Get Cracking: The Secret Codes & Ciphers Quiz

By: John Miller
Estimated Completion Time
3 min
Get Cracking: The Secret Codes & Ciphers Quiz
Image: Shutterstock

About This Quiz

There are all sorts of reasons humans resort to secrecy, from launching military operations to hiding buried treasure. But ciphers are also good fun—even when they cause massive exasperation. How much do you know about these real secret codes?
The Enigma code gained fame during which conflict?
American Revolution
World War II
The Gulf War
Correct Answer
Wrong Answer

In World War II, the Nazis developed the Enigma code, which was meant to protect their messages from the Allies. For a long time, the code was seemingly unbreakable.

How did the Germans decipher their Enigma messages to each other?
they used a special machine
on pen and paper
using sacrificial codebreakers
Correct Answer
Wrong Answer

The Germans used the infamous Enigma machines, which look a lot like the typewriters of that era. These portable ciper machines had rotor scramblers, which kept the codes constantly changing, making it nearly impossible for the Allies to intercept and understand German messages before the solution became obsolete.

How does a ROT1 cipher work? (Hint: "ipx epft b SPV1 djqifs xpsl?")
substitutes one letter for another
substitutes numbers for letters
it uses tapping sounds
Correct Answer
Wrong Answer

A ROT1 code simply rotates each letter one step through the alphabet. So "a" becomes "b" and "b" becomes "c," and so forth.

Advertisement

True or false: ROT1 ciphers are nearly unbreakable.
true
false
Correct Answer
Wrong Answer

Not even close—ROT1 ciphers are considered by cryptographers to be child's play. They're still fun, but not much else.

True or false: Morse code can transmit both letters and numbers.
true
false
Correct Answer
Wrong Answer

Morse code is highly versatile and can be communicated through a sequence of short and long clicks, or taps, or flashes of light, or audio tones. People who get really good at Morse code can understand these signals instantly, without any equipment.

Morse code was co-invented by Samuel Morse, who had a hand in developing which device?
the light bulb
the telegraph
the dishwasher
Correct Answer
Wrong Answer

Morse was one of the men who invented the telegraph machine, an early communications device that relied on coded signals to relay messages. Those signals, of course, were Morse code.

Advertisement

Morse code is which type of code?
Vigenère cipher
monoalphabetic substitution
transposition
Correct Answer
Wrong Answer

Morse code is a type of monoalphabetic substitution. As with a Caesar shift or ROT1, it just means that a key is used to replace one letter of the alphabet with another symbol, whether it's a number or letter.

During the Vietnam War, an American prisoner of war was forced to participate in a televised news conference. He used his eyes to "blink" a message in Morse code. What did the message say?
"Tell my wife that I love her"
"Get me out of here"
"Torture"
Correct Answer
Wrong Answer

Jeremiah Denton was the Navy pilot who blinked a message in Morse code. His message? "Torture." It confirmed to U.S. officials that the North Vietnamese were mistreating POWs.

Morse code uses just one short signal to denote the most common letter in the English language—which letter is that?
A
S
E
Correct Answer
Wrong Answer

The most commonly used letter in English is "e." So, in the name of efficiency, Morse code denotes "e" with just one brief signal. Whenever you're trying to crack any code, it can help to keep in mind which letters and words are likely to be the most common.

Advertisement

What is NOT one of the methods for learning Morse code?
Koch method
Rhythm method
Farnsworth method
Correct Answer
Wrong Answer

There's no Trump method. Both the Koch and Farnsworth methods teach Morse code. Both methods rely on variations of repetition to help users develop speedy Morse code skills.

Isthay isay anay exampleay ofay isthay anguagelay amegay:
Pig Latin
Dog Latin
Real Latin
Correct Answer
Wrong Answer

Pig Latin and Dog Latin are both language games that essentially mock real Latin, although the first is more widely known. It's not really much of a code or a secret, but that doesn't make it any less fun.

Steganography is also called what?
hidden writing
math-enabled encryption
monoalphabetic substitution
Correct Answer
Wrong Answer

One example of steganography involves invisible ink, which is nearly impossible to see until the receiver exposes it to heat or another chemical trigger.

Advertisement

The Beale ciphers are some of the world's most famous codes. They supposedly indicate the location of what, exactly?
the doorway to Heaven
a big pile of gold
Hitler's body
Correct Answer
Wrong Answer

The Beale ciphers are a set of three ciphertexts from the 1800s that supposedly pinpoint the location of jewels and gold worth tens of millions of dollars. The gold was said to be hidden by a man named Thomas Beale in the 1820s, who apparently disappeared after hiding it.

The Beale ciphers were entrusted to a friend. Why were they published in a public paper in the 1880s?
to increase the paper's circulation
the friend wasn't a very good one
they needed help deciphering the code
Correct Answer
Wrong Answer

In the 1880s, an unknown person published the codes in a paper, ostensibly for the purpose of finally solving the decades-old riddle. The codes immediately grabbed the public's attention.

True or false: The Beale ciphers have been cracked, for the most part.
true
false
Correct Answer
Wrong Answer

Parts of the codes were indeed cracked after it was discovered that some of the numbers referred to the order of words in the Declaration of Independence. Part of the message revealed "I have deposited in the county of Bedford, about four miles from Buford's, in an excavation or vault, six feet below the surface of the ground, the following articles...." But there are still important elements missing from the puzzle, and nobody has reported finding the treasure. Some experts maintain the whole thing is a longstanding hoax.

Advertisement

The Voynich manuscript is a mysterious book that dates back to which century?
15th century
9th century
2nd century
Correct Answer
Wrong Answer

The Voynich manuscript probably dates back to the 15th century. It's a confounding book filled with lines of mysterious text and whimsical drawings. Many think it's a secret code of some sort.

For more than a century, codebreakers have worked on the Voynich manuscript. True or false: It's essentially been solved.
true
false
Correct Answer
Wrong Answer

The best codebreakers have tried and failed to understand the Voynich manuscript. No one really knows what the mysterious book might mean. It might simply be a well-constructed hoax.

Some experts think that the Voynich manuscript might be an example of glossolalia, which basically refers to what?
speaking in tongues
witchcraft
demonic possession
Correct Answer
Wrong Answer

The Voynich manuscript might be something akin to glossolalia or speaking in tongues—a way for the author to express some offbeat creativity. Or perhaps it's a sacred text from an alien planet. No one really knows.

Advertisement

A Caesar cipher is also known as what?
vigenère
old Morse code
a shift cipher
Correct Answer
Wrong Answer

The Caesar cipher is often called shift cipher. Like the ROT1 system, it simply substitutes one letter for another…but you need a way to know exactly which letter another letter stands for, otherwise you'll never understand the message.

Why did Roman leader Julius Caesar use the Caesar cipher?
to get rich
to protect army intelligence
to make a tasty salad
Correct Answer
Wrong Answer

Caesar didn't want military intelligence falling into the wrong hands. His cipher worked, but in large part because many of his opponents couldn't read.

How is a Vigenère cipher related to a Caesar cipher?
uses numbers in place of letters
it uses multiple Caesar ciphers
they are exactly the same
Correct Answer
Wrong Answer

A Vigenère cipher interweaves multiple Caeser ciphers to create a code that's even tougher to crack. It's also called polyalphabetic substitution, and for hundreds of years no one could figure out how to break these codes.

Advertisement

Vigenère ciphers are very old. When were the first used?
20th century
16th century
19th century
Correct Answer
Wrong Answer

In the middle of the 16th Century, a man named Giovan Battista Bellaso explained the first of what are now called Vigenère ciphers. His method made it easy to substitute one polyalphabetic symbol for another—and very hard for anyone to read his secret messages.

Vigenère ciphers were used many times by the Confederates during the Civil War. True or false: The Union never broke those codes.
true
false
Correct Answer
Wrong Answer

Confederate officers often relied on Vigenère ciphers, which were easy to create using special brass cipher disks. But the Union had enough resources to routinely crack the codes.

Mary, Queen of Scots, used a type of Caesar cipher in the 16th century for messages about what?
whaling expedition details
an assassination plot
secret recipes
Correct Answer
Wrong Answer

In 1586 Mary plotted to kill Queen Elizabeth I. Unfortunately for Mary, one of the Queen Elizabeth's men cracked the code. Mary was imprisoned and ultimately executed.

Advertisement

In 1948, police in Australia were bewildered by a secret code that was found with what?
an empty beer bottle
a dead body
a burning tire
Correct Answer
Wrong Answer

The police found a dead body with a message sewn into the man's clothes, which then led them to a book hidden his car. The book had indentations of a secret code. The incident became known as the Tamam Shud case.

How long did it take for Australian police to crack the code in the Tamam Shud case?
about 2 years
about 30 years
they never cracked it
Correct Answer
Wrong Answer

The famous Tamam Shud case has never been solved. No one knows who killed the man. And no one has ever been able to crack the supposed secret code, either.

After decades spent trying to solve it, some experts think the code in the Tamam Shud case is what?
shorthand for something else
a lunatic's ravings
a fast food order
Correct Answer
Wrong Answer

Many experts have tried and failed to comprehend the strange code. Some of the most recent attempts have concluded that the code isn't really secret, it's just shorthand for something that no decryption method will ever understand.

Advertisement

A Rail Fence cipher is what sort of cipher?
Caesar cipher
transposition cipher
non-existent; we just made it up
Correct Answer
Wrong Answer

Rail Fence is a type of transposition cipher. It's written in a downward fashion on rows of lines. Once you get to the bottom of the line, you read upwards until arriving at the top line, and then repeat the process to see the entire message.

A man named Forrest Fenn supposedly hid buried treasure in the Rocky Mountains. To find it, a codebreaker must do what?
crack a poem
travel to Antarctica
get lost in the woods
Correct Answer
Wrong Answer

Fenn developed his riddle as a poem, which ends with this stanza: "So hear me all and listen good, your effort will be worth the cold. If you are brave and in the wood, I give you title to the gold." Whoever can decipher the meaning of the full poem should be able to find a fancy bronze box filled with treasure.

Why did Fenn bury the treasure, anyway?
he got sick
he loves tormenting people
he didn't; it was all a hoax
Correct Answer
Wrong Answer

Fenn, who is still alive and in his 80s, was inspired to bury the treasure when he was diagnosed with cancer. Now he delights in hearing stories about treasure hunters who are searching for his pile of gold. Many people contact him for clues regarding the secret code, but he is very sparing with his hints.

Advertisement

You Got:
/30
Shutterstock