A variety of moderately difficult cryptograms,
 W I N I O N O W
More Cryptograms
The Contest Center
Wappingers Falls, NY 12590
 W I N I O N O W

 CRYPT90        Securely encrypt and decrypt short messages right on the Master Software website, instantly, and at no cost. GK-CRYPT        GK-Crypt is the strongest data security package available. It keeps your data secret and secure against any intrusion by using the latest ultra-strength 640-bit data encryption. MX-CRYPT        MX-Crypt is a fast, secure way of exchanging messages without transmitting or distributing any cryptographic keys.

In this cryptogram, called a Patristocrat, the punctuation and word divisions have been removed. The letters have arbitrarily been put into groups of 5.

 GAMVE MWFVJ UPRVJ SHMSL YMJVV JFVLS MHAJW VVMQV JQQMS QQJVL PBPBJ XWFPM VJXXL PJZER JXWGM VJXWX RWJVV OLFEO CHVRE MPMHV LX Contributed by Cryptopop
Solved by:   Jim Gillogly, Bill Mason, Mark Mammel, Amy Rinearson, Chris Norris

4×6 Polybius Rectangle (I=J and U=V)

 70 84 61 60 73 83 83 83 83 60 70 80 94 93 83 83 83 83 80 73 70 64 85 63 93 63 70 70 70 70 70 70 70 72 72 83 60 82 74 71 73 63 72 72 85 83 80 74 63 74 74 74 74 74 80 63 73 74 70 82 60 63 72 70 64 71 63 64 65 63 84 74 80 80 80 80 80 63 62 63 73 70 64 63 95 61 61 61 61 95 70 64 71 61 61 65 80 83 73 61 84 61 70 80 70 64 72 85 83 94 83 63 60 62 62 62 81 81 81 75 75 75 70 70 70 70 72 85 70 64 90 Contributed by Lee Morgenstern
Solved by:

The following cryptogram is slightly more complex than a conventional simple substitution, where one letter stands for another letter. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it. The word breaks and punctuation have been removed.

Solved by:   Lee Morgenstern

The following cryptogram is slightly more complex than a conventional simple substitution, where one letter stands for another letter. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it.
The word breaks and punctuation have been removed. The spaces between groups and the line breaks are significant.
It is within the range of any experienced amateur cryptographer, but it is not intended for the novice.

 ```-=-=-- --=-- ---=- =--=- =-=-- =-=== ===== --==- ==--- =-=-- ==--= ==-== ====-= --=-= ---=- ==--= -=--- =-=-- ==-== =---- --=== -=--= -=--- =--== ==-==- =-=== ===-= -=-== ===-= -==-- ---=- =-=-- ==-=- --=-- =-=-= -=-== --==== -==-= -=--= --=== -=--= --==- =-=-= -==-= ==--- =-==- ---=- ---=- -=-==- ==--- --=-= --==- =-=== --=== -=--= =---- --=== --==- =-=-= -=--= -----= =-==- ====- ==--= ---=- =-=-- ----- =-==- -=--= -=-== ===-= -=--- ====-= --=== -=-== ==-== =-=-= --==- ===-- =-==- ==--- ==-=- --=-= --==- -=-=== -=-== ==-== ====- =-=-- =-=-= --==- ---=- =-==- ----= =-==- ====- ----=- --=-= --=-= -=--= =-=== -==-- ==--= ==--- =-=-= -==-= --==- ==--- =--==- =-=-= ===-= -=--= --=== -=--- --=-= -==-= -=-== ==--- =-==- ==--= =--=-= ==-== -=--= ==-=- ==--= -=--- =-=-- --=-- ----= -=-== -=-=- ==--= ----=- =-==- ----= =-==- ====- ---=- --=-= --=-= ====- =-=-- ===-= ---=- =-=--= --=== -=--= ==-== ===-= -=--- ====- ==-== =-==- ==-=- --=== -=--- ``` (Your browser should show 13 lines of 61 characters each.)

Solved by:   Bill Mason

The following cryptogram is a complete columnar transposition, one of the standard types of elementary ciphers published in The Cryptogram. It is easily solved by paper and pencil methods.
If you are not familiar with this type,
In the cryptograms from this point forward the word breaks and punctuation are not shown. By convention, the letters have been grouped into fives. Neither the spaces nor the line breaks have any significance.

 EOWVE RNYHE OYEIN AONWS ITRLE BHEEL TCNHA RHIDE FSEAH OTULM ITNTA RIADE GETLA TRTII CIOAS TNAFP ITFNY URSAD DAIEE SGTDD OAALL CRHTS AOANS FLONS DUPPS SREOO LISIN IACST TMAAN EESNT DVMYN SEEEE
Solved by:   Troy Stiltner, Patrick Foster, Jim Gillogly, Bill Mason, Amy Rinearson

This is an incomplete columnar transposition, somewhat harder than the preceding, but it still can be solved by paper and pencil methods.
If you are not familiar with this type, CLICK HERE for the basics.

 RHTPC TTAEE ERFOI HNRIE TOBAQ ASIDA SAMDH RGLTA OEEEM REAAF RTTQO ACRDM OIPEI LUETA WHRNE QSSCA EOCDE MTUIE OAGSN TMNER QFYPA IYLSI IHGUU TANSR ETPRK IOSLC RENCN IUDNA RJOST WEAIS GKNHN NUEAT ABREO KITYA ROSSY COHMU DALUS UMAIM EN
Solved by:   Jim Gillogly, Bill Mason, Patrick Foster, Amy Rinearson

UNSOLVED! This cryptogram is still unsolved since 2004!

The following cryptogram was not done by any of the standard elementary methods. Determining the method is part of the challenge. You need to figure out what type of cryptogram this is, then solve it.
It is within the range of any experienced amateur cryptographer, but it is not intended for the novice.

 EPNFI EVMNU EJOUE YOEPH REWOE VRITA DTRSE BSNEG UTEWH OSTFI REXFT EJRCH ITEKT SSTOU REETA DTRSN EYIEB OSTIA HTICF STCTE ZOLAU EPADT HOEWT ASOEK ORUHH LOIAC TLOCT HTOSU RTS

In this unusual cryptogram the message has been encrypted by a 2-step process. Each group of 6 letters represents an arithmetic expression. Each of the digits 0 to 9 and the math signs + - × and ÷ have been replaced by letters. Each letter represents the same digit or sign throughout. When each of the 14 arithmetic expressions is evaluated left to right it will yield one letter of the 14-letter message according to the rule A=1, B=2, C=3, etc.
For example, if the 6-letter group TBNUGF happened to represent the expression 14-8×2 then it would evaluate to 12 and represent the letter L.

 JPTLKO LSOLKI UEYKOL OAEITB YEOUTI JEIKOA NPTUSL IEYTLN YELSOY UNTYEO OJELKU LYKISO AEOLTJ LPKIKN
Solved by:   Mike Juvrud, Richard Blumenstock, Jim Gillogly, Flavius Suciu, Bill Mason, Gerald Harrison

 If you enjoy simple cryptograms, write to the American Cryptogram Association at     Charles Schretzmann     56 Sanders Ranch Road     Moraga, CA 94556-2806 or visit their website. For serious cryptography, write to     Cryptologia     Dept. of Mathematics     United States Military Academy     West Point, NY 10996 or visit their website. Tell them you saw it on the Contest Center Cryptogram Challenge webpage.

Professional cryptologists and advanced students may benefit from the following papers on cryptology:
2.   MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
3.   DESIGNING A HIGH-SECURITY CIPHER
4.   A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS