American Cryptogram Association

Last updated
American Cryptogram Association
FormationSept. 1, 1930;92 years ago (Sept. 1, 1930)
President
DARING FLAIR
Website www.cryptogram.org

The American Cryptogram Association (ACA) is an American non-profit organization devoted to the hobby of cryptography, with an emphasis on types of codes, ciphers, and cryptograms that can be solved either with pencil and paper, or with computers, but not computer-only systems.

Contents

History

The ACA was formed on September 1, 1930. Initially the primary interest was in monoalphabetic substitution ciphers (also known as "single alphabet" or "Aristocrat" puzzles), but this has since extended to dozens of different systems, such as Playfair, autokey, transposition, and Vigenère ciphers.

Since some of its members had belonged to the “National Puzzlers' League”, some of the NPL terminology ("nom," "Krewe," etc.) is also used in the ACA. [1]

Publications and activities

The association has a collection of books and articles on cryptography and related subjects in the library at Kent State University.

An annual convention takes place in late August or early September. Recent conventions have been held in Bletchley Park and Fort Lauderdale, Florida.

There is also a regular journal called “The Cryptogram”, which first appeared in February, 1932, and has grown to a 28-page bimonthly periodical which includes articles and challenge ciphers.

Notable members

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Caesar cipher</span> Simple and widely known encryption technique

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

<span class="mw-page-title-main">Cryptogram</span> Puzzle

A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough that the cryptogram can be solved by hand. Substitution ciphers where each letter is replaced by a different letter or number are frequently used. To solve the puzzle, one must recover the original lettering. Though once used in more serious applications, they are now mainly printed for entertainment in newspapers and magazines.

<span class="mw-page-title-main">Frequency analysis</span> Study of the frequency of letters or groups of letters in a ciphertext

In cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

<span class="mw-page-title-main">Ciphertext</span> Encrypted information

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher.

Articles related to cryptography include:

<span class="mw-page-title-main">Books on cryptography</span> Wikimedia list article

Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle.

<span class="mw-page-title-main">Herbert Yardley</span> American cryptologist

Herbert Osborn Yardley was an American cryptologist. He founded and led the cryptographic organization the Black Chamber. Under Yardley, the cryptanalysts of The American Black Chamber broke Japanese diplomatic codes and were able to furnish American negotiators with significant information during the Washington Naval Conference of 1921–1922. Recipient of the Distinguished Service Medal. He wrote The American Black Chamber (1931) about his experiences there. He later helped the Nationalists in China (1938–1940) to break Japanese codes. Following his work in China, Yardley worked briefly for the Canadian government, helping it set up a cryptological section of the National Research Council of Canada from June to December 1941. Yardley was reportedly let go due to pressure either from the Secretary of War Henry L. Stimson or from the British.

The National Puzzlers' League (NPL) is a nonprofit organization focused on puzzling, primarily in the realm of word play and word games. Founded in 1883, it is the oldest puzzlers' organization in the world. It originally hosted semiannual conventions in February and September of each year, but conventions are now held annually, in July.

Cryptologia is a journal in cryptography published six times per year since January 1977. Its remit is all aspects of cryptography, with a special emphasis on historical aspects of the subject. The founding editors were Brian J. Winkel, David Kahn, Louis Kruh, Cipher A. Deavours and Greg Mellen. The current Editor-in-Chief is Craig Bauer.

<span class="mw-page-title-main">RC2</span> Block cipher

In cryptography, RC2 is a symmetric-key block cipher designed by Ron Rivest in 1987. "RC" stands for "Ron's Code" or "Rivest Cipher"; other ciphers designed by Rivest include RC4, RC5, and RC6.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

The Two-square cipher, also called double Playfair, is a manual symmetric encryption technique. It was developed to ease the cumbersome nature of the large encryption/decryption matrix used in the four-square cipher while still being slightly stronger than the single-square Playfair cipher.

James J. Gillogly is an American computer scientist and cryptographer.

Helen Fouché Gaines was a member of the American Cryptogram Association and editor of the book Cryptanalysis first published in 1939. The book described the principal cryptographic systems of the 19th century and cracking methods including elementary contact analysis (cryptanalysis). Her pen name was PICCOLA. Shortly after the publication of the book, she died.

<span class="mw-page-title-main">Alberti cipher</span> Polyalphabetic substitution encryption and decryption system

The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise De componendis cifris he explained how his conversation with the papal secretary Leonardo Dati about a recently developed movable type printing press led to the development of his cipher wheel.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

A musical cryptogram is a cryptogrammatic sequence of musical symbols, a sequence which can be taken to refer to an extra-musical text by some 'logical' relationship, usually between note names and letters. The most common and best known examples result from composers using ciphered versions of their own or their friends' names as themes or motifs in their compositions. Much rarer is the use of music notation to encode messages for reasons of espionage or personal security called steganography.

<span class="mw-page-title-main">William Lutwiniak</span> American crossword creator

William Lutwiniak was an American crossword constructor who was also known for his work as a cryptologist with the National Security Agency. He composed a total of 8,413 puzzles; his first five thousand were composed between 1965 and 1985, as a hobby.

References