Skip to main content

Cryptography in Children's Books: Gregor And the Code of Claw by Suzanne Collins

While rereading this book series - the first time was about six or seven years ago - I was struck at a rather cryptographic code in the final book and wanted to share it with you.



The Gregor the Overlander series is written by Suzanne Collins - The same woman who wrote The Hunger Games. I think this would make an excellent movie series.

Spoilers for a children's book that's eleven years old based off of the Holocaust and World War II featuring humans fighting talking rats, moles, ants, and many other natural anomalies.



Back in the first book, Gregor tells his younger sister, Lizzie, of fighting the rat king Gorger in the Underland, and she notices that the vowels had changed positions in their names.

In this book, Lizzie comes down and ends up helping with the code and that's the code, except a bit differently;

"Can the letter A ever be a letter A?"
"We don't think so. See, basically, this is like a cryptogram, and a letter is never itself. There's another kind of puzzle called an anagram, where you just take the letters and mix them around to form another word. Like the word 'nap' could be the word 'pan' and the 'a' doesn't have to move, or the word 'cat' could be the word 'act' -"
"Or the name 'Gregor' could be the name 'Gorger'," said Gregor, giving Lizzie a poke in the side. 
It's an anagram where some letters can be themselves. So what's the key word that has letters that don't change? What do the rats have to remember?

Either Gregor or Gorger, but why remember the name of the Warrior who might come and kill you all? Better to remember your king - and shorten it to GORE.

Then a single shift was implemented -

A = B
B = C
C = D
D = F because E doesn't change when you see it.

ABCDEFGHIJKLMNOPQRSTUVWXYZ

So the message CHGGERQ ARRHVE AT is Diggers (The word for moles in the book) arrive at.

That's...rather clever. It wouldn't fly very long in a working, real life environment, but for a children's book that's pretty smart, especially the small amount of letters that wouldn't change.

If this is a pre-existing encryption method, let me know. Again, this series is based off of World War II.


Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services] (2020)

I am a remote consultant. I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me. Doesn't have to be tech-related. I just have to find it interesting and flexible.


What I do for you:
Simplified writing about tech. [Example Job Description, 2, 3] You want to pay me to write more of *waves hand* this blog? I am game.
Technical Analyst [Example Job Description]
UX Auditing [See Here]eCommerce merchandising [See Here]Entry-Level Web Support [Example Job Description]
Email Marketing Specialist [Example Job Description]  ProofreadingText-based support [Example Description]. 
The following is what I was trained in. Roles will be considered if I feel it's the best fir for you. Still part-time, contract, and/or temporary
Azure
Cisco routing and switching technician

Volunteering:
Find me on Jumpstart and CareerVill…

Azure Networking Options - Core Cloud Services

I have done a lot of AWS things on here. Time to give Azure some attention. After all, since employers don't think Cisco or COMPTIA certifications are important, maybe Microsoft ones are?

First, let's really think about why these are the two biggest cloud services providers in the world:

They've been doing internet things for a long time.Amazon launched in 1995, a virtual bookstore.
Microsoft, well, you know. 

They've lived, breathed, and frankly, created, infrastructure that we use today, that they're selling to us today. Of course the Store of Everything and the Company of Everything would encourage us to put everything in their hands.

Also: Azure has a lot less silly names for modules. Important. I appreciate straightforwardness.


I said 'a lot less', not '100% sensible names'

Microsoft has a clear set of Azure Fundamentals that anyone can interact with. Let's talk about networking basics, basically to say, again, "Hi, employers, I have an …

Search and Infiltrate: How to Deeply Investigate a Company's People [6/4/2020]

Latest Update - 6/4/2020


This is a bit of an impromptu post after reading this article.

I had a small thread about this on Twitter, a blog post is a lot better to get the information out in a clear way.

Have you ever used Recruitin.net, came across a group of people who match Your Dream Company, Dream Location, and do your Dream Job on LinkedIn...and they're not active?

What was the POINT, am I right?  A place for professionals to network, but they're not active ...because they have a job to do! You want to be like that!

Unfortunately, in this day and age, unless you have a 'relationship' with someone, they're not going to help you.

Hm. 

(Note: 'relationship' is different than relationship).

I'm not here to talk bad about recruiters - They have a difficult job, I know I couldn't do it! - And even they want a relationship before they place you somewhere, competency be damned.

What do you do instead?

This:

(Note; I'm using my own URL for this and …