Skip to main content

Cryptography in Children's Books: Gregor And the Code of Claw by Suzanne Collins

While rereading this book series - the first time was about six or seven years ago - I was struck at a rather cryptographic code in the final book and wanted to share it with you.



The Gregor the Overlander series is written by Suzanne Collins - The same woman who wrote The Hunger Games. I think this would make an excellent movie series.

Spoilers for a children's book that's eleven years old based off of the Holocaust and World War II featuring humans fighting talking rats, moles, ants, and many other natural anomalies.



Back in the first book, Gregor tells his younger sister, Lizzie, of fighting the rat king Gorger in the Underland, and she notices that the vowels had changed positions in their names.

In this book, Lizzie comes down and ends up helping with the code and that's the code, except a bit differently;

"Can the letter A ever be a letter A?"
"We don't think so. See, basically, this is like a cryptogram, and a letter is never itself. There's another kind of puzzle called an anagram, where you just take the letters and mix them around to form another word. Like the word 'nap' could be the word 'pan' and the 'a' doesn't have to move, or the word 'cat' could be the word 'act' -"
"Or the name 'Gregor' could be the name 'Gorger'," said Gregor, giving Lizzie a poke in the side. 
It's an anagram where some letters can be themselves. So what's the key word that has letters that don't change? What do the rats have to remember?

Either Gregor or Gorger, but why remember the name of the Warrior who might come and kill you all? Better to remember your king - and shorten it to GORE.

Then a single shift was implemented -

A = B
B = C
C = D
D = F because E doesn't change when you see it.

ABCDEFGHIJKLMNOPQRSTUVWXYZ

So the message CHGGERQ ARRHVE AT is Diggers (The word for moles in the book) arrive at.

That's...rather clever. It wouldn't fly very long in a working, real life environment, but for a children's book that's pretty smart, especially the small amount of letters that wouldn't change.

If this is a pre-existing encryption method, let me know. Again, this series is based off of World War II.


Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me .  3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching (Networking). CCNA, A+, Sec+, Azure certified WORKING ON: Junos Networking Cloud Technician     Azure [ See tag ]  Support [Web: Example Job Description ] [Text : Example

Portfolio of UX/Product Feedback [Vol. 1]

Have You Looked at Your Webpage From the Customer's View Lately? You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Wireless Diagnostics on Mac OS; Packet Sniffing on a WLAN

There's a post sitting in my drafts about Wireshark and how to sniff packets out of the air that was going to be about sniffing for authentication packets for Wi-Fi hotspots that aren't broadcasting SSID (Which you shouldn't do apparently! It's still not safe). I was watching this video to find a little more information about how to properly use Monitoring mode on my Macbook to sniff for WLAN packets on the network. So when he said "Just open up Wireless Diagnostics and sniff your network (check your width and channel)." It was shocking to me.