simple things like that can make you miss crucial ways into an encrypted message.

So, do you have any thoughts on how to solve this 80-year-old encrypted challenge, fellow puzzlers? Let us know in the comments section below! We’d love to hear from you.


dailypopwsicon

Have you checked out our special summer deals yet? You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

Puzzles in Plain Sight: Spinning Yellow Circles edition

Adobe_Semaphore_Wide_768x512.0

About six months ago, I shared the story of a secret code lurking in plain sight, sitting atop the Capitol Records Building in Los Angeles. It’s not the only time that buildings have made their way into the blog; in previous posts, we’ve discussed the giant crossword adorning the side of an apartment building in Lvov, Ukraine, as well as the optical illusion awaiting art lovers in a Roman palace.

But it was the only time we’ve discussed a secret code being shared on the side of a building.

Until today, that is.

Yes, my friends and fellow puzzlers, there’s another building out there broadcasting secret messages for all to see. It’s also in California. And this one is more devious than the blinking light on the Capitol Records Building.

adobe semaphore 1

Say hello to Almaden Tower, the San Jose headquarters of Adobe, the software company behind Acrobat, Illustrator, and numerous other editing programs.

As you can see, there are four bright yellow circles beside the Adobe logo. These 10-foot-high digital lights all rotate. And if you pay enough attention, you might discover the secret message being broadcast.

The messages began transmitting in 2006. The code was cracked for the first time in 2007, and it wasn’t a brief message either. The lights were secretly transmitting the entire text of the Thomas Pynchon novel The Crying of Lot 49.

You see, the rotating circles allow for a form of semaphore alphabet, a way of secretly forming letters or symbols based on the position of each of the circles. They can be horizontal, vertical, a left-leaning diagonal, or a right-leaning diagonal. The various combinations of these positions create a semaphore alphabet of 256 possible characters.

adobe semaphore 2

But this was only the first part of the encryption. Even if you uncovered and charted this pattern, you still had to decode the secret messages detailing specific key words that would help you break the Vigenere encryption of the actual text.

It took MONTHS for two tech workers to figure out the semaphore language, decipher the code, and uncover the final message.

So naturally, just like the hidden alien language in the animated sci-fi comedy Futurama, it was replaced with a second, more complex code to be unraveled.

That code, which started transmitting in 2012, wasn’t broken until 2017 when a math professor started streaming footage of the Adobe building and charting the various positions of the circles.

But his examination led him to believe that it wasn’t just text being broadcast this time… it was an audio message. After discovering a chain of symbols that he believed was a space or bit of silence in an audio broadcast, he graphed the results, which resembled an audio wave.

It turns out, his suspicions were correct, and further analysis resulted in the true audio being uncovered: Neil Armstrong’s famous message from the moon landing.

Apparently, a new code and message are currently being brainstormed for Adobe’s devious puzzle monument. Who knows what Ben Rubin, the designer, has in store for solvers this time?


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

A Puzzly Discovery Under the Sea!

We’ve talked quite a bit about the importance of Enigma machines in the past.

The quest to crack the unbreakable Nazi code machine spanned the Atlantic Ocean and resulted in never-before-seen collaborations between analysts, codebreakers, and puzzlers from all walks of life, dedicating hours upon hours every day to trying to unravel the secrets of German communications. Cracking the code would be the key to intercepting crucial information and outmaneuvering the Nazi war machine.

We’ve discussed those twin decryption locations — Arlington Hall in the US and Bletchley Park in the UK — as well as the efforts of codebreakers like Elizebeth Smith Friedman to dismantle the work of Nazi spymasters both during and after World War II.

The story of Alan Turing is inextricably linked with that of the Enigma device, even though there were three Polish mathematicians — Rejewski, Rózycki & Zygalski — who had already demonstrated that the Nazi code was breakable and even managed to reverse engineer an Enigma machine.

Strangely, we rarely talk about the Enigma machines themselves. They were dangerously efficient, as explained in this article from Atlas Obscura:

When the Nazis needed to send confidential messages, they entered the dispatches into the machine, which substituted every letter using a system of three or four rotors and a reflector, encrypting the message for a recipient Enigma machine to decode.

Getting Allied hands on one during the war was a top priority, so much so that the standing orders on German ships and U-boats was to throw them overboard and let the sea claim them, rather than risking the chance of the Allies getting ahold of one.

underwater enigma

But the sea doesn’t always keep secrets forever, and a recent dive by a marine biologist team discovered the remains of an Enigma machine in the Bay of Gelting:

He noticed a contraption tangled up in the fishing line the crew had headed down to collect. The device, which at first seemed like an old typewriter sitting under at least 30 feet of water, was a Nazi Enigma machine, likely one of hundreds abandoned and thrown overboard in the dying days of the German war effort.

And those devices still contain valuable information decades later.

Each Enigma machine has a serial number, and if this machine’s number is still legible after decades underwater, it could reveal which ship or Nazi unit the Enigma machine belonged to. This would allow researchers to track the use of the device and what impact its use or its absence had on the war effort overall.

Yes, it’s not just mussels and fish that call this device home, but a readily accessible history of the device itself, if we can only read it.

underwater enigma 2

And now, instead of being protected at all costs by German officers, this machine is now protected by archaeologists and researchers, sitting in a tank of demineralized water in order to flush out the salt and salt water that has so corroded the machine over time. It will spend almost a year in that tank before any restoration efforts can proceed.

Successful recoveries of these machines are understandably rare, and this is a chance to add to the historical record of codebreaking and puzzling during World War II. Here’s hoping we can stumble upon more of these lost treasures in the future.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Where Puzzles, Knitting, and Spycraft Combine!

You might have seen the news story last year about a woman who chronicled numerous train delays with her knitting while she worked on a scarf. (Though you probably didn’t hear that it sold on eBay for over 7,000 Euros.)

Knitting is a clever way to both eat up downtime waiting for the train and also document how long that train made you wait. Moreover, it’s sending a message in an unusual fashion — an image that speaks volumes.

And one thing we’ve learned over the years is that when you can send a message without words, spy agencies will jump on that bandwagon.

So it should come as no surprise to you that knitting has been part of spycraft techniques for decades.

True, it is far more common from someone to simply passively observe the enemy WHILE knitting and hiding in plain sight. This was very common in countries all over Europe. When you consider how often volunteers were encouraged to knit warm hats, scarves, and gloves for soldiers during wartime, it wouldn’t be unusual to see people knitting all over the place.

Some passed secret messages hidden in balls of yarn. Elizabeth Bently, an American who spied for the Soviet Union during WWII, snuck plans for B-29 bombs and other aircraft construction information to her contacts in her knitting bag.

Another agent, Phyllis Latour Doyle, had different codes to choose from on a length of silk, so she kept it with her knitting to remain inconspicuous. She would poke each code she used with a pin so it wouldn’t be employed a second time — making it harder for the Germans to break them.

But there was a small contingent of folks who went deeper, actually encoding messages in their knitting to pass on intelligence agencies.

It makes sense. Knitting is essentially binary code. Whereas binary code is made up of ones and zeroes (and some key spacing), knitting consists of knit stitches and purl stitches, each with different qualities that make for an easily discernable pattern, if you know what you’re looking for. So, an attentive spy or informant could knit chains of smooth stitches and little bumps, hiding information as they record it.

When you factor Morse code into the mix, knitting seems like an obvious technique for transmitting secret messages.

[What is this Christmas sweater trying to tell us?]

During World Wars I and II, this was used to keep track of enemy train movements, deliveries, soldiers’ patrol patterns, cargo shipments, and more, particularly in Belgium and France. There are examples of codes hidden through knitting, embroidery, hooked rugs, and other creations, often right under the noses of the enemy.

As more intelligence agencies picked up on the technique, it started to breed paranoia, even in organizations that continued to use knitters as passive spies and active encryption agents.

There were rumors that Germans were knitting entire sweaters full of information, then unraveling them and hanging the threads in special doorways where the letters of the alphabet were marked at different heights, allowing these elaborate messages to be decoded.

Of course, this could be apocryphal. There’s no proof such overly detailed sweaters were ever produced or unraveled and decoded in this manner. (Plus, a knitter would have to be pretty exact with their spacing for the doorway-alphabet thing to work seamlessly.)

During the Second World War, the UK’s Office of Censorship actually banned people from using the mail to send knitting patterns abroad, for fear that they contained coded messages.

Naturally, a puzzly mind could do all sorts of things with an idea like this. You could encode secret love notes for someone you admire or care for, or maybe encrypt a snide comment in a scarf for somebody you don’t particularly like. It’s passive aggressive, sure, but it’s also hilarious and very creative.

Now if you’ll excuse me, I need to unravel this gift from my aunt and see if she’s talking crap about me through my adorable mittens.

Happy puzzling, everybody!

[For more information on this topic, check out this wonderful article by Natalie Zarrelli.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles in Plain Sight: Secret Message in Hollywood Edition!

3847c

[Image courtesy of MathTutorDVD.]

I am fascinated by codebreaking, secret codes, and that whole subgenre of puzzle solving. Probably because I’m pretty bad at it.

Don’t get me wrong, I can crack your bog-standard cryptogram or alphanumeric message. I’m fairly good at identifying patterns and deciphering codes when it comes to simple three-, four-, and five-digit answers in most escape room scenarios.

But when you start getting into encryptions where a letter’s meaning can shift as the coded message evolves — like the one employed by a devious 10-year-old kid in a puzzly letter to Santa years ago — and I quickly find myself stymied.

It leaves me all the more impressed when I read about codebreaking efforts as ambitious as ENIGMA and as silly (and, yet, still quite impressive) as Futurama fans cracking the multiple alien codes in the show just from random snippets.

But codebreaking isn’t just about cleverness, pattern-recognition, and determination.

Sometimes, it’s about knowing where to look.

For instance, in Los Angeles, there have been secret messages being transmitted in plain sight for decades.

Just cast your eyes to the light atop the Capitol Records building in Los Angeles.

The building was designed to look like a stack of records on a turntable, complete with the spindle pointing skyward. It opened in 1956, and the president of Capitol Records at the time, Alan Livingston, wanted the light to send out a message in Morse code. On opening day, Leila Morse — the granddaughter of Samuel Morse, inventor of Morse code — turned the light on.

The secret message being broadcast? “Hollywood.”

The message blinked away for decades. But it wasn’t the only message the light atop Capitol Records would send over the years.

In 1992, to celebrate the fiftieth anniversary of Capitol Records, the code was changed to “Capitol 50” for the entire year. Then it went back to the traditional “Hollywood” code.

4f1dcfb619b03bea8cc82d43356f2977

A decade later, it was changed again. What was the message? A secret announcement that would excite millions of pop music fans…

“Katy Perry. Prism. October 22, 2013.”

But as far as anyone can tell, nobody noticed. This teaser announcement never made the local or national news.

And so far, there hasn’t been a secret message since. At least, not that anyone has noticed.

Still, best keep your eyes on that light. You never know if your favorite artist might send you a secret signal. And it sure beats looking for backwards messages in heavy metal songs.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!