This cache is NOT at the posted coordinates,
solve the puzzle below to find the corrected coordinates.
The Story
I know many people do not like puzzle caches, and to be honest with you, I didn’t enjoy them myself for the longest time and frequently avoided them. However, after attending my first Going Caching Mega Event many years ago and experiencing all of their amazing puzzles, I’ve kind of become addicted to them. So, I decided to create a puzzle cache series for people who typically avoid puzzle caches, provide lessons on the various types of cryptograms and solving tools/techniques, and ultimately lure geocachers into my obsession with puzzle caches. I hope you enjoy them and learn a few things along the way.
Cryptogram University Series (CUS) (pronounced “cuss,” as you do when trying to solve puzzles)
Cryptogram University will contain four levels of courses (caches) that will come out over time. Each level will contain a number of caches focused on different types of cryptograms and puzzle solving techniques. Below are the four CUS levels:
100-Series = Elementary Level
200-Series = Solving Techniques
300-Series = Intermediate Level
400-Series = Advanced Level
The container for all caches in this series are black bison tubes.
CUS 101: Cryptogram Basics
Cryptography: Cryptography is the practice of hiding or encrypting information so that it can only be read or understood by the intended recipient. Historically, cryptograms were primarily used by spies and militaries to prevent adversaries from knowing what they were saying or doing, but have also been used for concealing the location of hidden treasures, and are now used in daily life for everything from texting to banking. Cryptograms have evolved over many centuries to become more complex, secure, and “unbreakable,” especially when computers are used. Unfortunately, there is no universally accepted doctrine for cryptography. So, as you’ll see throughout your CUS curriculum that terms are frequently used interchangeably or even incorrectly. For example, Morse Code is actually not a “code,” but is in fact a “cipher.”
Ciphers: A cipher is a method of encoding or encrypting individual characters, usually through a mathematical algorithm, to hide the meaning of the message. The two major categories of ciphers are Substitution Ciphers and Transposition Ciphers, although both can be used together for more complex and secure cryptograms.
- Substitution Ciphers: A substitution cipher replaces characters in a message with other letters, numbers, or symbols. A couple examples of substitution ciphers are ROT-13 (the geocaching hint encryption cipher) and Morse Code.
- Transposition Ciphers: A transposition cipher scrambles the order of letters in a message, but doesn’t change the letters themselves. The simplest example of a transposition cipher is an anagram, but there are many techniques used.
Codes: A code is a system that replaces entire words or phrases with other words, letters, numbers, or even symbols based on a predefined system. A couple examples of codes are Book Codes like the one used on the back of the Declaration of Independence in the movie National Treasure or military/diplomatic codebooks used in wartime.
Steganography: Steganography is a subset of cryptography where information is hidden to avoid detection rather than encrypted like in ciphers or codes. Typically, the information is hidden within other seemingly innocuous content, sometimes even hidden in plain sight. Some examples of steganography include hiding information within other text, using invisible ink, hiding text in HTML coding, or using micro-dots.
Other Cryptography: In all actuality, cryptograms can be made up of just about anything. If you’ve ever tried the puzzles in FTF Magazine, then you know what I mean. Some of the things I’ve seen cryptograms made of include: order of Presidents, colors, car models, chemicals (the periodic table), sport uniform numbers or rankings, really numbers of anything, and even the Billboard rankings of music videos during certain years.
The CUS 101 Exam:
Hopefully you paid attention to the lesson, because you’ll need to answer the multiple-choice questions below to find the corrected coordinates.
A) Cryptography is ____________? the latest TikTok dance (4), hiding or encrypting information (5), unbreakable and you should quit now (6)
B) Military codebooks used during World War 2 are an example of what type of cryptogram? Enigma (6), GI Joe Cipher (8), a Code (7)
C) Ciphers are used to encrypt what? Individual characters (3), Entire words/phrases (2), Mama’s Secret Cookie Recipe (4)
D) Hiding text in HTML coding on a cache page would be an example of what type of cryptogram? an Evil one (3), Steganography (7), C++ (0)
E) What kind of cryptogram was used on the back of the Declaration of Independence in the movie National Treasure? Transposition cipher (5), Substitution cipher (9), Book Code (1)
F) An anagram that rearranges the letters in a word is an example of what kind of cryptogram? A Nickname for Anna’s Grandma (4), Transposition Cipher (3), Substitution Steganography Codex (1)
G) Invisible ink is an example of what kind of cryptography? Secret Squirrel Code (7), Cipher (5), Steganography (6)
H) What type of cipher is the geocaching hint encrypted using? Transposition Cipher (5), Book Code (6), ROT-13 Substitution Cipher (1)
I) What type of cryptogram is Morse Code? Cipher (7), Code (8), Nobody knows (4)
J) Are you enjoying the Cryptogram University Series so far? Yes (2), No (9)
Coordinates: North 36° AB.CDE West 76° FG.HIJ