The Founding Fathers of Cryptography?

It’s Veterans Day, and on an occasion dedicated to giving thanks to all those who served the United States honorably during either war or peacetime, it seemed appropriate to turn our puzzly gaze toward at American history for today’s post.

In fact, let’s look to America’s formative days. We’ve written in the past about George Washington and his creation of America’s first spy ring, and how heavily they relied on encryption and codebreaking techniques to protect America’s earliest secrets.

But as it turns out, Washington was far from the only Founding Father who was a strong proponent of cryptography.

Second president John Adams used a cipher to send letters to his wife Abigail when he was traveling. That cipher was designed by James Lovell, a member of the Continental Congress Committee on Foreign Affairs.

President #3 also relied heavily on ciphers and secret methods of communication. Thomas Jefferson created special ciphers specifically for Meriwether Lewis to use during the Lewis and Clark Expedition to protect the intrepid duo’s findings.

He even developed his own method for encryption. Some call it the wheel cypher, but it’s more commonly referred to as the Jefferson Disk.

These 36 wheels, threaded onto an iron spindle, allow the user to twist them until a message reads out. Each wheel has the letters of the alphabet in a random order.

So how did it work? Well, according to Monticello.org:

As an example, the sender of the message shown in the picture, “COOL JEFFERSON WHEEL CIPHER,” spells the message out and then looks to any other line of text – possibly the one directly above, which on this version of the cipher begins with the letter “N.” The sender then copies the rest of the letters from that line into the correspondence to spell out “NKYG NSUS NXML CQYO TYUH HFTD.”

The man who succeeded Jefferson as president, James Madison, employed encryption for both official documents — like letters between himself and members of the Continental Congress — and communication with other key figures. For instance, he sent a partially encrypted letter to Jefferson that described his plan to introduce a Bill of Rights.

Madison’s fellow contributor to the Federalist Papers, John Jay (later the first Chief Justice of the Supreme Court) always employed ciphers for diplomatic correspondence when traveling outside the US.

[This wooden puzzle is known as Franklin’s Kite.]

And as you might expect, the influential inventor, statesman, and polymath Benjamin Franklin had his hands in codecracking and cryptography as well. He not only created some of the ciphers employed by the Continental Congress, but he also published a book about encryption in the 1740s: George Fisher’s The American Instructor.

The Continental Congress, for their part, passed a resolution ordering ciphers to be used for all messages that couldn’t be safely transmitted otherwise.

In the end, as in the beginning, America doesn’t just love puzzles, it’s founded on puzzly principles.

[For more content involving American history and puzzles, check out our multi-part series on the history of the NSA, as well as the story of how a Tap Code and other puzzly spycraft techniques kept a soldier’s love story alive.]


dailypopwsicon

Treat yourself to some delightful deals on puzzles. You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

Puzzles and Games With a Sacred Touch?

In recent times, religion and the world of puzzles and games have crossed paths with sometimes surprising results.

The film adaptation of The Da Vinci Code, a fairly puzzle-centric thriller, was widely denounced by members of the Catholic Church, and there was similar resistance, though less vocal, against the sequel film, Angels & Demons.

And, of course, in the 1980s, the roleplaying game Dungeons & Dragons was condemned as Satanic and dangerous to young minds.

I say that the above is strange because, for the most part, these seem to be anomalies or isolated incidents. There are numerous instances throughout history where puzzles and games were embraced by religion, even used as tools to teach aspects of religious beliefs.

For instance, in ancient Egypt, we’ve seen evidence of puzzly techniques used not just to secure the tomb of Tutankhamun, but also to disguise the language and rituals employed by elite members of their society. Puzzles were entrusted to keep their secrets well beyond the grave.

the seal on king tut's tomb

Plus one of the most ancient games in the historical record, Senet, seems to have evolved from being an enjoyable pastime into a spiritual tool.

You see, some Senet boards have religious iconography on them, believed to symbolize the journey into the afterlife. So gameplay — or the inclusion of the gameboard itself among the belongings of the deceased — represented that journey and the quest to learn more about it.

Some online articles have taken to referring to Senet as “the Rosicrucian board game of death,” which is a harsh misinterpretation.

There was also an afterlife connection with games for the Vikings.

According to Mark Hall, a curator at Perth Museum and Art Gallery, there have been 36 burials where board games of some description have been found in the graves around Northern Europe.

These grave sites grant intriguing insight into how the Vikings viewed board games as a learning tool. It’s believed that including a board game among the effects of the deceased signaled not only their skill and status as a warrior, but their preparedness for the afterlife itself. Heck, their win-loss records were even recorded for posterity!

Palindromes were believed to work as magical shields that protected those wearing the talismans bearing such clever wordplay.

Heck, even the shape of dice were influenced by changing religious views. Early dice games gave very little consideration to the shape or evenness of dice, because rolls were believed to be guided by Fate or some greater outside force, so the shape didn’t matter.

As religious beliefs evolved away from gods and greater forces intervening in such things, the general spirit of fairness in dice began to prevail, and the shape, balance, and pip distribution of dice became much more standardized.

And as for the Catholic Church, I certainly didn’t mean to make it look like I was picking on them in the introduction, because there are positive associations between the church and the world of puzzles and games as well.

And no, I’m not just talking about lighthearted products like BibleOpoly or the cottage industry of family-friendly games like Bible editions of Outburst, Scattergories, Apples to Apples, Scrabble, and Taboo.

Chess boards and other game boards have been found in houses formerly used by the Knights Templar, for instance.

There’s also the puzzly art of carmina figurata, poems wherein either the entire body of the poem or select parts form a shape or pattern. These works originated as religious tributes, poems where letters were colored red to stand out from the regular black lettering in order to draw attention to or highlight a certain religious figure.

tumblr_m6a31vnnxo1qggdq1

[“De laudibus sanctae Crucis” by Oliverus.
Image courtesy of WTF Art History.]

There would be hidden words or messages concealed in the text, some speaking of the religious icons at the center of the piece in glowing terms.

Do you have any favorite puzzles and games that have an element of religion to them, fellow puzzlers and PuzzleNationers? Let us know in the comments section below. We’d love to hear from you!


dailypopwsicon

Halloween is almost here, and we have some spookily good deals for you to check out. You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

Spies, Crosswords, and Secret Messages!

secret message

There are loads of ways to hide secret messages in puzzles. The field of cryptography is built around it. Many meta puzzles have a special secret lurking inside their clever constructions. Heck, our friends at Penny Press even have an entire word seek called Secret Message.

But have you ever noticed that there’s a strange fascination in pop culture with secret messages in crosswords?

No, I don’t mean constructors hiding quotations, poems, or word seeks in their crosswords, though those are impressive feats of cruciverbalism.

I’m talking about stories about actual secret messages concealed in crossword grids, meant to be hidden from even the most diligent solvers, only a special few possessing the keys to finding the hidden words.

Oh, believe me, it’s definitely a thing.

Look no further than the first Crossword Mysteries movie. The film opens with a murdered art gallery owner with a crossword in his pocket. And it turns out that a devilish criminal mastermind was submitting puzzles to Tess’s daily crossword that contained hidden instructions for robberies to be conducted that day. Diabolical!

You might laugh, but this is hardly the only time we’ve seen crime, secret messages, and crosswords combined. It was a plotline in the radio show The Adventures of Superman, and Lois Lane’s life once depended on Superman’s ability to solve a crossword puzzle.

There are any number of mystery novels, cozy and otherwise, that contain hidden messages in crosswords. Nero Blanc’s Anatomy of a Crossword and Corpus de Crossword come to mind, as do any number of murder mysteries where a strange message scribbled on a crossword grid turn out to be a pivotal clue to catch the killer.

And there’s an even more curious subset of this in pop culture: crosswords and spycraft.

I could give you a simple example, like Bernie Mac’s character in the Ocean’s 11 remake pretending to solve a crossword, but actually writing down key information about the casino for the upcoming heist.

But that’s not really a secret message IN a crossword. No, it’s more of a secret message ON a crossword, though it is a bit of decent spycraft.

CnwtMc9UMAAssmH

[From Spy vs. Guy.]

Let’s talk about spies and their crosswords, then.

In the TV show Burn Notice, former (and occasionally current) spy Michael Weston sometimes received hidden messages from his previous spy organization through the crossword, though we’re not given much info on how this is achieved.

In the James Bond prequel novel Double or Die, it’s actually the young Bond’s teacher who sneaks a secret message into a puzzle. He’s also a cryptic crossword editor, and he convinces his kidnappers to allow him to submit a crossword to the newspaper, because if he didn’t, it would let people know all was not well.

Naturally, the kidnappers didn’t spot the clues to his current location that the teacher had hidden in the puzzle. Bond, even in his youth, manages to do so with ease.

Rubicon-008

In the short-lived TV show Rubicon, crosswords are at the center of a fascinating unsolved mystery. An intelligence agent named Will finds out his mentor committed suicide after seeing a four-leaf clover.

He then finds a pattern across several crosswords that leads him to believe his mentor’s death is somehow connected to the pattern in the crosswords, and he tells his superior about it.

And soon after investigating it himself, Will’s superior is also found dead. Unfortunately, we never get a resolution for this story, but it certainly fits the bill.

So yes, the curious connection between secret messages and crosswords in pop culture is definitely a thing.

But did you know it also extends beyond fiction? Yup, I’ve got some real-world examples for you too.

Back in June of 1944, physics teacher and crossword constructor Leonard Dawe was questioned by authorities after several words coinciding with D-Day invasion plans appeared in London’s Daily Telegraph.

The words Omaha (codename for one of Normandy’s beaches), Utah (another Normandy beach codename), Overlord (the name for the plan to land at Normandy on June 6th), mulberry (nickname for a portable harbor built for D-Day), and Neptune (name for the naval portion of the invasion) all appeared in Daily Telegraph crosswords during the month preceding the D-Day landing.

So it was possible (though highly improbable) that Dawe was purposely trying to inform the enemy of Allied plans, and the powers that be acted accordingly. In the end, no definitive link could be found, and consensus is that Dawe either overheard these words himself or was told them by his students — possibly slipped by soldiers stationed nearby — and placed them into his grids unwittingly.

Yes, this was just a big misunderstanding. But sometimes, accusations like this have real-world consequences.

In Venezuela, a newspaper has been accused multiple times of hiding encrypted messages within their daily crossword puzzles in order to incite revolt against the government.

Another Venezuelan newspaper was accused of concealing messages ordering the assassination of a public official named Adan, the brother of President Hugo Chavez!

article-0-130C1EBE000005DC-570_468x591

Some of the answers considered suspicious in the grid included “Adan,” “asesinen” (meaning “kill”), and “rafaga” (which can mean either a burst of gunfire, or a gust of wind).

Apparently this confluence was considered enough to warrant a half-dozen members of the intelligence service visiting the newspaper’s editorial office.

Now, were these cases of genuine secret messages being passed through the crossword, or were these coincidental events that appeared credible because the crossword/secret message concept has been part of pop culture for decades?

I leave that question to you, fellow puzzlers.

Can you think of any examples of crosswords with secret messages in pop culture or intersections of crosswords and spycraft that weren’t mentioned here? Let us know in the comments section below! We’d love to hear from you.


dailypopwsicon

Well, summer’s over, but we still have deals galore for you to check out. You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

The D’Agapeyeff Cipher, Unsolved for 80 Years!

[Image courtesy of Derek Bruff.org.]

One of my all-time favorite cryptography stories comes from the book The Spy That Couldn’t Spell, a true-life espionage story about a dyslexic man who hid, then encrypted the locations of, thousands of pages of sensitive documents he had stolen from the U.S government.

Why is it one of my favorite stories? Well, because the man in question FORGOT one of the cipher words he used to encrypt the location of his caches.

And it sort of unravels your master plan when you can’t remember a key element of it.

Amazingly enough, this isn’t the only example of a self-trained cryptographer who forgot how to solve his own creation. In fact, one example of this very dilemma remains one of the most famous unsolved codes and ciphers in the world:

The D’Agapeyeff Cipher.

daga

This is the D’Agapeyeff Cipher. This seemingly simple list of numbers contains a secret message. The only problem is… the creator, Alexander D’Agapeyeff, can’t remember how to decrypt it.

When he published a starter book on cryptography — Codes and Ciphers, first edition — D’Agapeyeff included this chain of 5-digit number bundles as a final challenge for the readers to unravel.

One of the first steps many aspiring cryptographers take is to break the numbers down into pairs instead of groups of five:

daga 2

One result of this is the pattern that every pair has 6, 7, 8, 9, or 0 in the tens column and 1, 2, 3, 4, or 5 in the ones column, which doesn’t seem like a coincidence.

And see those sequences where the same number appears three times in a row? Some cryptographers believe that is also not a coincidence.

Then, they cut off the two double-zero pairings at the end — because they believe they were nulls, empty space-filling characters simply designed to fit the 5-letter groupings pattern of the original code as a way to throw off codecrackers. (And, to be fair, D’Agapeyeff himself wrote about null entries in the book Codes and Ciphers.)

If you remove those double-zero pairings, you can arrange the numbers into a 14×14 pairing grid, like so:

daga 3

See those sequences where the same number appears three times in a row? More of them now.

Many cryptographers consider this to be the true starting point of cracking the D’Agapeyeff Cipher.

But then what?

Some believe that the key to solving the grid lies in the Polybius Square, another encryption device mentioned by D’Agapeyeff.

Essentially, you place the alphabet into a 5×5 grid, and use those numbers to encrypt the letters. Here’s a straightforward example:

daga 4

In this case, the word PUZZLE would be 35 45 55 55 31 15.

Another way to use the cipher is to pick a keyword to start it. For instance, if you chose POLYBIUS as the key word, then you go across, then down, writing POLYBIUS and then the rest of the unused letters of the alphabet in order, like so:

daga 5

Instead of 1-5 both across and down, you could do 1-5 across the top and 6-0 across the side, reflecting the pairings in the D’Agapeyeff Cipher.

Or, as someone pointed out, perhaps we’re thinking in the wrong language. Triple-letters are uncommon in English words, but more common in Russian words, and D’Agapeyeff was Russian born.

Overlooking simple things like that can make you miss crucial ways into an encrypted message.

So, do you have any thoughts on how to solve this 80-year-old encrypted challenge, fellow puzzlers? Let us know in the comments section below! We’d love to hear from you.


dailypopwsicon

Have you checked out our special summer deals yet? You can find them on the Home Screen for Daily POP Crosswords and Daily POP Word Search! Check them out!

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

Does the History of Cryptography Begin in Ancient Egypt?

Puzzles in various forms have been with us for thousands of years.

We can look back at examples like riddles from ancient Greece and Sumeria, the Smyrna word square from 79 AD, or inscriptions from New Kingdom-era Egypt between the 16th and 11th centuries BC, which can be read both across the rows and down the columns. (These are informally referred to as “Egyptian crossword puzzles.”)

As it turns out, if we turn our attention to ancient Egypt, we may just find the earliest known example of an encrypted message as well.

If you go hunting on the Internet for the earliest examples of cryptography or encryption, you pretty much get one of three results:

  • The ancient Greek scytale
  • The Caesar cipher
  • The Tomb of Khnumhotep II

Naturally, as someone who fancies himself a puzzle historian, I’ve heard of the first two entries on that list.

The scytale is an encryption method where a piece of leather, hide, or parchment (let’s say leather for this example) is wound around a wooden cylinder of a certain width and length. A message is then written on the wound piece of leather. When removed from the cylinder, the message disappears, leaving only a strip of leather with what looks like a jumble of letters on it. Only someone with an identical cylinder can wrap the piece of leather around it and read the intended message. Our earliest verifiable reference to the scytale is from the Greek poet Archilochus in the 7th century BC.

The Caesar cipher is the most famous example of a letter-shifting substitution code where numbers or other letters represent the letters in your message. For example, if B is K in your cipher, then C is L and D is M, as if the alphabet has shifted. See? Simple. Your average cryptogram puzzle is more complex because you’re not simply shifting your letter choices, you’re randomizing them. The Roman historian Suetonius references Caesar’s use of the cipher in his writings during the rule of Hadrian in the second century AD.

But what about this Egyptian tomb?

The tomb in question was built for Khnumhotep II, a nobleman who lived in the twentieth century BC. He carried many impressive titles, including Great Chief of the Oryx nome, hereditary prince and count, foremost of actions, royal sealer, and overseer of the Eastern Desert. (Seriously, with titles like this around, modern companies can clearly do better than manager, CEO, or senior editor. But I digress.)

The main chamber of his tomb features an inscription carved around 1900 BC. This inscription features some strange hieroglyphics. What makes them strange is that they’re in places where you would expect more common hieroglyphs, and it’s believed by some Egyptologists that these substitutions are no accident.

Some do pass it off as an intentional effort to describe the life of Khnumhotep II in more glowing or dignified terms, utilizing loftier verbiage that would be uncommon to any commonfolk readers, similar to how legalese is used today to impress others or intimidate readers.

But others believe it to be the earliest known example of a substitution cipher, utilizing hieroglyphs rather than letters or numbers. For what reason, you ask? To preserve the sacred nature of their religious rituals from the common people.

Unfortunately, this disagreement among scholars makes it hard to point definitively at the tomb of Khnumhotep II as the first written evidence of cryptography.

I guess this falls into the same black hole as the first bit of wordplay, the first anagram, the first pun, or the first riddle. We’ll never know, because the first examples of all of these would most likely be spoken, not written. It’s not until someone decides to record it — in pictograph form, in a carving, in a bit of ancient graffiti to be discovered centuries later — that it becomes evidence to be discovered centuries later.

And who’s to say that the linguists and cryptography believers aren’t both correct? A substitution cipher is, at heart, simply an agreed-upon way to say one thing represents or means another thing. A euphemism, an idiom, a common slang word… heck, a word you say in front of your kids instead of a swear. These are all very simple substitution ciphers.

The truth is probably somewhere in the middle.

What we do know is that there was some wordplay afoot in the tomb of Khnumhotep II, even if we can’t be sure if the history of ciphers and codes started there.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Musical Cryptography: Hiding Messages in the Music!

R-944801-1218936757.jpeg

In previous posts, we’ve explored many ways that messages can be encrypted or hidden. We’ve talked about legendary encryption methods like Caesar ciphers and Vigenere ciphers, as well as simpler auditory ones like Morse code and tap codes. We’ve seen encryptions through blinking lights, woven through crossword grids, and even knitted into scarves.

But did you know that composers can encode messages in their music, and have done so for centuries?

No, we’re not talking about subliminal messaging or tales of backwards messages hidden in metal songs. We’re talking about musical cryptography, and it turns out there’s not just music between the notes, but messages among them as well.

haydn

Now, to be fair, there is no evidence that musical encryption has ever been used for spycraft. (Sorry, Outlander fans.) Most of the time, composers simply entertained themselves by hiding the letters of their name or the names of others into compositions just because they could.

This sort of musical wordplay appears in compositions by Ravel, Debussy, and Shostakovich among others. Johann Sebastian Bach did this often enough that the succession of notes B-A-C-H is now called a Bach motif.

According to Western Michigan University Music Professor David Loberg Code:

Sometimes a musical version of a name is a subtle reference in the piece of music… Often it is very prominent; it is the main theme of the piece and is heard over and over. In that case, whether or not you know exactly how the composer translated the name into musical pitches, it is obvious that it is meant to be heard… They were not secretive about it.

It even proved therapeutic for some composers.

Johannes Brahms incorporated the notes A-G-A-H-E in bars 162 to 168 of the first movement in his 1868 piece “String Sextet No. 2 in G major.” By doing so, he included the name of Agathe von Siebold, a young woman he had fallen in love with. He and Agathe made plans to wed, but he later broke off the engagement to focus on his musical career.

But, by encoding her name into one of his works, he both honored her and gave himself closure on a relationship that would never be.

notes

The musical nature of this encryption technique makes it effective — because casual listeners wouldn’t notice anything hidden — but it also means that longer messages are harder to include naturally.

You see, the “spelling” can affect the music. Obviously, the more complex the message, the more it interferes with the actual musical composition and flow of the piece. To the untrained ear, this wouldn’t necessarily jump out, but to a trained ear, or at least a person experienced in reading music, it would be fairly obvious that something was amiss.

Musical ciphers are attributed to various composers (like Haydn) and even to writers like Francis Bacon, but arguably the greatest success story in musical cryptography goes to French composer Olivier Messiaen.

messiaen

His cipher matched a different note to each of the 26 letters in the alphabet. Unlike many other composers, he managed to develop a cipher that closely mirrored his own compositional style. Because of the similarities between his cipher and his traditional musical works, there was less of a chance that listeners would detect anything was off.

He managed to translate the words of philosopher Thomas Aquinas into an organ piece called “Méditations sur le mystère de la Sainte Trinité,” and cryptographers and musical historians alike praise him for doing so with complex rhythms and rich tones without spoiling his own works.

It’s clear that it takes both an artistic flair and a puzzler’s mind to make the most of musical cryptography. But then again, those two pursuits have crossed paths many times before, as evidenced by musically minded solvers like Dan Feyer, Patrick Blindauer, Jon Delfin, and friend of the blog Keith Yarbrough.

Perhaps the best of musical cryptography is yet to come.

[For more details on musical cryptography, check out this brilliant Atlas Obscura article by Christina Ayele Djossa.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!