http://www.history.navy.mil/faqs/faq61-4.htm
Related: Ciphers & Puzzles • Enigma TuringSharky's Vigenere Cipher This page is for amusement only. Instructions are given below this form. instructions: Enter the string to encrypt or decrypt in the Input field (you may copy and paste it from another text editor). Enter the key in the Key field. (You may use any sequence of characters, but only alphabetic characters will actually be processed. GC1M2NP A Lesson in Ciphers # 1 (Unknown Cache) in Missouri, United States created by TripCyclone This cache series is designed to give you an introduction to the world of ciphers. It will not cover every type of cipher out there, instead focusing on a small variety of different ciphers. Hopefully, you will walk away from solving this series with a new set of puzzle solving skills. MP3Stego When looking at the steganographic tools available on the Net, it occurred to me that nothing had been done to hide information in MP3 files, that is sound tracks compressed using the MPEG Audio Layer III format. There is a growing interest world-wide in MP3 or indeed WMA files because they offer near-CD quality at compression ratio of 11 to 1 (128 kilobits per second). This gives a very good opportunity for information hiding. Although WMA has better quality in general, I did not have access to code and only an implementation for MP3 is provided as a proof of concept. MP3Stego will hide information in MP3 files during the compression process.
Cryptography When I wrote my first book, Fermat’s Last Theorem, I made a passing reference to the mathematics of cryptography. Although I did not know it at the time, this was the start of a major interest in the history and science of codes and code breaking, which has resulted in a 400-page book on the subject, an adaptation of the book for teenagers, a 5-part TV series, numerous talks and lectures, the purchase of an Enigma cipher machine and the development of an interactive crypto CD-ROM. In the Crypto Corner, you will find details about my book on cryptography (The Code Book), information about my TV series based on the book (The Science of Secrecy) and you can explore the Black Chamber, which is an interactive encryption and codebreaking section. You will also find a section about the Cipher Challenge, there are some cryptograms (coded messages) for you to try and crack, a free downloadable CD-ROM version of The Code Book, and a quick Q&A based on the questions I am most often asked.
Home - www.simplesite.com/the_runes “For me the magic moment came on page 2 where the green picture could mean any of three things. I identified the picture almost at once but could not see in which of the three directions it might go. And I knew that I had to find out!” “This should come with a warning label on it. ...It's highly additive. Carvings riddle stumps villagers Puzzled residents across Yorkshire are turning detective after mysterious stone heads were left outside their properties in the dead of night. The sculptures feature the same carved symbol and come with a riddle attached. Despite CCTV film showing a man leaving three heads outside a post office, their origin remains unknown. So far, 12 have appeared in Goathland and Kilburn, North Yorkshire; four in Arthington, West Yorkshire and three in Braithwell in South Yorkshire.
Trip's GeoAdventures If there was ever a cache that everyone should try once, pict-o-caches would likely be near the top of the list. They take aspects of several different types of caches and join them together to make a cache that everyone can participate in and enjoy. But how do they work? First, we need to establish what they are… Pict-o-caches are a class on their own. Taking cues from multi-caches, on-site puzzles, and visual puzzles, these puzzles definitely require an observant eye. Cipher Codes generally substitute different length strings of characters in the output, whilst ciphers generally substitute the same number of characters as are input. There are exceptions and some cipher systems may use slightly more, or fewer, characters when output versus the number that were input. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates".
Help - Custom Services Any public service is eligible to be placed in our directory for all to use. Since approval can take up to a month, and some services are not for public consumption (e.g., on a private intranet, or invitation-only), you may also add any service to your own menu at run-time. Optional Arguments
How to Build a Maze It's easier than you think. Our objective here is to create a perfect maze, the simplest type of maze for a computer to generate and solve. A perfect maze is defined as a maze which has one and only one path from any point in the maze to any other point. This means that the maze has no inaccessible sections, no circular paths, no open areas.