| 
             
           
          
            
              
                  
               | 
              
                  
               | 
              
                 
                  
                  Crack the Ciphers 
                  by Jim Gillogly
  
                  Here's your chance to crack ciphers similar to those Bletchley
                  Park's codebreakers faced during World War II. Below, we
                  present three ciphers of different levels of difficulty, from
                  easiest to most challenging. Cryptanalyst Jim Gillogly created
                  them using the Playfair, Double Playfair, and Double
                  Transposition ciphers, respectively. In the opening paragraph
                  for each challenge, we link to instructions regarding each
                  cipher, which should help you along. The instructions link to
                  hints, which in turn link to each cipher's solution.
  
                  Over a fortnight in November 1999, we offered a contest to see
                  if anyone could crack any or all of the three ciphers. We
                  deliberately made the contest short to give viewers a sense of
                  urgency similar to that felt by the codebreakers of Bletchley
                  Park. In the end, during those two weeks, no one succeeded in
                  cracking Ciphers 2 and 3, and only four entrants managed to
                  break Cipher 1. (See the
                  Hall of Fame
                  to learn who the winners are, how they went about cracking the
                  cipher, and what Jim Gillogly thought of their procedure.) We
                  hope that the level of difficulty will only encourage you to
                  try these challenging ciphers on your own time. Good luck!
  
                  Cipher #1
                   
                  To: Col. Tiltman, Bletchley Park
  
                  This message was received by an intercept station in Scotland.
                  The frequency and format indicate that it is a most urgent
                  message from one of our agents who landed a week ago in
                  Norway. His controllers have been unable to read it. Although
                  it clearly uses his backup cipher, the
                  Playfair, the
                  keys assigned to him do not work. We cannot reach him before
                  his normal scheduled transmission in two weeks, so we urgently
                  request that you attempt to decrypt this and let us know the
                  contents. In case it helps, he is carrying materials to assist
                  a previously dropped team in their work regarding the Norsk
                  Hydro facility at Rjukan. His recognition code should appear
                  in the message: It is "beware ice weasels." If he is operating
                  under duress, he should include the phrase "red penguin
                  frenzy." He will use "STOP" between sentences and "END" at the
                  end.
  
                    
Received message:
VYTES YEDLU TERVL FNVUH DWARD LCFFB SDEWN PXKIC 
FTREO LKALZ YLSLT OBKEV LYARM KRBOD NALDY PLAET 
OLQAD FHSFZ WNAID SMURU OLHRY LLOTW FYLDI CVLUS 
VSSFZ YLUNF FXLKT GBCDO BFALE WRPFY WLHUL DARLI 
TFLAB FFZCY FUUFB GXXXX 
  
                  Playfair instructions
  
                   
                  Cipher #2
                   
                  To: Col. Tiltman, Bletchley Park
  
                  This message was intercepted yesterday at a listening post
                  near Dover. Its frequency and indicators suggest similarities
                  to previously broken communications intended for saboteurs in
                  Britain. Earlier messages in this format have been in English
                  using the
                  Double Playfair
                  system. They used "STOP" between sentences and "MESSAGE ENDS"
                  at the end. Unfortunately, we can make no further guesses
                  about the content. The earlier messages have occasionally
                  re-used Playfair squares; keywords used recently include
                  DUNDEEMARMALADE, YORKMINSTER, BRIGHTONROCK, and BLARNEYSTONE.
                  Previous messages suggest they are planning a coordinated
                  sabotage effort later this year, so if you could crack this
                  within a fortnight we would be most grateful.
                  
  
                    
Received message:
TYINP KPQOT YENSO IYOBO YRAKK SLSPP ZCDOA YSLPO
MXMNP PNXPT YCITT YQYBO ZRBIG MPLSE ZKCTX RCRQG
LEIKC RDMPP RTBNX WYWQG MDAYT GFVMF XEYSL LQNII
GIWRQ IGFEV NGDNN IOBDT MDPTT YXNKB UXEMW PPKPW
ST 
  
                  Double Playfair instructions
  
                   
                  Cipher #3
                   
                  To: The Coders of Grendon
  
                  Ladies: 
  
                  We received the attached message yesterday from agent
                  Madeleine. As you know, her situation in Paris is precarious,
                  and she has had to carry her wireless set with her everywhere.
                  This message may have been sent in haste, as we have been
                  unable to decipher it. Based on her poem and schedule I
                  believe she should have used MAHATUNDILA and CULLATINDILA as
                  her
                  double transposition
                  keys, but these do not result in a correct decryption. Please
                  try the usual variations—keys in wrong order, columns
                  interchanged, one key left off, and so on—and let me
                  know as soon as possible if you find the solution. If we
                  cannot read it within a fortnight, we must ask for a
                  retransmission, which, of course, will increase her risk
                  substantially. No undecipherables!
  
                    
Received message:
TADTN TPLIE RCENI SIITD ONMUN MTNSO LDMMB ENROH
SETLV EACES BCSNT OVDAR YSIST ENNES SFAOE SFNAT
UWHSO FLSGR TLUDG ETONI CRGLD ELIIR AETTP DHUDD
IOPHW FISOT ISOIV EDSSN TWOAO RESSA RSHEU NATNS
GOSRP RDIFN ESEEO ADUPT IRRSE PPRHM EMHVU NOIRO
DSEFR MCIIE 
  
                  Double-transposition instructions
  
                   
                   
                   
                  Jim Gillogly designs and implements cryptographic software.
                    He recently made headlines for solving a cipher on a
                    sculpture at CIA Headquarters in Langley, Virginia, and he
                    also designed an attack on the Enigma cipher that can be
                    executed without knowing any plaintext. (Wartime cracks
                    required some knowledge of the text of one of the messages
                    in the day's key.) Gillogly earned a Ph.D. in computer
                    science from Carnegie-Mellon University, is a recent past
                    president of the American Cryptogram Association, and has
                    sung in Carnegie Hall with his chamber music group.
  
                  
                  
                   
                  Crack the Ciphers
                  |
                  Send a Coded Message
                  | A Simple Cipher 
                  Are Web Transactions Safe?
                  |
                  Mind of a Codebreaker
                  |
                  How the Enigma Works 
                  Resources |
                  Teacher's Guide
                  |
                  Transcript
                  | Site Map |
                  Decoding Nazi Secrets Home
                   
                
                
                 
                
                  Editor's Picks
                  |
                  Previous Sites
                  |
                  Join Us/E-mail
                  |
                  TV/Web Schedule 
                  About NOVA |
                  Teachers |
                  Site Map |
                  Shop |
                  Jobs |
                  Search |
                  To print 
                  PBS Online |
                  NOVA Online |
                  WGBH
  
                  ©
                  | Updated November 2000
               | 
             
           
         | 
        
           
            
           
         |