Posted on 02/16/2020 4:19:30 AM PST by nikos1121
Todays CG is from The Arkansas Gazette. Anything under 4 minutes is a good score.
AZPMMPQ WTP NERMP UER KWD ZWSCE WN NEPLMPZGPM, HRT NEPI MEWZZ DPGPT KPWMP NR AP WLSMPQ. MRSTKP SDJDRUD
You can find this little fun word game, to combat early dementia and senility in us baby boomers, in several daily publications.
The way it works is a letter stands for another letter. For example: AXYDLBAAXR is LONGFELLOW (does not apply to today's cryptogram).
Beware, the game is very addictive. If this is your first time, don't be intimidated.
PLEASE DO NOT post the answer in general comments, but DO post your time and any tips you might give the group on how you solve these puzzles as puzzle solvers love to hear how you made out.
You can certainly send your solution to my private reply, or if you need a hint for todays Cryptogram.
If you need a little help you can copy the cryptogram and paste it to Hals Helper below:
You can then work on the puzzle without using pen and paper.
Solution to our last puzzle:
SO, YOU WANT TO MEET THE LOVE OF YOUR LIFE? LOOK IN THE MIRROR.---BYRON KATIE
I recognized DGPGT and from there it was easy!
I know. I thought of you. That word and success are your favorites.
Of course, youre well acquainted with the author.
Straight from the book of Matthew
Yes, that pattern was the big clue
Same here, but I think you meant DPGPT. There are many, many other words with that pattern, (at least 185, including proper names) but there is one that is much more common. Once you try it, the puzzle is automatic.
Another from that prolific author.
Four minutes. As far as the phrase, fortunately I have a lot of material to work with.
Author’s name makes this one extra ez.
One personal pronoun and two or three conjuctions which might go after the comma. One of them works.
Common letter and short words made this one rather easy.
As the result of on a discussion on this thread last weekend I found a very interesting book on cryptography, link below. I think all the participants here would enjoy it. I borrowed a copy from Minuteman Library systems, which includes about 100 libraries in eastern Massachusetts. There were only two copies, one in Brookline, one at Dean College. The copy I got, which came from the Dean College Library, looked like it had barely, or even never, been opened. I picked it up Friday.
The treatment is slightly mathematical, but not particularly dense.
Chapter 2 covers Monoalphetic Substitution Ciphers (MASC), of which cryptoquotes are an example. Cryptoquotes simplify things by providing punctuation and spaces. He includes a simple test for vowels, that is probably not useful for solving these puzzles, but is of some interest, and easy to implement on a computer. It consists of identifying the number of different letters any letter in the ciphertext is next to. The letters with the highest number of associations are probably vowels. Combinations in plaintext like BZ and XK are rare, but vowels pair with anyting.
Chapter 3 explores polyalphabetic subsititution ciphers, including the Vigenère cipher, and running key ciphers. Running key ciphers use a key length as long as the message. Cryptoquotes and other MASC, for example, have a key length of one. A Vigenère cipher increases the key length, but has the weakness that every substitution alphabet is a Caesar code. One popular form of running key is using a book as the key. He shows simply and clearly why this is actually a very poor form of key. After only eight characters, the probability of decryption by brute force is almost 100%.
Another form of running key cipher that is indecipherable without the key is the one time pad, using a random key. (Assuming the key is truly random. German diplomatic - not enigma - ciphers in use during World War II used a defective random key generator that the U.S. Army was able to defeat.) In this chapter he also shows why reusing a one time pad was not more secure than using a book as a key. If two messages are encrypted using the same key, the cryptologists, knowing this, can readily reduce the problem to the a running key using a book (text in the same language as the message.)
A note about VENONA decrypts. Though they often reused the same key, the messages themselves were coded, and then superenciphered using as “sometime” pad (as opposed to a one time pad). A coded message is “translated” into code, where the code words are arbitrary and may not even be real words. In order to decrypt the VENONA traffic the cryptologist needed to recreate the code books by inference from context, a truly daunting task.
Chapter 4 is on transposition ciphers.
I’m on Chapter 5, which covers historical topics.
Chapter 20 discusses quantum computing related to cryptography, and I look forward to reading it.
Anyway, that’s the reading assignment for this week.
Famous author.
We keep going back to looking in the mirror???
I immediately recognized the author and couldn’t get the letters out fast enough.
2:40. Little words. Thanks Nikos.
Thanks for the pointer. Found the ebook on usenet.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.