How Cryptograms Work

Zimmerman Telegram
The Zimmerman Telegram, which was sent from Germany in a numeric code, was decoded by the British and is partially responsible for the U.S. involvement in World War I. It's one of the world's most famous cryptograms.
Courtesy of the National Arichives

Have you ever sent a secret message -- perhaps to outsmart an opponent or simply to keep a surprise party under wraps? We all need to send the occasional clandestine communiqué, and a great way to do it is through cryptograms, a type of puzzle that uses letter or number substitutions to hide the meaning of a word or phrase. As long as only the author and intended recipients of the message are privy to the substitution code, its hidden meaning remains a mystery.

Throughout history, cryptograms have been used to protect some of the world's most tightly held secrets. One of the most famous cryptograms is the Zimmerman Telegram, which was sent during World War I by the German foreign minister, Arthur Zimmerman, to the German ambassador to Mexico, Heinrich von Eckhart [source: National Archives]. In it, Zimmerman uses a numeric code to offer Mexico significant portions of U.S. territory in exchange for Mexico's cooperation with Germany against the U.S. The Zimmerman telegram was quickly decoded by the British, and the U.S. entered the war on the side of the Allies just a few weeks later.

Advertisement

There are many different ways to code a message using a cryptogram. One rather simple example is called a substitution cipher, where the letter "A" is substituted for the letter "Z," the letter "B" is substituted for the letter 'Y," and so on through the alphabet [source: Puzzle Baron's Cryptograms]. Another is the Caesar cipher, in which each letter of the alphabet is shifted by a certain number of spaces. For example, using the Caesar cipher with a shift of one space, the word 'DOG' becomes "EPH"' [source: Trinity College].

Traditionally, cryptograms have been used by politicians, spies, lovers, and perhaps some clever teenagers who want to hide their covert conversations from parents' prying eyes. These days they are becoming increasingly common as brainteasers, with an array of Web sites and mobile applications devoted to the solving of cryptograms and cryptoquotes, which are simply cryptograms based on famous quotes [source: Donahue]. In the next section, we explore some of the basic strategies for solving cryptograms.

Advertisement

How to Solve Cryptograms

Solving a cryptogram takes patience, concentration and a bit of strategy. For the latter, you don't have to go it alone. There are as many different approaches to solving cryptograms as there are cryptograms themselves. Start by searching the text for patterns. Are there certain letters that occur more often than others? Identifying them is called frequency analysis, a good first step in solving cryptograms [source: Puzzle Baron's Cryptograms].

As a crypto-sleuth, ETAOIN is your best friend. This is a mnemonic representation of the most common English letters in order of their frequency in the language. This is important to keep in mind. If a letter in a cryptogram appears much more often than others, it's likely that it will decode to one of the letters in ETAOIN, with an even higher probability that it will decode to an "E" or "T."

Advertisement

When solving a cryptogram, focus on the short words first. The English language only has two one-letter words, "I" and "A," so look for single numbers that could be one or the other. Once in a while you may find a cryptogram with the archaic letter "O" (e.g., "O, say can you see…"), but it's rare. Apostrophes are also low-hanging fruit when it comes to solving cryptograms. There are a limited number of choices when it comes to letters that come before and after apostrophes (mainly contractions and possessives), so identifying them is usually easy [source: Puzzle Baron's Cryptograms].

Solving anything longer than three letters in a cryptogram becomes a bit harder. It helps to focus on digraphs, which is where two letters make one sound, such as "CH," "SH," and "TH." By identifying the letter "H" in a cryptogram, you can search for other places where it occurs at the end of a word, which is likely to be another digraph. Double consonants and double vowels also go a long way toward revealing a cryptogram's meaning.

It's important to keep in mind the theme of a cryptogram if one is given by its creator. This almost always gives a clue as to the content of the hidden phrase or quote. These strategies may be enough to crack many of the most common codes -- and perhaps even some of the more obscure ones. But remember that even the most skilled code-crackers spend a lot of time simply gazing at the puzzle and waiting for the hidden message to reveal itself.

Advertisement

Lots More Information

Related Articles

  • Archives.gov. "Teaching with Documents, the Zimmerman Telegraph" (Aug 23, 2011) http://www.archives.gov/education/lessons/zimmermann/
  • Boston.com. "Aha! At MIT Mystery Hunt, teams labor to solve elaborate puzzles." (Aug 23, 2011). http://articles.boston.com/2011-01-17/news/29342539_1_crossword-puzzles-aha-moment
  • Cryptograms.org. "Frequently Asked Questions." (Aug 19, 2011) http://www.cryptograms.org/faq.php
  • Cryptograms.org. "How to Solve a Cryptogram." (Aug 23, 2011) http://www.cryptograms.org/tutorial.php
  • Donahue, Kathleen, Owner, Labyrinth Games, personal communication (Aug 19, 2011)
  • NationalArchives.org.uk. "Babington Plot." (Aug 19, 2011) http://www.nationalarchives.gov.uk/spies/ciphers/mary/ma2.htm
  • National Security Administration "Friedman Legacy, Sources in Cryptographic History." (Aug 23, 2011) http://www.nsa.gov/about/_files/cryptologic_heritage/publications/prewii/friedman_legacy.pdf
  • Rosen, David, Avid Puzzler, personal communication (Aug 19, 2011)
  • Shugborough.org.uk. "Shugborough Myths and Mysteries." (Aug 19, 2011) http://www.shugborough.org.uk/holy-grail-78

Advertisement

Loading...