The Founding Fathers of Cryptography?

It’s Veterans Day, and on an occasion dedicated to giving thanks to all those who served the United States honorably during either war or peacetime, it seemed appropriate to turn our puzzly gaze toward at American history for today’s post.

In fact, let’s look to America’s formative days. We’ve written in the past about George Washington and his creation of America’s first spy ring, and how heavily they relied on encryption and codebreaking techniques to protect America’s earliest secrets.

But as it turns out, Washington was far from the only Founding Father who was a strong proponent of cryptography.

Second president John Adams used a cipher to send letters to his wife Abigail when he was traveling. That cipher was designed by James Lovell, a member of the Continental Congress Committee on Foreign Affairs.

President #3 also relied heavily on ciphers and secret methods of communication. Thomas Jefferson created special ciphers specifically for Meriwether Lewis to use during the Lewis and Clark Expedition to protect the intrepid duo’s findings.

He even developed his own method for encryption. Some call it the wheel cypher, but it’s more commonly referred to as the Jefferson Disk.

These 36 wheels, threaded onto an iron spindle, allow the user to twist them until a message reads out. Each wheel has the letters of the alphabet in a random order.

So how did it work? Well, according to Monticello.org:

As an example, the sender of the message shown in the picture, “COOL JEFFERSON WHEEL CIPHER,” spells the message out and then looks to any other line of text – possibly the one directly above, which on this version of the cipher begins with the letter “N.” The sender then copies the rest of the letters from that line into the correspondence to spell out “NKYG NSUS NXML CQYO TYUH HFTD.”

The man who succeeded Jefferson as president, James Madison, employed encryption for both official documents — like letters between himself and members of the Continental Congress — and communication with other key figures. For instance, he sent a partially encrypted letter to Jefferson that described his plan to introduce a Bill of Rights.

Madison’s fellow contributor to the Federalist Papers, John Jay (later the first Chief Justice of the Supreme Court) always employed ciphers for diplomatic correspondence when traveling outside the US.

[This wooden puzzle is known as Franklin’s Kite.]

And as you might expect, the influential inventor, statesman, and polymath Benjamin Franklin had his hands in codecracking and cryptography as well. He not only created some of the ciphers employed by the Continental Congress, but he also published a book about encryption in the 1740s: George Fisher’s The American Instructor.

The Continental Congress, for their part, passed a resolution ordering ciphers to be used for all messages that couldn’t be safely transmitted otherwise.

In the end, as in the beginning, America doesn’t just love puzzles, it’s founded on puzzly principles.

[For more content involving American history and puzzles, check out our multi-part series on the history of the NSA, as well as the story of how a Tap Code and other puzzly spycraft techniques kept a soldier’s love story alive.]


dailypopwsicon

Treat yourself to some delightful deals on puzzles. You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

The D’Agapeyeff Cipher, Unsolved for 80 Years!

[Image courtesy of Derek Bruff.org.]

One of my all-time favorite cryptography stories comes from the book The Spy That Couldn’t Spell, a true-life espionage story about a dyslexic man who hid, then encrypted the locations of, thousands of pages of sensitive documents he had stolen from the U.S government.

Why is it one of my favorite stories? Well, because the man in question FORGOT one of the cipher words he used to encrypt the location of his caches.

And it sort of unravels your master plan when you can’t remember a key element of it.

Amazingly enough, this isn’t the only example of a self-trained cryptographer who forgot how to solve his own creation. In fact, one example of this very dilemma remains one of the most famous unsolved codes and ciphers in the world:

The D’Agapeyeff Cipher.

daga

This is the D’Agapeyeff Cipher. This seemingly simple list of numbers contains a secret message. The only problem is… the creator, Alexander D’Agapeyeff, can’t remember how to decrypt it.

When he published a starter book on cryptography — Codes and Ciphers, first edition — D’Agapeyeff included this chain of 5-digit number bundles as a final challenge for the readers to unravel.

One of the first steps many aspiring cryptographers take is to break the numbers down into pairs instead of groups of five:

daga 2

One result of this is the pattern that every pair has 6, 7, 8, 9, or 0 in the tens column and 1, 2, 3, 4, or 5 in the ones column, which doesn’t seem like a coincidence.

And see those sequences where the same number appears three times in a row? Some cryptographers believe that is also not a coincidence.

Then, they cut off the two double-zero pairings at the end — because they believe they were nulls, empty space-filling characters simply designed to fit the 5-letter groupings pattern of the original code as a way to throw off codecrackers. (And, to be fair, D’Agapeyeff himself wrote about null entries in the book Codes and Ciphers.)

If you remove those double-zero pairings, you can arrange the numbers into a 14×14 pairing grid, like so:

daga 3

See those sequences where the same number appears three times in a row? More of them now.

Many cryptographers consider this to be the true starting point of cracking the D’Agapeyeff Cipher.

But then what?

Some believe that the key to solving the grid lies in the Polybius Square, another encryption device mentioned by D’Agapeyeff.

Essentially, you place the alphabet into a 5×5 grid, and use those numbers to encrypt the letters. Here’s a straightforward example:

daga 4

In this case, the word PUZZLE would be 35 45 55 55 31 15.

Another way to use the cipher is to pick a keyword to start it. For instance, if you chose POLYBIUS as the key word, then you go across, then down, writing POLYBIUS and then the rest of the unused letters of the alphabet in order, like so:

daga 5

Instead of 1-5 both across and down, you could do 1-5 across the top and 6-0 across the side, reflecting the pairings in the D’Agapeyeff Cipher.

Or, as someone pointed out, perhaps we’re thinking in the wrong language. Triple-letters are uncommon in English words, but more common in Russian words, and D’Agapeyeff was Russian born.

Overlooking simple things like that can make you miss crucial ways into an encrypted message.

So, do you have any thoughts on how to solve this 80-year-old encrypted challenge, fellow puzzlers? Let us know in the comments section below! We’d love to hear from you.


dailypopwsicon

Have you checked out our special summer deals yet? You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

Where Puzzles, Knitting, and Spycraft Combine!

You might have seen the news story last year about a woman who chronicled numerous train delays with her knitting while she worked on a scarf. (Though you probably didn’t hear that it sold on eBay for over 7,000 Euros.)

Knitting is a clever way to both eat up downtime waiting for the train and also document how long that train made you wait. Moreover, it’s sending a message in an unusual fashion — an image that speaks volumes.

And one thing we’ve learned over the years is that when you can send a message without words, spy agencies will jump on that bandwagon.

So it should come as no surprise to you that knitting has been part of spycraft techniques for decades.

True, it is far more common from someone to simply passively observe the enemy WHILE knitting and hiding in plain sight. This was very common in countries all over Europe. When you consider how often volunteers were encouraged to knit warm hats, scarves, and gloves for soldiers during wartime, it wouldn’t be unusual to see people knitting all over the place.

Some passed secret messages hidden in balls of yarn. Elizabeth Bently, an American who spied for the Soviet Union during WWII, snuck plans for B-29 bombs and other aircraft construction information to her contacts in her knitting bag.

Another agent, Phyllis Latour Doyle, had different codes to choose from on a length of silk, so she kept it with her knitting to remain inconspicuous. She would poke each code she used with a pin so it wouldn’t be employed a second time — making it harder for the Germans to break them.

But there was a small contingent of folks who went deeper, actually encoding messages in their knitting to pass on intelligence agencies.

It makes sense. Knitting is essentially binary code. Whereas binary code is made up of ones and zeroes (and some key spacing), knitting consists of knit stitches and purl stitches, each with different qualities that make for an easily discernable pattern, if you know what you’re looking for. So, an attentive spy or informant could knit chains of smooth stitches and little bumps, hiding information as they record it.

When you factor Morse code into the mix, knitting seems like an obvious technique for transmitting secret messages.

[What is this Christmas sweater trying to tell us?]

During World Wars I and II, this was used to keep track of enemy train movements, deliveries, soldiers’ patrol patterns, cargo shipments, and more, particularly in Belgium and France. There are examples of codes hidden through knitting, embroidery, hooked rugs, and other creations, often right under the noses of the enemy.

As more intelligence agencies picked up on the technique, it started to breed paranoia, even in organizations that continued to use knitters as passive spies and active encryption agents.

There were rumors that Germans were knitting entire sweaters full of information, then unraveling them and hanging the threads in special doorways where the letters of the alphabet were marked at different heights, allowing these elaborate messages to be decoded.

Of course, this could be apocryphal. There’s no proof such overly detailed sweaters were ever produced or unraveled and decoded in this manner. (Plus, a knitter would have to be pretty exact with their spacing for the doorway-alphabet thing to work seamlessly.)

During the Second World War, the UK’s Office of Censorship actually banned people from using the mail to send knitting patterns abroad, for fear that they contained coded messages.

Naturally, a puzzly mind could do all sorts of things with an idea like this. You could encode secret love notes for someone you admire or care for, or maybe encrypt a snide comment in a scarf for somebody you don’t particularly like. It’s passive aggressive, sure, but it’s also hilarious and very creative.

Now if you’ll excuse me, I need to unravel this gift from my aunt and see if she’s talking crap about me through my adorable mittens.

Happy puzzling, everybody!

[For more information on this topic, check out this wonderful article by Natalie Zarrelli.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles in Plain Sight: Secret Message in Hollywood Edition!

3847c

[Image courtesy of MathTutorDVD.]

I am fascinated by codebreaking, secret codes, and that whole subgenre of puzzle solving. Probably because I’m pretty bad at it.

Don’t get me wrong, I can crack your bog-standard cryptogram or alphanumeric message. I’m fairly good at identifying patterns and deciphering codes when it comes to simple three-, four-, and five-digit answers in most escape room scenarios.

But when you start getting into encryptions where a letter’s meaning can shift as the coded message evolves — like the one employed by a devious 10-year-old kid in a puzzly letter to Santa years ago — and I quickly find myself stymied.

It leaves me all the more impressed when I read about codebreaking efforts as ambitious as ENIGMA and as silly (and, yet, still quite impressive) as Futurama fans cracking the multiple alien codes in the show just from random snippets.

But codebreaking isn’t just about cleverness, pattern-recognition, and determination.

Sometimes, it’s about knowing where to look.

For instance, in Los Angeles, there have been secret messages being transmitted in plain sight for decades.

Just cast your eyes to the light atop the Capitol Records building in Los Angeles.

The building was designed to look like a stack of records on a turntable, complete with the spindle pointing skyward. It opened in 1956, and the president of Capitol Records at the time, Alan Livingston, wanted the light to send out a message in Morse code. On opening day, Leila Morse — the granddaughter of Samuel Morse, inventor of Morse code — turned the light on.

The secret message being broadcast? “Hollywood.”

The message blinked away for decades. But it wasn’t the only message the light atop Capitol Records would send over the years.

In 1992, to celebrate the fiftieth anniversary of Capitol Records, the code was changed to “Capitol 50” for the entire year. Then it went back to the traditional “Hollywood” code.

4f1dcfb619b03bea8cc82d43356f2977

A decade later, it was changed again. What was the message? A secret announcement that would excite millions of pop music fans…

“Katy Perry. Prism. October 22, 2013.”

But as far as anyone can tell, nobody noticed. This teaser announcement never made the local or national news.

And so far, there hasn’t been a secret message since. At least, not that anyone has noticed.

Still, best keep your eyes on that light. You never know if your favorite artist might send you a secret signal. And it sure beats looking for backwards messages in heavy metal songs.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Rock Your World With These Puzzly Mysteries!

Dighton_Rock-Davis_photograph

[Image courtesy of Atlas Obscura.]

We’ve spent a lot of time over the last few months discussing treasure hunts, but those are far from the only puzzly adventures that can send solvers out into nature. If you prefer your puzzling to have a codebreaking or cryptographic angle, we’ve got you covered there as well.

There are three mysterious stones in the United States alone that bear mysterious messages that have boggled the minds of puzzlers for decades upon decades.

In Massachusetts, an eponymous state park museum is the home of the Dighton Rock, a stone covered in petroglyphs that has baffled viewers for centuries. (The earliest writings about the rock date back to 1690!)

judaculla

[Images courtesy of Atlas Obscura. Look at the difference
between the two photos. Time is definitely running out…]

In the mountains of North Carolina, the petroglyphs of the Judaculla Rock defy decoding. Even dating the petroglyphs proves difficult, with estimates placing the origins of the rock’s message between 200 BC and 2000 BC. Sadly, efforts to solve the mystery of this former sacred site of the Cherokee people are fighting the forces of time itself, as erosion threatens the integrity of the glyphs.

And for solvers in the Southwest, New Mexico has the Decalogue Stone, which bears an inscription that, depending on the language used to decode it, could be a record of the Ten Commandments or a report from a lost explorer or warrior. (The possibility that it’s a hoax has been floated by more than one investigator as well.)

rock-inscription

[Image courtesy of The Connexion.]

But for today’s mystery, we turn toward the country of France, more specifically the village of Plougastel-Daoulas in Brittany, the home of a rock that has baffled solvers for at least a century.

Unlike the Dighton Rock, which was moved from the waterline of the Taunton River, the inscription on this rock spends most of its time submerged in the Atlantic Ocean, revealing itself only at low tide. The 20-line inscription utilizes letters from the French alphabet, but the actual language used has eluded solvers. Suggestions include Basque and Old Breton. (There are also two dates on the rock: 1786 and 1787.)

Those dates lead some articles to estimate that the inscription’s origins date back as far as 250 years, but I think that’s unlikely. The rock was only discovered four or five years ago, so that’s a huge window wherein those dates could’ve been carved into the rock.

So, what makes this rock so interesting, given the examples we’ve shared above? Well, this rock inspired the village of Plougastel-Daoulas to host a contest last year to decipher it, offering a prize of 2000 Euros to anyone who could translate it.

13445296-0-image-a-39_1557760832524

[Image courtesy of The Daily Mail.]

In February of this year, the prize was awarded to two solvers who pitched different solutions to the inscription:

The first hypothesis came from Noël René Toudic, professor of English, who has a degree in Celtic Studies. He said that the inscription was likely about a soldier, Serge Le Bris, who may have died at sea during a storm. Another soldier, Grégoire Haloteau, was then asked to engrave the rock in memory of the dead man.

The second hypothesis came from reporter and writer Roger Faligot, and comic book author and illustrator Alain Robert. They suggested that the inscription was by someone expressing their anger against those who caused the death of a friend.

Despite those pitches — and all of the headlines declaring the mystery solved — this case is not officially closed yet. Perhaps other towns will follow the Plougastel-Daoulas model to encourage both visitors and solvers.

It certainly couldn’t hurt.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles in Pop Culture: The Challenge: Total Madness

totalmad head

[Image courtesy of The Nikki Sin.]

One of the first reality TV shows to make an impact was MTV’s The Real World, which debuted back in 1992. A show wherein seven strangers would live together in a house and have their lives and interactions taped, it is credited with helping launch the modern reality TV genre.

In the decades since, one of the show’s longest-lasting spin-offs has been The Challenge, a competition show where former Real World alums and other reality show figures compete against each other in physical and mental games, both individually and as teams. There is also a social element to the show, as players form alliances, scheme against other competitors, and often vote out players at regular intervals.

Challenge 35

[Image courtesy of TV Guide.]

As you might expect, puzzles have worked their way into The Challenge from time to time. Memory games, riddles, anagrams, sliding tile puzzles, and variations on the Tower of Hanoi puzzle have all appeared in past seasons.

The most recent iteration of the show, The Challenge: Total Madness, pits the players against each other in the hopes of making it to the finals and winning a big cash prize.

In last week’s episode, the players arrived at a quarry, where a puzzly surprise awaited them: Decode and Detonate.

totalmad1

The players each had a sign bearing a sequence of symbols. Their job was to decode the sequence and display the correct decryption below the sign, using letter and number cards found in a box below the sign.

But in order to decode the sign, they would have to acquire the key to the puzzle.

Well, keys.

totalmad2

Yes, the key indicating which symbols represented which letters / numbers was split between two boards a fair distance apart. With two puzzle keys to run to — and each key only bearing some of the symbols on your sign — you’re going to have to run to both puzzle keys at some point. And that doesn’t include any running back to your sign you have to do in order to decode the letters you can remember.

totalmad3

Once you’ve decoded your sign (and it’s been confirmed as correct by the judges), you have to run to a detonator and push down the plunger, blowing up one of the two trucks perched on the bluff high above. Out of 26 competitors, only 2 can push a detonator and win the game.

totalmad4

The players, as you might expect, had different strategies going into today’s challenge.

Swaggy C, a rookie, bragged about relying on his photographic memory. CT, a veteran, immediately created a memorization tool for himself, associating each character with an image or something familiar so he could better remember it.

totalmad8

Jordan hoped to remember four or five symbols on his first run, figuring he could make up time because of his endurance. Fessy, meanwhile, kept it simpler, hoping to remember three symbols, because he thought trying to remember too many would cause him to jumble them up and get confused.

Wes opted to group the symbols in sets of four, hoping to keep each smaller bundle of characters in his brain more efficiently, and then make up time during the runs between stations.

totalmad6

After a fair amount of running, Swaggy C and CT were neck and neck. Swaggy C was the first to call for a check — asking the judges to confirm his solution — but it was incorrect. So much for that photographic memory of his.

totalmad7

CT called for a check and was correct, becoming the first competitor to run to one of the detonators and blow up a truck, earning him the win and power going forward in the game.

When the truck exploded, all of the competitors, no matter how far away, now knew that someone had completed the puzzle. Only one spot left.

totalmad9

You might think people would pair up to divide and conquer, hitting both puzzle keys at once and reconvening to see how many letters they could cobble together as a team.

No one opted to pair up. But one player DID consult another player’s work.

totalmad10

Bayleigh took advantage of the fact that everyone was using the same code language. One of the other competitors, Jenny, had the same C-shaped coded letter Bayleigh had on her sign, and had placed a decoded letter beneath it. Bayleigh took a chance that Jenny was right about the decryption, and used the information to complete her sign’s coded sequence.

When she asked for a check, it was correct. TRICKY. Not exactly in the spirit of the challenge, but effective nonetheless.

totalmad11

Bayleigh then sprinted to the second detonator and blew up the second truck, joining CT in victory and bringing the day’s challenge to a close.

totalmad12

One of the cleverest things about the way The Challenge uses puzzles is that they incorporate physical obstacles as well.

For instance, solving a puzzle on a hot day, and making the players run all over. As you get tired, you’re not in peak puzzle-solving condition, and it makes memorization and recall harder. Even if you have a (supposedly) photographic memory under normal circumstances, stressing the body always makes mental tasks more taxing.

totalmad5

Although this wasn’t the most difficult puzzle-based event I’ve seen in previous editions of The Challenge, it was a nice variation and certainly kept the competitors on their toes. I look forward to seeing if there are more puzzly obstacles awaiting the two teams as the competition continues.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!