Monday, October 19, 2009

Quoted In Code




Wow.

This is a first.

I am quoted in code. Specifically, a number substitution cryptogram.



04.22.19.19.21.11.13.05.20.22.09 15.19.11.06.12.19.13 24.19.13.13.05.20.13 05.04 13.05.06.08.11.24 11.20.18 21.05.22.11.24 23.08.22.15.16.19.13 26.11.13.19.18 05.20 13.09.21.26.05.24.08.13.21 05.04 15.12.19 15.05.05.24.13 11.20.18 24.11.20.14.16.11.14.19 05.04 15.12.19 11.20.06.08.19.20.15 26.16.08.24.18.08.20.14 15.22.11.18.19, 16.13.08.20.14 15.12.19 26.16.08.24.18.08.20.14 05.04 11 13.15.22.16.06.15.16.22.19 11.13 11 13.09.21.26.05.24 04.05.22 15.12.19 26.16.08.24.18.08.20.14 05.04 06.12.11.22.11.06.15.19.22 08.20 21.19.20. 21.11.13.05.20.13 11.22.19 05.26.24.08.14.19.18 15.05 17.22.11.06.15.08.06.19 26.22.05.15.12.19.22.24.09 24.05.23.19, 21.16.15.16.11.24 11.13.13.08.13.15.11.20.06.19, 19.07.16.11.24.08.15.09, 13.19.06.22.19.06.09, 11.20.18 15.22.16.13.15 26.19.15.25.19.19.20 19.11.06.12 05.15.12.19.22.

(Need a hint? Go here.)

This is from the upcoming book, Cracking Codes and Cryptograms For Dummies, by Denise Sutherland and Brother Mark Koltko-Rivera.

With over 300 different puzzles of varying skill levels from the simplest substitution puzzles to fiendishly difficult ciphers Cracking Codes & Cryptograms For Dummies provides an introduction to the use and function of codes and cryptograms in the world of secret societies and their connections to conspiracy theories.

The book is unique in that there are three conspiracy stories, set in the times of the American Revolutionary War, American Civil War, and the present day, which are encrypted through the book - to uncover the stories you need to crack the ciphers!

The types of puzzles include:
  • Cryptograms with letter substitutions, number substitutions (A=1, B=2, etc.), and symbol substitutions (A=♦, B=☼, etc.).
  • Caesar Ciphers—also called Shift Ciphers where there is a shift of number of letters in the alphabet
  • Masonic Ciphers—a collection of real symbols and ciphers used by Masons for hundreds of years, including the substitution cipher exchanging letters for symbols based on a grid design (also known as the Pigpen Cipher).
  • Rail Fence Ciphers—in this type of transposition cipher a message is written along a zig-zag path, across two to five lines (or rails), and then broken into sets of letters
  • Caesar Box Ciphers—messages are written down the columns of a grid, and transcribed by row by row.
  • Keyboard Ciphers—using cellphones and computer keyboards to create ciphers.
  • Twisted Path Ciphers—the message is written into a grid, along a winding path, and then transcribed row by row.
Anagrams and Wordplay
  • Anagrams—rearranging the letters of a word or phrase to produce a new word or phrase.
  • Cryptic Clues—learn some tricks from the world of cryptic crosswords, and solve these anagram, hidden word, and double definition clues
  • Double level Ciphers—by solving one cryptogram you get a keyword, which then allows you to crack the encryption on a different kind of puzzle.


I was honored to be asked to write the foreword, but Denise and Mark have done a fantastic job creating a very fun book that will drive you crazy. Due in stores any day now.

1 comment:

Jejune said...

Hi Chris,

Thanks for posting about our book, and for your great Introduction too! Have you managed to crack "your" cipher yet? :)

Denise Sutherland