A variety of moderately difficult cryptograms,
plus links to advanced papers
W I N
I   O
N O W
More Cryptograms
The Contest Center
59 DeGarmo Hills Road
Wappingers Falls, NY 12590
W I N
I   O
N O W


Return to main cryptogram page
CRYPT90
       Securely encrypt and decrypt short messages right on the Master Software website, instantly, and at no cost.
GK-CRYPT
       GK-Crypt is the strongest data security package available. It keeps your data secret and secure against any intrusion by using the latest ultra-strength 640-bit data encryption.
MX-CRYPT
       MX-Crypt is a fast, secure way of exchanging messages without transmitting or distributing any cryptographic keys.





       In this cryptogram, called a Patristocrat, the punctuation and word divisions have been removed. The letters have arbitrarily been put into groups of 5.


GAMVE MWFVJ UPRVJ SHMSL YMJVV JFVLS MHAJW VVMQV JQQMS QQJVL PBPBJ XWFPM VJXXL PJZER JXWGM VJXWX RWJVV OLFEO CHVRE MPMHV LX
Contributed by Cryptopop
Solved by:   Jim Gillogly, Bill Mason, Mark Mammel, Amy Rinearson




       The following cryptogram is slightly more complex than a conventional simple substitution, where one letter stands for another letter. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it. The word breaks and punctuation have been removed.


                               
                     
                   
               
     
                         
               
                       
                   
             
                   
             
                         
                 
           
                     
         
             
                   
             
Solved by:   Lee Morgenstern


       The following cryptogram is slightly more complex than a conventional simple substitution, where one letter stands for another letter. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it.
       The word breaks and punctuation have been removed. The spaces between groups and the line breaks are significant.
       It is within the range of any experienced amateur cryptographer, but it is not intended for the novice.


-=-=-- --=-- ---=- =--=- =-=-- =-=== ===== --==- ==--- =-=-- ==--= ==-==
====-= --=-= ---=- ==--= -=--- =-=-- ==-== =---- --=== -=--= -=--- =--==
==-==- =-=== ===-= -=-== ===-= -==-- ---=- =-=-- ==-=- --=-- =-=-= -=-==
--==== -==-= -=--= --=== -=--= --==- =-=-= -==-= ==--- =-==- ---=- ---=-
-=-==- ==--- --=-= --==- =-=== --=== -=--= =---- --=== --==- =-=-= -=--=
-----= =-==- ====- ==--= ---=- =-=-- ----- =-==- -=--= -=-== ===-= -=---
====-= --=== -=-== ==-== =-=-= --==- ===-- =-==- ==--- ==-=- --=-= --==-
-=-=== -=-== ==-== ====- =-=-- =-=-= --==- ---=- =-==- ----= =-==- ====-
----=- --=-= --=-= -=--= =-=== -==-- ==--= ==--- =-=-= -==-= --==- ==---
=--==- =-=-= ===-= -=--= --=== -=--- --=-= -==-= -=-== ==--- =-==- ==--=
=--=-= ==-== -=--= ==-=- ==--= -=--- =-=-- --=-- ----= -=-== -=-=- ==--=
----=- =-==- ----= =-==- ====- ---=- --=-= --=-= ====- =-=-- ===-= ---=-
=-=--= --=== -=--= ==-== ===-= -=--- ====- ==-== =-==- ==-=- --=== -=---
(Your browser should show 13 lines of 61 characters each.)

Solved by:   Bill Mason





       The following cryptogram is a complete columnar transposition, one of the standard types of elementary ciphers published in The Cryptogram. It is easily solved by paper and pencil methods.
       If you are not familiar with this type,
CLICK HERE for the basics.
       In the cryptograms from this point forward the word breaks and punctuation are not shown. By convention, the letters have been grouped into fives. Neither the spaces nor the line breaks have any significance.


EOWVE RNYHE OYEIN AONWS ITRLE BHEEL TCNHA RHIDE FSEAH OTULM
ITNTA RIADE GETLA TRTII CIOAS TNAFP ITFNY URSAD DAIEE SGTDD
OAALL CRHTS AOANS FLONS DUPPS SREOO LISIN IACST TMAAN EESNT
DVMYN SEEEE
Solved by:   Troy Stiltner, Patrick Foster, Jim Gillogly, Bill Mason, Amy Rinearson





       This is an incomplete columnar transposition, somewhat harder than the preceding, but it still can be solved by paper and pencil methods.
       If you are not familiar with this type, CLICK HERE for the basics.


RHTPC TTAEE ERFOI HNRIE TOBAQ ASIDA SAMDH RGLTA OEEEM REAAF
RTTQO ACRDM OIPEI LUETA WHRNE QSSCA EOCDE MTUIE OAGSN TMNER
QFYPA IYLSI IHGUU TANSR ETPRK IOSLC RENCN IUDNA RJOST WEAIS
GKNHN NUEAT ABREO KITYA ROSSY COHMU DALUS UMAIM EN
Solved by:   Jim Gillogly, Bill Mason, Patrick Foster, Amy Rinearson





UNSOLVED! This cryptogram is still unsolved since 2004!

       The following cryptogram was not done by any of the standard elementary methods. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it.
       It is within the range of any experienced amateur cryptographer, but it is not intended for the novice.


EPNFI EVMNU EJOUE YOEPH REWOE VRITA DTRSE BSNEG
UTEWH OSTFI REXFT EJRCH ITEKT SSTOU REETA DTRSN
EYIEB OSTIA HTICF STCTE ZOLAU EPADT HOEWT ASOEK
ORUHH LOIAC TLOCT HTOSU RTS





       In this unusual cryptogram the message has been encrypted by a 2-step process. Each group of 6 letters represents an arithmetic expression. Each of the digits 0 to 9 and the math signs + - × and ÷ have been replaced by letters. Each letter represents the same digit or sign throughout. When each of the 14 arithmetic expressions is evaluated left to right it will yield one letter of the 14-letter message according to the rule A=1, B=2, C=3, etc.
       For example, if the 6-letter group TBNUGF happened to represent the expression 14-8×2 then it would evaluate to 12 and represent the letter L.


JPTLKO LSOLKI UEYKOL OAEITB YEOUTI JEIKOA NPTUSL IEYTLN YELSOY UNTYEO OJELKU LYKISO AEOLTJ LPKIKN
Solved by:   Mike Juvrud, Richard Blumenstock, Jim Gillogly, Flavius Suciu, Bill Mason, Gerald Harrison




If you enjoy simple cryptograms, write to
the American Cryptogram Association at

    Charles Schretzmann
    56 Sanders Ranch Road
    Moraga, CA 94556-2806
or visit their website.

For serious cryptography, write to
    Cryptologia
    Dept. of Mathematics
    United States Military Academy
    West Point, NY 10996
or visit their website.
Tell them you saw it on the Contest Center
Cryptogram Challenge webpage.
Return to main cryptogram page



Professional cryptologists and advanced students may benefit from the following papers on cryptology:
1.   THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
2.   MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
3.   DESIGNING A HIGH-SECURITY CIPHER
4.   A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
5.   ONE-TIME PAD CRYPTOGRAPHY


RANDOM NUMBERS Get bulk quantities of random numbers for statistical sampling or for cryptographic keys.

Send email Send us an email to submit your answers, to ask for help, or to submit new cryptograms.
Be sure to change the $ to an @ in our email address.


Quick Links
Interactive Online Games
<<< PREV HOME MAP NEXT >>>


© Copyright 1999-2016 The Contest Center