Dennis Shasha/Codes, Puzzles, and Conspiracy/1/Coded Letter
Code
- My dear Evangeline and Scarlet,
- Fazr wxxkiqxn xa qocu zq if xrwoh mwek dkkb johotkbx,
- xmaztm wccarjobt xa if cwqxar, hwztmwdhf obcaiqkxkbx. Qhkwnk
- jab'x xwuk appkbnk, par mk on wb obxahkrwdhk nbad.
- Dkcwznk mk on znobt ik xa nahek iwbf koppoczhk qzyyhkn w
- jwf, mk toekn ik qroewcf wbj xoik xa xmobu. Xmk rknxhx on
- xmwx O cwb lroxk xa faz wx if hkonzrk. O mwek if jazdxn xmwx
- xmon hkxxkr lokh rkwcm faz, dzx O mwek w qhwb xa hkwek ox
- ob w trackr'n nxacu raai.
- Am, fkn, if cwqxar on Dkbgwiob Dwnukrmazbj, xmk iwxm
- qrajotf lma dkcwik w qmohanaqmf qrapknnar wx Qrobckxab, bal
- xzrbkj uojbwqqkr. Mk iwf kbxkr axmkr cwrkkrn ekrf naab. Loxm
- zmk habt-lobjkj obxrajzcxoab azx ap xmk lwf, faz lohh pobj ox kwnf
- xa jkcajk xmk rknx ob nqoxk ap xmk pwcx xmwx smk cajk on
- raxwxobt df abk hkxxkr rotmx bal.
- Exovlsnback xck npo oyxqq xsl dbcypcaxiig bc ynl jbfl. Nl
- dbcysbio npo xqqxpso eg dliiaixs ylilrnbcl, aopcu rspfxyl oxyliipyl
- dnxcclio. Nl qpcko slxkg mlidbjlo pc ixcko mnbol rlbril xkjpsl slelio.
- Ml xsl cbm pc Asauaxg, x ixck qpiilk mpyn lwpilk Exotalo mnb nxk
- qbauny xuxpcoy Qsxcdb pc Orxpc. Elqbsl ynpo, ml mlsl pc Nbrp
- dbacysg mnlsl ynl ysxkpypbcxi oaorpdpbc ybmxsko bayopklso mxo
- kporliilk mnlc Exovlsnback (xck P) nlirlk yb ibdxyl x upcxy xtapqls.
- Ynl dbkd po sbyxypcu xuxpc. Nm pzyh qd y sjyem rcty lyh, y
- nmmw, y kcdzo. Zomd nm ytm crr, bpbyjjh qd Fypwmtocbdl'p
- JmytImzp.
- Fypwmtocbdl qp pc ecdrqlmdz cr oqp yfqjqzh zc mgylm
- lmzmezqcd zoyz om yjjcnp km zc sjyh zom zcbtqpz -- yeecksydqml fh
- kh "fclhvbytlp," cr ecbtpm. Zom eclm qp tczyzqdv.
- Kddx sdu ln re Cucwczi. R orkk aui ad srwcun dca dcu enya
- mnqarezarde zem orkk knzhn odum orap z fpnnusck zem caanuki
- ezrhn pduqn-gunnmnu de z mrua udzm enzu z hrkkzwn fzkknm
- Tceaz Gzkknez. Zqx sdu apn truzan'q pdcqn zem idc ode'a gn szu
- zozi. Opne idc srem apn pduqn-gunnmnu, zqx prl opnapnu pn rq
- uzfrew zei kzln pduqnq aprq inzu. Fdmn fpzewnq zwzre. S psll feb
- ho ahlo be dro bqsr geno axasf.
- Bqo ofgensfx et bqo morraxo S loaio fozb bsmo psll vebabo
- efgo oagq bsmo bqo morraxo gefbasfr bqo lobbov ... poll, jed psll
- tsxdvo sb edb. Bqo bsmo atbov bqab, bqo geno psll ho bqo ramo
- efo bqab bqsr lobbov hoxaf psbq, ozgoub bqab bqo morraxo psll ho
- rulsb sfbe xvedur et osxqb gqavagborr. Bqoro xvedur psll ho
- pvsbbof sf vafnem evnov, hdb remo et bqom eiovlau.
- Haryovqedfn psll ho wdsgylj apavo et afj makev uelsgo
- euovabsef, re uloaro ho rdhblo. Lob remoefo yfep pqovo jed avo
- xesfx sf garo jed nsrauuoav.
- Jedvr,
- Kageh
Solution
- Initial Observations
The message is apparently written in a substitution cipher such that the punctuation and word structure are unchanged.
It can be seen that there are several occurrences of a single-letter word consisting of one capital letter.
There is only one such in the English language, that is: I.
But it is not as straightforward as that.
This single-letter word appears as O, P, R and S, as we progress through the message.
That means the substitution cipher is not constant throughout the entire message, but changes a number of times.
By the pattern of the supposed translation of I, the change may be assumed (unless we find a contraindication) that the change consists of moving the ciphertext one letter further on in the alphabet.
The omission of Q suggests that two of these changes happened without I appearing in the meantime.
- Preliminary Signposts
The message is clearly a letter.
From background knowledge (that is, from reading the introduction to the puzzle) it is believed that it came from Jacob Ecco, who is believed to have been kidnapped by Benjamin Baskerhound.
The signoff fits the pattern: Yours, Jacob even to the repeated o.
Hence we can infer those letters in the final cipher, and, assuming $5$ ciphers in total, work back to the first.
Note that we still need to identify the points at which the cipher changes, which at this point is not obvious.
It can be noted that the word patterns are the same from the final S until the end of the letter, for example:
- S psll at the end of the $6$th paragraph
- jed psll in the $7$th paragraph
- jed appearing twice in the $8$th paragraph.
which leads to the conclusion that the same cipher is used from at least the end of paragraph $6$ to the end of the letter.
Clearly jed is code for you.
However, let us see what we have so far.
Fazr wxxkiqxn xa qocu zq if xrwoh mwek dkkb johotkbx, xmaztm wccarjobt xa if cwqxar, hwztmwdhf obcaiqkxkbx. Qhkwnk jab'x xwuk appkbnk, par mk on wb obxahkrwdhk nbad. Dkcwznk mk on znobt ik xa nahek iwbf koppoczhk qzyyhkn w jwf, mk toekn ik qroewcf wbj xoik xa xmobu. Xmk rknxhx on xmwx O cwb lroxk xa faz wx if hkonzrk. O mwek if jazdxn xmwx I I xmon hkxxkr lokh rkwcm faz, dzx O mwek w qhwb xa hkwek ox I ob w trackr'n nxacu raai. Am, fkn, if cwqxar on Dkbgwiob Dwnukrmazbj, xmk iwxm qrajotf lma dkcwik w qmohanaqmf qrapknnar wx Qrobckxab, bal xzrbkj uojbwqqkr. Mk iwf kbxkr axmkr cwrkkrn ekrf naab. Loxm zmk habt-lobjkj obxrajzcxoab azx ap xmk lwf, faz lohh pobj ox kwnf xa jkcajk xmk rknx ob nqoxk ap xmk pwcx xmwx smk cajk on raxwxobt df abk hkxxkr rotmx bal. Exovlsnback xck npo oyxqq xsl dbcypcaxiig bc ynl jbfl. Nl dbcysbio npo xqqxpso eg dliiaixs ylilrnbcl, aopcu rspfxyl oxyliipyl dnxcclio. Nl qpcko slxkg mlidbjlo pc ixcko mnbol rlbril xkjpsl slelio. Ml xsl cbm pc Asauaxg, x ixck qpiilk mpyn lwpilk Exotalo mnb nxk qbauny xuxpcoy Qsxcdb pc Orxpc. Elqbsl ynpo, ml mlsl pc Nbrp dbacysg mnlsl ynl ysxkpypbcxi oaorpdpbc ybmxsko bayopklso mxo kporliilk mnlc Exovlsnback (xck P) nlirlk yb ibdxyl x upcxy xtapqls. ( I) Ynl dbkd po sbyxypcu xuxpc. Nm pzyh qd y sjyem rcty lyh, y nmmw, y kcdzo. Zomd nm ytm crr, bpbyjjh qd Fypwmtocbdl'p JmytImzp. Fypwmtocbdl qp pc ecdrqlmdz cr oqp yfqjqzh zc mgylm lmzmezqcd zoyz om yjjcnp km zc sjyh zom zcbtqpz -- yeecksydqml fh kh "fclhvbytlp," cr ecbtpm. Zom eclm qp tczyzqdv. Kddx sdu ln re Cucwczi. R orkk aui ad srwcun dca dcu enya I mnqarezarde zem orkk knzhn odum orap z fpnnusck zem caanuki ezrhn pduqn-gunnmnu de z mrua udzm enzu z hrkkzwn fzkknm Tceaz Gzkknez. Zqx sdu apn truzan'q pdcqn zem idc ode'a gn szu zozi. Opne idc srem apn pduqn-gunnmnu, zqx prl opnapnu pn rq uzfrew zei kzln pduqnq aprq inzu. Fdmn fpzewnq zwzre. S psll feb I i o ho ahlo be dro bqsr geno axasf. b ab o us is co a ai Bqo ofgensfx et bqo morraxo S loaio fozb bsmo psll vebabo co i o ssa I a i i ro a efgo oagq bsmo bqo morraxo gefbasfr bqo lobbov ... poll, jed psll o c ac i ssa co ai s r you i tsxdvo sb edb. Bqo bsmo atbov bqab, bqo geno psll ho bqo ramo i ur i ou . i a r a co i b sa efo bqab bqsr lobbov hoxaf psbq, ozgoub bqab bqo morraxo psll ho o a is r b a i c a ssa i b rulsb sfbe xvedur et osxqb gqavagbovr. Bqoro xvedur psll ho s i i o rou s o i c arac rs. s rou s i b pvsbbof sf vafnem evnov, hdb remo et bqom eiovlau. ri i ra o or r bu so o o r a Haryovqedfn psll ho wdsgylj apavo et afj makev uelsgo Bas r ou i b uic y a ar o a y ajor o ic euovabsef, re uloaro ho rdhblo. Lob remoefo yfep pqovo jed avo o ra io so as b sub . so o o r you ar xesfx sf garo jed nsrauuoav. oi i cas you isa ar Jedvr, Yours, Kageh Jacob
It is now just about possible to restore the plaintext of the last few paragraphs directly by inspection.
We note that Haryovqedfn is most probably Baskerhound (see above), and replace its letters with their plaintext whenever they appear from S psll onwards:
S psll feb I i no ho ahlo be dro bqsr geno axasf. be ab e o use his code a ain. Bqo ofgensfx et bqo morraxo S loaio fozb bsmo psll vebabo he encodin o he essa e I ea e ne i e i ro a e efgo oagq bsmo bqo morraxo gefbasfr bqo lobbov ... poll, jed psll once each i e he essa e con ains he e er e , you i tsxdvo sb edb. Bqo bsmo atbov bqab, bqo geno psll ho bqo ramo i ure i ou . he i e a er ha he code i be he sa e efo bqab bqsr lobbov hoxaf psbq, ozgoub bqab bqo morraxo psll ho one ha his e er be an i h e ce ha he essa e i be rulsb sfbe xvedur et osxqb gqavagbovr. Bqoro xvedur psll ho s i in o rou s o ei h charac ers. hese rou s i be pvsbbof sf vafnem evnov, hdb remo et bqom eiovlau. ri en in rando order bu so e o he o er a Haryovqedfn psll ho wdsgylj apavo et afj makev uelsgo Baskerhound i be uick y a are o any ajor o ice euovabsef, re uloaro ho rdhblo. Lob remoefo yfep pqovo jed avo o era ion so ease be sub e. e so eone kno here you are xesfx sf garo jed nsrauuoav. oin in case you disa ear
This part of the message falls into place, and we can establish that the keys for the cipher are:
Initial ciphertext:
- $\begin {array} {c|c} \text {Plaintext} & \texttt A & \texttt B & \texttt C & \texttt D & \texttt E & \texttt F & \texttt G & \texttt H & \texttt I & \texttt J & \texttt K & \texttt L & \texttt M & \texttt N & \texttt O & \texttt P & \texttt Q & \texttt R & \texttt S & \texttt T & \texttt U & \texttt V & \texttt W & \texttt X & \texttt Y & \texttt Z \\ \hline \text {Ciphertext} & \texttt W & \texttt D & \texttt C & \texttt J & \texttt K & \texttt P & \texttt T & \texttt M & \texttt O & \texttt G & \texttt U & \texttt H & \texttt I & \texttt B & \texttt A & \texttt Q & \texttt S & \texttt R & \texttt N & \texttt X & \texttt Z & \texttt E & \texttt L & \texttt V & \texttt F & \texttt Y \end {array}$
First change:
- $\begin {array} {c|c} \text {Plaintext} & \texttt A & \texttt B & \texttt C & \texttt D & \texttt E & \texttt F & \texttt G & \texttt H & \texttt I & \texttt J & \texttt K & \texttt L & \texttt M & \texttt N & \texttt O & \texttt P & \texttt Q & \texttt R & \texttt S & \texttt T & \texttt U & \texttt V & \texttt W & \texttt X & \texttt Y & \texttt Z \\ \hline \text {Ciphertext} & \texttt X & \texttt E & \texttt D & \texttt K & \texttt L & \texttt Q & \texttt U & \texttt N & \texttt P & \texttt H & \texttt V & \texttt I & \texttt J & \texttt C & \texttt B & \texttt R & \texttt T & \texttt S & \texttt O & \texttt Y & \texttt A & \texttt F & \texttt M & \texttt W & \texttt G & \texttt Z \end {array}$
Second change:
- $\begin {array} {c|c} \text {Plaintext} & \texttt A & \texttt B & \texttt C & \texttt D & \texttt E & \texttt F & \texttt G & \texttt H & \texttt I & \texttt J & \texttt K & \texttt L & \texttt M & \texttt N & \texttt O & \texttt P & \texttt Q & \texttt R & \texttt S & \texttt T & \texttt U & \texttt V & \texttt W & \texttt X & \texttt Y & \texttt Z \\ \hline \text {Ciphertext} & \texttt Y & \texttt F & \texttt E & \texttt L & \texttt M & \texttt R & \texttt V & \texttt O & \texttt Q & \texttt I & \texttt W & \texttt J & \texttt K & \texttt D & \texttt C & \texttt S & \texttt U & \texttt T & \texttt P & \texttt Z & \texttt B & \texttt G & \texttt N & \texttt X & \texttt H & \texttt A \end {array}$
Third change:
- $\begin {array} {c|c} \text {Plaintext} & \texttt A & \texttt B & \texttt C & \texttt D & \texttt E & \texttt F & \texttt G & \texttt H & \texttt I & \texttt J & \texttt K & \texttt L & \texttt M & \texttt N & \texttt O & \texttt P & \texttt Q & \texttt R & \texttt S & \texttt T & \texttt U & \texttt V & \texttt W & \texttt X & \texttt Y & \texttt Z \\ \hline \text {Ciphertext} & \texttt Z & \texttt G & \texttt F & \texttt M & \texttt N & \texttt S & \texttt W & \texttt P & \texttt R & \texttt J & \texttt X & \texttt K & \texttt L & \texttt E & \texttt D & \texttt T & \texttt V & \texttt U & \texttt Q & \texttt A & \texttt C & \texttt H & \texttt O & \texttt Y & \texttt I & \texttt B \end {array}$
Fourth change:
- $\begin {array} {c|c} \text {Plaintext} & \texttt A & \texttt B & \texttt C & \texttt D & \texttt E & \texttt F & \texttt G & \texttt H & \texttt I & \texttt J & \texttt K & \texttt L & \texttt M & \texttt N & \texttt O & \texttt P & \texttt Q & \texttt R & \texttt S & \texttt T & \texttt U & \texttt V & \texttt W & \texttt X & \texttt Y & \texttt Z \\ \hline \text {Ciphertext} & \texttt A & \texttt H & \texttt G & \texttt N & \texttt O & \texttt T & \texttt X & \texttt Q & \texttt S & \texttt K & \texttt Y & \texttt L & \texttt M & \texttt F & \texttt E & \texttt U & \texttt W & \texttt V & \texttt R & \texttt B & \texttt D & \texttt I & \texttt P & \texttt Z & \texttt J & \texttt C \end {array}$
Hence for the fourth change, we have:
S psll feb I will not ho ahlo be dro bqsr geno axasf. be able to use this code again. Bqo ofgensfx et bqo morraxo S loaio fozb bsmo psll vebabo The encoding of the message I leave next time will rotate efgo oagq bsmo bqo morraxo gefbasfr bqo lobbov ... poll, jed psll once each time the message contains the letter ... well, you will tsxdvo sb edb. Bqo bsmo atbov bqab, bqo geno psll ho bqo ramo figure it out. The time after that, the code will be the same efo bqab bqsr lobbov hoxaf psbq, ozgoub bqab bqo morraxo psll ho one that this letter began with, except that the message will be rulsb sfbe xvedur et osxqb gqavagbovr. Bqoro xvedur psll ho split into groups of eight characters. These groups will be pvsbbof sf vafnem evnov, hdb remo et bqom eiovlau. written in random order, but some of them overlap. Haryovqedfn psll ho wdsgylj apavo et afj makev uelsgo Baskerhound will be quickly aware of any major police euovabsef, re uloaro ho rdhblo. Lob remoefo yfep pqovo jed avo operation, so please be subtle. Let someone know where you are xesfx sf garo jed nsrauuoav. going in case you disappear.
It remains to establish where the cipher breaks are.
Just before the S psll of paragraph $6$, we have zwzre, which is the same as axasf but one letter displaced.
Hence zwzre is code for again, and we see that the $4$th cipher encoding ends here.
This takes us back at least to R orkk which is I will.
But all this is moot: all we need to do is apply the $5$ keys to the original text, starting with the first, and see what happens.
Fazr wxxkiqxn xa qocu zq if xrwoh mwek dkkb johotkbx, Your attempts to pick up my trail have been diligent, xmaztm wccarjobt xa if cwqxar, hwztmwdhf obcaiqkxkbx. Qhkwnk though according to my captor, laughably incompetent. Please jab'x xwuk appkbnk, par mk on wb obxahkrwdhk nbad. don't take offense, for he is an intolerable snob. Dkcwznk mk on znobt ik xa nahek iwbf joppoczhx qzyyhkn w Because he is using me to solve many difficult puzzles a jwf, mk toekn ik qroewcf wbj xoik xa xmobu. Xmk rknzhx on day, he gives me privacy and time to think. The result is xmwx O cwb lroxk xa faz wx if hkonzrk. O mwek if jazdxn xmwx that I can write to you at my leisure. I have my doubts that xmon hkxxkr lohh rkwcm faz, dzx O mwek w qhwb xa hkwek ox this letter will reach you, but I have a plan to leave it ob w trackr'n nxacu raai. in a grocer's stock room. Am, fkn, if cwqxar on Dkbgwiob Dwnukrmazbj, xmk iwxm Oh, yes, my captor is Benjamin Baskerhound, the math qrajotf lma dkcwik w qmohanaqmf qrapknnar wx Qrobckxab, bal prodigy who became a philosophy professor at Princeton, now xzrbkj uojbwqqkr. Mk iwf kbxkr axmkr cwrkkrn ekrf naab. Loxm turned kidnapper. He may enter other careers very soon. With xmk habt-lobjkj obxrajzcxoab azx ap xmk lwf, faz lohh pobj ox kwnf the long-winded introduction out of the way, you will find it easy xa jkcajk xmk rknx ob nqoxk ap xmk pwcx xmwx xmk cajk on to decode the rest in spite of the fact that the code is raxwxobt df abk hkxxkr rotmx bal. rotating by one letter right now. (After first shift) Exovlsnback xck npo oyxqq xsl dbcypcaxiig bc ynl jbfl. Nl Baskerhound and his staff are continually on the move. He dbcysbio npo xqqxpso eg dliiaixs ylilrnbcl, aopcu rspfxyl oxyliipyl controls his affairs by cellular telephone, using private satellite dnxcclio. Nl qpcko slxkg mlidbjlo pc ixcko mnbol rlbril xkjpsl slelio. channels. He finds ready welcomes in lands whose people admire rebels. Ml xsl cbm pc Asauaxg, x ixck qpiilk mpyn lwpilk Exotalo mnb nxk We are now in Uruguay, a land filled with exiled Basques who had qbauny xuxpcoy Qsxcdb pc Orxpc. Elqbsl ynpo, ml mlsl pc Nbrp fought against Franco in Spain. Before this, we were in Hopi dbacysg mnlsl ynl ysxkpypbcxi oaorpdpbc ybmxsko bayopklso mxo country where the traditional suspicion towards outsiders was kporliilk mnlc Exovlsnback (xck P) nlirlk yb ibdxyl x upxcy xtapqls. dispelled when Baskerhound (and I) helped to locate a giant aquifer. Ynl dbkl po sbyxypcu xuxpc. The code is rotating again. (After second shift) Nm pzyh qd y sjyem rct y lyh, y We stay in a place for a day, a nmmw, y kcdzo. Zomd nm ytm crr, bpbyjjh qd Fypwmtocbdl'p week, a month. Then we are off, usually in Baskerhound's JmytImzp. LearJets. Fypwmtocbdl qp pc ecdrqlmdz cr oqp yfqjqzh zc mgylm Baskerhound is so confident of his ability to evade lmzmezqcd zoyz om yjjcnp km zc sjyh zom zcbtqpz -- yeecksydqml fh detection that he allows me to play the tourist -- accompanied by kh "fclhvbytlp," cr ecbtpm. Zom eclm qp tczyzqdv. my "bodyguards," of course. The code is rotating. (After third shift) Kddx sdu ln re Cucwczi. R orkk aui ad srwcun dca dcu enya Look for me in Uruguay. I will try to figure out our next mnqarezarde zem orkk knzhn odum orap z fpnnusck zem caanuki destination and will leave word with a cheerful and utterly ezrhn pduqn-gunnmnu de z mrua udzm enzu z hrkkzwn fzkknm naive horse-breeder on a dirt road near a village called Tceaz Gzkknez. Zqx sdu apn truzan'q pdcqn zem idc ode'a gn szu Punta Ballena. Ask for the pirate's house and you won't be far zozi. Opne idc srem apn pduqn-gunnmnu, zqx prl opnapnu pn rq away. When you find the horse-breeder, ask him whether he is uzfrew zei kzln pduqnq aprq inzu. Fdmn fpzewnq zwzre. racing any lame horses this year. Code changes again. (After fourth shift) S psll feb I will not ho ahlo be dro bqsr geno axasf. be able to use this code again. Bqo ofgensfx et bqo morraxo S loaio fozb bsmo psll vebabo The encoding of the message I leave next time will rotate efgo oagq bsmo bqo morraxo gefbasfr bqo lobbov ... poll, jed psll once each time the message contains the letter ... well, you will tsxdvo sb edb. Bqo bsmo atbov bqab, bqo geno psll ho bqo ramo figure it out. The time after that, the code will be the same efo bqab bqsr lobbov hoxaf psbq, ozgoub bqab bqo morraxo psll ho one that this letter began with, except that the message will be rulsb sfbe xvedur et osxqb gqavagbovr. Bqoro xvedur psll ho split into groups of eight characters. These groups will be pvsbbof sf vafnem evnov, hdb remo et bqom eiovlau. written in random order, but some of them overlap. Haryovqedfn psll ho wdsgylj apavo et afj makev uelsgo Baskerhound will be quickly aware of any major police euovabsef, re uloaro ho rdhblo. Lob remoefo yfep pqovo jed avo operation, so please be subtle. Let someone know where you are xesfx sf garo jed nsrauuoav. going in case you disappear. Jedvr, Yours, Kageh Jacob
$\blacksquare$
Sources
- 1992: Dennis Shasha: Codes, Puzzles, and Conspiracy ... (next): The Coded Letter: $1$. The Letter