LIBRARY HOURS:  MON-THU 10-9pm FRI 10-5pm SAT 9-5pm SUN 1-5pm | Closures | 216-261-5300
My Account: Log In
webbackground

Find books, music, and movies!
ClevNet Logo
webbackground

Secret Messages


Secret Decoder RingCodes and ciphers have been used for thousands of years to send secret messages. Historians believe that the first cipher or code was chiseled into a tomb in Egypt in the year 1900 B.C.E. Codes and ciphers use techniques that scramble words to make them difficult to understand. This is called encryption. Codes replace words or phrases in a message with another word, phrase or series of symbols. Pig Latin is one example of a code. Ciphers, like Morse code, replace every letter in a message with another letter or a symbol. 
 
Cryptography, the study of encoding or scrambling messages is commonly used during wartime. Julius Caesar developed a cipher system to ensure that messages he sent to his troops could not be read if they fell into enemy hands. Codes and Ciphers were used during the Revolutionary War, and the telegraph was one of the most popular ciphers used during the Civil War.

Before the telegraph, secret messages were sent through visual codes, like semaphore, which is a system that uses the position of two flags to represent letters. Another way that communication was transmitted visually was through smoke signals, which Native Americans used as codes. During World War II, spoken codes were transmitted over wireless radio by Native Americans whom the Marines recruited as Navajo Code Talkers. The U. S. Military needed a code which enemy code breakers could not figure out. Codes based on the Navajo language were used because the Navajo language is hard to master even by people who speak other Native American languages. Their codes were never broken and The Navajo Code Talkers helped win the battle at Iwo Jima.

Did you know?


Navajo Code Talkers
  • 17th century scientists Galileo and Robert Hooke used Latin anagrams to record their scientific discoveries so that other scientists would not steal their information and take credit for it. 
  • In a television interview he was forced to give, American naval pilot Jeremiah Denton, who was shot down over North Vietnam in 1965 blinked the word “torture” in Morse code. 
  • World War I spies engraved secret messages on toenails. 
  • Modern Cryptologists make sure that personal information and credit card numbers are kept safe over the Internet.

 

Check These Out!


The Unbreakable Code
Hunter, Sara Hoagland
Because John is afraid to leave the Navajo Reservation, his grandfather explains to him how the Navajo language, faith, and ingenuity helped win World War II.
Top Secret
Janeczko, Paul B.
Presents a guide to codemaking, codebreaking, and their role in history, describing different types of codes and ciphers, discussing codebreaking and concealment techniques, and including brief stories about exciting moments in the history of the art.
Breaking Secret Codes
Gregory, Jillian
"Discusses different methods for breaking secret codes"--Provided by publisher.
The Secret of the Skeleton Key
Warner, Penny
Using their code-breaking skills, four middle-schoolers solve the mystery of the eccentric man who draws stick figures on his second-floor bedroom window.

Websites