January 19, 2017
An illuminated bible, and the largest existing medieval manuscript in the world. It is infamous for a unique and giant picture of the devil. The manuscript is believed to be from the early 12 century by the work of single monk over 5-12 years named Hermann the Recluse.
The legend of the codex was featured in the Black Tapes. The story tells of a monk, so despicable that his fellow monks had sentenced him to death by bricking him up in a wall. The monk begged for his freedom by promising to illustrate a bible that would cement the monastery’s fame. He promised to do this in one night. Either way, it was a ridiculous promise, but because he was such a talented illuminator, the monks took the bargain.
When the time came for the manuscript to be due, the monk was woefully behind, so he made a deal with Lucifer to help him finish the book in exchange for his soul. Hence, it forever became known as the Devil’s Bible.
A more reliable telling of the story can be found here.
January 10, 2017
Norse for Nailship.
In mythology, it is a boat made entirely from the untrimmed fingernails and the toenails of the dead. Nordic eddas have it that Loki and Hrym will pilot this ship full of the souls of Hel to Asgard to destroy the God. This will be part of Ragnarök.
But, the process can be slowed. If you trim the nails of the dead, then evil has less material to build from and the ship’s construction will be slowed.
Thanks to Jay and Miles X-Plain the X-Men for first pointing out this story to me.
January 5, 2017
A Tabula Recta or Vigenère Square used with a password to crack the cipher
A powerful cipher that uses a keyword to create a series of Caesar ciphers — difficult to solve without the keyword, and easy if you have it.
A Caesar cipher shifts letters in the alphabet by a determined number, so ABCD with a shift of 3 would become DEFG. The Vigenère uses several different Caesar shifts based on a keyword. The keyword (e.g. Password) is repeated over and over again during the message (e.g. passwordpasswordpasswor…). Each letter is paired with the encrypted message to produce a different shift based on a tabla recta — shown above and easily replicated. As a result, the letter z might mean an t at one point in the code but it might mean an h at another point. Without the keyword (or at least knowledge of how long the word even is), it is nearly impossible to crack.
According to Wikipedia, the cipher dates back to 1553 in the writing of crypologist Giovan Battista Bellaso but was incorrectly attributed to Blaise de Vigenère and named for him.
This was another cipher taught to me by the great minds behind the Mystery Experiences Company.
January 3, 2017
The knock-knock joke is the fad that never died. This form of humor, neither inherent to language like the pun (which it relies heavily upon), nor inherent to human nature like sarcasm must have had a birthdate. At the very least, it could not be older than since man lived behind closed doors. Thankfully, the good folks at Wikipedia had already done their homework on this.
Here are the relevant facts:
- Before the knock-knock joke according to NPR was the “Do You Know?” joke. As in, “Do you know Arthur?” “Arthur Who?” “Arthurmometer!” This sort of nonsense was around at the turn of the 20th century.
- In 1936 the Knock-knock joke took off, appearing everywhere. This undoubtably was the year it became a thing. Also that year that Republicans nominated Col. Frank Knox as their vice-presidential nominee. NPR suggested the two events were not unrelated.
- By the end of that year, it was already annoying, but still it lived on.
- According to a comedy sketch that year, it was invented by a fictional character named Ramrod Dank. I just needed to include that name.
December 31, 2016
Also known as a Sherlock Cipher, this basic code comes from the Sherlock Holmes story “The Adventure of the Dancing Men.” It is a very basic substitution cipher but with fun little Keith Haring men. The end of words was signified with tiny flags in the men’s hands.
Wikipedia lists the story as Arthur Conan Doyle’s third favorite.
December 30, 2016
A transposition cipher written in a zigzag that simulates the pattern of rails on a fence.
A few months ago, I gave in and clicked on a persistent facebook ad for the Mystery Experiences Company. At the risk of sounding like an infomercial, it sends me a new puzzle story every month with lots of cool props and was totally worth it. At the very least, I have learned a ton about cryptography, which will be the subject of several new posts.
This cipher works by writing out a message on a “rail fence” of a set number of posts, descending then ascending in a zig-zag fashion. So the message: “This is a cipher” might look like this in a three rail cipher:
The code then is created straight across, top to bottom. So in the case above: TIPHSAIHRICE.
It is not considered a particularly difficult cipher to break once identified as a rail fence cipher, because one would only need know the number of “rails.” One tip that is is a rail fence cipher is that because it is simply an anagram, the frequency of letters will remain consistent with the rest of the English language.
Some information about Rail Fence Ciphers was found at Sophia Knight’s page at Trinity College: http://www.cs.trincoll.edu/~crypto/historical/railfence.html
February 8, 2014
Stellenbosch, South Africa, a beautiful town to visit, but a terrible place to be assigned.
Transitive verb: To assign someone incompetent to a position of little responsibility
I don’t like lifting words from Anu Garg’s wonderful A.Word.A.Day but this was simply too good. Stellenbosch is was a city in South Africa where British officers with little experience or talent were sent during the Second Boer War.