Part I: Code and Cryptogram Strategies
22
We also include a very handy collection of hints in Chapter 14.
If you’re really stuck, look there before giving in to the allure
of the answers (Chapter 15).
This book is a bit unusual, too, because in Chapter 3 we pres-
ent you with three conspiracy stories, set in different times in
American history. These stories have been heavily censored
by the government — your task is to decipher the puzzles
in the book in order to gain access to these secret files. All
the puzzles are numbered carefully so you can easily see
which puzzle goes where.
If you prefer to do puzzles for fun without worrying about
solving the conspiracy stories, that’s perfectly fine too, of
course! We include a lot of cryptograms that aren’t related to
the Chapter 3 stories, and the story-related ciphers are enjoy-
able to crack even if you don’t solve the conspiracy.
Considering Cryptography Terms
Although they’re often used to mean the same thing, strictly
speaking a code is quite different from a cipher. Consider
these definitions:
✓ A code is a whole new language. Entire words are
encoded by a number, symbol, or another word. For
example, CONSPIRACY may be encoded as 32, u, or
falcon. A code book is required to crack a code, and it
basically functions as a dictionary of the code’s language.
Codes are very hard to crack, but the need for code books
is their weakness — if a code book falls into the wrong
hands, your code is useless and your plans are discovered!
✓ A cipher is a way of rearranging or replacing the letters
in a message. In substitution ciphers, each letter of the
alphabet (and sometimes the numbers and punctuation)
are replaced by another letter, number, or symbol. The
letter D may be enciphered as R, 9, or ✲, for example.
Ciphers can be easier to crack than a code, but they’re
also more secure. You can often memorize the key to
a cipher, so you don’t need written instructions. That
eliminates the major security failing of codes. Ciphers