1: The Substitution
cipher
Substitution methods use a technique
that replaces the original letters with different letters or
symbols. The easiest way to solve a substitution key is to
look for sequences in the encrypted text.
A one letter word is almost always an 'a' so in the text below
'x' is alone a number of times, so it is probably an 'a'.
The most repeated letters are usually e, s, a, t, r. In the below
text you will notice the most frequent letters are x, b, p and
q.
If there is a 3 letter word that comes up regularly it is probably
'and' or 'the'. Once you have a few letters solved it is usually
quite easy to solve the rest.
By far the easiest way to decode a puzzle like this is to use a
SCB solver (click to download
one). Which is a computer program that generates keys until it
has solved the puzzle for you.
1.1 Solve the following puzzle for your
first clue:
qefp qvmb lc bkzovmqflk fp zxiiba x zbxpxo bxze ibqqbo lc qeb
ximexybq fp grpq clotxoaba yv qeobb bd x bnrxip a qefp fp lkb lc
qeb bxoifbo clojp lc bkzovmqflk xka fp rprxiiv nrfqb bxpv ql plisb
qeb zxzeb zxk yb clrka kbxo qeb orfjpfd xqeibqfzp pqxafrj vlr tfii
yb xyib ql aofsb nrfqb zilpb ql qeb zxzeb
2: The Transposition
cipher
A transposition cipher keeps the original
letters of the message but rearranges them.
One example of a transposition cipher is the Rail Fence
method.
The easiest way to decrypt a rail fence cipher is to run all the
letters into one long string.
Next divide that string into equal groups of characters e.g. if
there are 36 letters divide it into 3 groups of 12.
Write the 1st letter from group 1, group 2, group 3, etc followed
by the 2nd letter from each of the groups continue until all the
letters are used.
Example:
TIWEE INNPN HSTCA LCCTA IHOORF ERIBS ODDAE EYOC
Step 1: TIWEEINNPNHSTCALCCTAIHOORFERIBSODDAEEYOC
Step 2: There are 40 characters so lets do 4 groups of
10
TIWEEINNPN
HSTCALCCTA
IHOORFERIB
SODDAEEYOC
Step 3: THISISHOWTODECODEARAILFENCEENCRYPTIONABC
(The 'ABC' at the end is just to make up the missing letters)
2.1 Solve the following puzzle for your next
clue:
TAI DIADJC RYCHC SDNNE EOEA KE HHEAMOC VDRR
CEIN MAB TEB OF
If the message is still just a jumble of letters, then you have
an incorrect number of groups
3: Using a decoding tool
Sometimes to decode a message you will need a tool to decode it.
This can be the most difficult type to decrypt as you will need the
tool to decode the message, but once you have the tool & know
what to de with it, it becomes the easiest & fastest technique
of decrypting.
The following puzzles make use of tools that you would use
everyday and would be accessible if you are reading this page.
3.1 Solve the following puzzle for your next clue:
D3 C10 C8 C6 D7 F3 C6 C3 C10 F3 D3 C9 E3
F3 D3 C11 D2 E4 C4 F3 E2 C4 C5 C10 F3 D5
C10 C8 C5 F3 C11 C10 C9 E7 C6 F3 C6 C3 C10
F3 E7 C9 E7 C4 F3 D3 C4 E5 C4 E7
(This can also be solved by using the substitution method)
3.2 Solve the following puzzle for your final
clue:
3278089607383603483089607646808473309376093760
Well that's the end of the lesson, now go out there & find
the cache.
FTF Goes to RiverGod!