Can You Solve 15 of History’s Toughest Ciphers and Codes? (2024)

The mysterious Phaistos Disc discovered by archeologist Luigi Pernier dates back to around 1700-1600 BC and is one of the most controversial inscriptions in the world of codes and ciphers. Could it really have been cracked by archeologist Gareth Owens in 2022 or is that wishful thinking? Even Owens says he’s only 99 percent there.

Can You Solve 15 of History’s Toughest Ciphers and Codes? (1)

Are you up for a challenge?

We've rounded up 15 of the most intriguing and enigmatic codes and ciphers from around the world. Some have already been cracked, while others still baffle the brightest minds. Come along as we explore this captivating collection and see if you have what it takes to crack them.

15. The Rosetta Stone

Egypt’s unsolved mysteries and hieroglyphics are another rich area of study as is the Rosetta Stone, an arresting black stone carved with ancient texts - two Egyptian texts and a Greek one - the key to deciphering Egyptian hieroglyphs. The writing is a decree about the king (Ptolemy V, r. 204–181 BC) copied onto large stone slabs and put into every temple in Egypt. The Rosetta Stone was found broken and incomplete. It features 14 lines of hieroglyphic script.

Hint: The text says that the priests of a temple in Memphis, Egypt supported the king. Before you jump straight to the translation, find out more about this historical gem which is housed in the British Museum.

Solution: You can read what the Museum describes as the ‘full translation’ here.

14. Edgar Allan Poe’s Challenge

Edgar Allan Poe loved puzzles - The Gold Bug was even based on a cipher mystery - and in 1840, Poe offered a free subscription to Graham’s Magazine to readers who could outwit him. After six months, Poe claimed to have solved 100 ciphers but published two additional ones, allegedly submitted by a “Mr. W. B. Tyler” (possibly a pseudonym) to end the contest. The first was solved by Terence Whelan, author of Edgar Allen Poe and the Masses while he was a student trying to avoid working on his dissertation. Can you solve the puzzle above? Poe's second cipher - which contains about 150 words and little character repetition - remained unsolved until 2000.

13. The Zimmermann Telegram

The Zimmermann Telegram was a secret diplomatic communication issued in WWI from the German Foreign Office in January 1917 that proposed Germany and Mexico form a military alliance if the US entered the war. Germany offered to help Mexico recover Texas, Arizona, and New Mexico in exchange for Mexico’s support. The telegram was intercepted by British intelligence, however, which deciphered the code and passed the intel to the Americans. It marked one of the earliest occasions on which a piece of signal intelligence influenced world events.

Hint: To understand the background surrounding The Zimmermann Telegram, listen to our SPYSCAPE podcast True Spies.

Solution: Click here for the decode worksheet for The Zimmermann Telegram and background information.



12. Conan Doyle, Sherlock Holmes & the Dancing Men Cipher

Given Sherlock Holmes’ love of encrypted personal messages buried in The Times’ ‘agony column’, it was perhaps inevitable that Sir Arthur Conan Doyle would invent his own secret alphabet in The Adventure of the Dancing Men. Can you solve Conan Doyle’s substitution cipher?

Hint: Look for single-letter words and count the number of times each symbol appears. Also, keep an eye out for apostrophes or repeated letter patterns.

Solution: You will find more of Conan Doyle’s cipher and its solution in The Return of Sherlock Holmes, The Adventure of the Dancing Men.

11. China's Yuan Dynasty Coin Inscriptions

Chinese numismatists are baffled by six centuries-old Indian coins discovered in Hunan province in the 1960s - so much so, they offered a $1,500 reward to anyone who can decipher the inscriptions and shed light on the etchings. The coins were found inside a small, glazed pot which arrived at Jinshi City's museum in the 1980s. The front of the coins are believed to bear the name of a king, written in a rare form of Arabic, but archeologists are puzzled about the etchings on the back of the coins.

Hint:

The coins were manufactured in the Delhi Sultanate, the main Muslim sultanate in northern India, around the late 13th century during China's Yuan dynasty.

Solution: You’ll need to discover the solution to claim the prize money.

10. Australia’s Somerton Man

Australia is so obsessed with Somerton Man the authorities exhumed his body in 2021. The well-dressed man was found on an Adelaide beach, slumped against a seawall in 1948. He carried no ID. His clothing labels were removed. His pocket held a ripped piece of paper - torn from a poetry book, the Rubaiyat of Omar Khayyam - with the Persian words Tamam Shud, which means ‘it is finished’. The book itself revealed another clue: a handwritten message or code that has never been deciphered. The coroner suspected Somerton Man was poisoned but couldn’t be certain. Australia hopes DNA tests will finally reveal his identity and cause of death but what about the code?

Hints:
There are no hints, just a few curious coincidences. The code was written in the Rubaiyat of Omar Khayyam, a poetry book that was not found at the crime scene. John Freeman, a chemist, later handed the book over to the police. Its pages also revealed a phone number for Jessie Thomson, a nurse who claimed she did not know Somerton Man.

Solution: Unsolved.

9. The MIT Cryptographic ‘Time-Lock’ Puzzle - LCS35

Ron Rivest, co-inventor of the RSA algorithm - an asymmetric cryptography algorithm for encrypting online communications - devised a ‘time-lock’ puzzle in 1999. Rivest estimated it would take 35 years to solve but Bernard Fabrot, a self-taught Belgian programmer, came up with the solution 15 years early. Rivest's problem is this: compute 2^(2^t) (mod n) for specified values of t and n.

Hint: The puzzle is an example of a verifiable delay function, which means the answer can only be solved after a certain number of steps. It uses the ideas described in the paper Time-lock puzzles and timed-release Crypto.

Solution: You will find a description of the solution here.

8. Dorabella Cipher

Edward Elgar, the composer of the Enigma Variations, wrote coded notes to Dora Penny in the late 1800s. She was the daughter of a British vicar and 17 years his junior. If the correspondence was an expression of love, however, his deepest desires were lost on Dora. She never did decipher the contents. Mark Pitt, a member of Cleveland Police's specialist operations unit, later claimed he cracked the code using a revolving cipher and a musical cipher but hasn’t revealed the answer.

Hint: The cipher appears to be made up of 24 symbols, each symbol consisting of 1, 2, or 3 approximate semicircles oriented in one of eight directions.

Solution: Pitt believes the cipher is a romantic note and he is writing a book on the topic.

7. The Voynich Manuscript

Cryptographers still haven’t been able to crack the Voynich code, leading some to believe it may be a hoax. Yale University Press released the first authorized copy of the mysterious, centuries-old puzzle in 2015. The original, illustrated manuscript, believed to date back to the 14th century, is handwritten in a script unrelated to European languages. The alphabet has up to 28 characters, used without punctuation throughout the text.

Hint:
There is strong evidence that many of the book's bifolios were reordered at various points in its history.

Solution:
Unsolved.

Can You Solve 15 of History’s Toughest Ciphers and Codes? (12)

6. The Vigenère Cipher

You may have already heard about the Vigenère Cipher, a method of encrypting alphabetic text that uses a simple form of polyalphabetic substitution. It was so effective it took more than 300 years before British mathematician and computer pioneer Charles Babbage finally cracked it in 1854 (a feat worthy of a Guinness Record for longest time to crack a code. Here's a simple cipher to get your started:

KEWKEAEI ZPQ KGT ILAH AARHTV LTQL HOG FMSBAPG RSVT ZJGAZIJH. GX AOJ'ZW HMDXES XZXQ, OGLA HGCC!


Hint: The key is SPYSCAPE. And if the old-school methods aren't working, you can find an online method to help code or decode.

Solution:
See the bottom of this page.

5. AES

One of the hardest codes to crack is arguably the US government’s Advanced Encryption Standard (aka Rijndael or AES) which the Americans use to protect top-secret information. AES is considered unbreakable by even the most sophisticated hackers. It is a symmetric block cipher and it is also used by online services like banking and online shopping.

Hint: AES includes three block ciphers and each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128, 192 and 256 bits. So, AES-128 uses a 128-bit key length to encrypt and decrypt a block of messages; AES-192 uses a 192-bit key length to encrypt and decrypt a block of messages, and; AES-256 uses a 256-bit key length to encrypt and decrypt a block of messages.

Solution: Unsolved. And if you do solve it, expect a knock on the door.

4. Three Enigma messages

Believe it or not, it appears that up until 2006 there were three Enigma messages leftover from 1942 that had still not been decrypted. Are you up for the challenge?

Hint: The Enigma @ Home project set out to solve the three messages using spare CPU cycles on members’ computers.

Solution: Click here for the solution.

Can You Solve 15 of History’s Toughest Ciphers and Codes? (2024)

FAQs

What is the most unbreakable code? ›

The only theoretically unbreakable encryption is one time pad. However, it's absolutely impractical due to the fact that you must exchange information securely in advance, keep it stored securely and you also need a truly random number generator. Except maybe for some military uses, one-time pad has no practical value.

What ciphers have not been solved? ›

Several well-known unsolved ciphers such as the Voynich Manuscript, Beale ciphers, Dorabella cipher, etc. have been attracting attention of the worldwide cryptologic community (see, e.g., Elonka's List of Famous Unsolved Codes and Ciphers) but historical archives (and other publications) contain many other pieces ...

What is the hardest cipher to crack? ›

The Vigenère cipher is a method of encrypting messages by using a series of different Caesar ciphers based on the letters of a particular keyword. The Vigenère cipher is more powerful than a single Caesar cipher and is much harder to crack.

What is the strongest cipher in the world? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What is the most famous cipher? ›

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques.

Can you decrypt a cipher? ›

The decryption of a ciphertext is carried out by inputting the encryption key that was used to encrypt it in the first place. Once the correct key is applied, the plaintext is revealed. Decryption is a one-time process.

What is the only unbreakable cipher when it is used properly? ›

There is only one known unbreakable cryptographic system, the one-time pad, which is not generally possible to use because of the difficulties involved in exchanging one-time pads without their being compromised. So any encryption algorithm can be compared to the perfect algorithm, the one-time pad.

What is the easiest cipher to learn? ›

Caesar ciphers are especially popular for children because they're easy to understand. Plus, they're a great way to practice the alphabet. All you have to do is rotate the alphabet by a number of your choice so each letter can be translated to a different one.

What is the hardest code ever written? ›

Often dubbed as the "hardest code to master," Malbolge pushes the boundaries of comprehension, leading many to ponder its purpose and viability. In this article, we embark on a journey to demystify Malbolge and explore its intricate nature.

Which cipher is unbreakable? ›

The one known unbreakable cipher: A One Time Pad (OTP) is provably unbreakable as a mathematical abstract. But the vulnerability it has in common with all cryptographic systems is that it must be implemented in computer code, and the number of ways to exploit vulnerabilities in codes are many.

What is the oldest cipher? ›

World's Oldest True Cipher Device, the “Jefferson Cipher,” on Display at the National Cryptologic Museum > National Security Agency/Central Security Service > Article. This “Jefferson Cipher” is thought to be the oldest true cipher device in the world.

What is the hardest code to do? ›

One such code that has gained notoriety for its mind-boggling complexity is Malbolge. Often dubbed as the "hardest code to master," Malbolge pushes the boundaries of comprehension, leading many to ponder its purpose and viability.

What is the most easiest cipher? ›

The Caesar cipher is a shift cipher, one of the simplest forms of encryption in which each letter of the message is replaced by a letter a certain number of positions down in the alphabet.

Which cipher is hardest to break using frequency analysis? ›

Which of the following is hardest to break using frequency analysis? Explanation: Out of the given options hill cipher is the hardest cipher to break using frequency analysis. Although it is quite vulnerable to other forms of attack.

Top Articles
Julie (Wastelanders)
Discover the benefits of investing in high-quality and timeless furniture pieces for your home!
Public Opinion Obituaries Chambersburg Pa
Stadium Seats Near Me
Don Wallence Auto Sales Vehicles
Roblox Developers’ Journal
How do you mix essential oils with carrier oils?
Doby's Funeral Home Obituaries
You can put a price tag on the value of a personal finance education: $100,000
Phillies Espn Schedule
2021 Lexus IS for sale - Richardson, TX - craigslist
Oc Craiglsit
Hca Florida Middleburg Emergency Reviews
Aldi Sign In Careers
Dr Adj Redist Cadv Prin Amex Charge
Vandymania Com Forums
Jang Urdu Today
Google Doodle Baseball 76
Ratchet & Clank Future: Tools of Destruction
Leccion 4 Lesson Test
라이키 유출
Scout Shop Massapequa
Catherine Christiane Cruz
Reptile Expo Fayetteville Nc
Raz-Plus Literacy Essentials for PreK-6
Bjerrum difference plots - Big Chemical Encyclopedia
[PDF] NAVY RESERVE PERSONNEL MANUAL - Free Download PDF
Craigslist Battle Ground Washington
Sand Dollar Restaurant Anna Maria Island
Webworx Call Management
Revelry Room Seattle
Abga Gestation Calculator
Ofw Pinoy Channel Su
Dreamcargiveaways
Metra Union Pacific West Schedule
Mgm Virtual Roster Login
SF bay area cars & trucks "chevrolet 50" - craigslist
The Thing About ‘Dateline’
Mars Petcare 2037 American Italian Way Columbia Sc
Indiana Jones 5 Showtimes Near Cinemark Stroud Mall And Xd
Metro Pcs Forest City Iowa
Obituaries in Hagerstown, MD | The Herald-Mail
Cnp Tx Venmo
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
No Boundaries Pants For Men
Nina Flowers
Breaking down the Stafford trade
Mcoc Black Panther
Ronnie Mcnu*t Uncensored
Myapps Tesla Ultipro Sign In
Gummy Bear Hoco Proposal
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated:

Views: 5549

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.