enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of puzzle topics - Wikipedia

    en.wikipedia.org/wiki/List_of_puzzle_topics

    Cryptogram; Maze. Back from the klondike; Ball-in-a-maze puzzle; Mechanical puzzle. Ball-in-a-maze puzzle; Burr puzzle; Word puzzle. Acrostic; Daughter in the box; Disentanglement puzzle; Edge-matching puzzle; Egg of Columbus; Eight queens puzzle; Einstein's Puzzle; Eternity puzzle; Fifteen puzzle; Fox, goose and bag of beans puzzle; Geomagic ...

  3. ROT13 - Wikipedia

    en.wikipedia.org/wiki/ROT13

    ROT13 provides an opportunity for letter games. Some words will, when transformed with ROT13, produce another word. Examples of 7-letter pairs in the English language are abjurer and nowhere, and Chechen and purpura. Other examples of words like these are shown in the table. [12] The pair gnat and tang is an example of words that are both ROT13 ...

  4. Cryptogram - Wikipedia

    en.wikipedia.org/wiki/Cryptogram

    A cryptogram is a type of puzzle that consists of a short piece of encrypted text. [1] Generally the cipher used to encrypt the text is simple enough that the cryptogram can be solved by hand. Substitution ciphers where each letter is replaced by a different letter, number, or symbol are frequently used. To solve the puzzle, one must recover ...

  5. Jumble - Wikipedia

    en.wikipedia.org/wiki/Jumble

    Jumble is a word puzzle with a clue, a drawing illustrating the clue, and a set of words, each of which is “jumbled” by scrambling its letters. A solver reconstructs the words, and then arranges letters at marked positions in the words to spell the answer phrase to the clue.

  6. Pigpen cipher - Wikipedia

    en.wikipedia.org/wiki/Pigpen_cipher

    The pigpen cipher uses graphical symbols assigned according to a key similar to the above diagram. [1]The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) [2] [3] is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid.

  7. BATCO - Wikipedia

    en.wikipedia.org/wiki/BATCO

    Each row in the right columns set contains a scrambled alphabet, with two letters in each cell. (There are 13 columns, so two letters per cell exhausts the alphabet.) A traffic key consist of a digit (from 2 to 7) and a letter. The operator selects one of the first 6 columns using the key digit and then finds the row in which the key letter occurs.

  8. Poem code - Wikipedia

    en.wikipedia.org/wiki/Poem_code

    Between Silk and Cyanide by Leo Marks, HarperCollins (1998), ISBN 0-00-255944-7.Marks was the Head of Codes at SOE and this book is an account of his struggle to introduce better encryption for use by field agents. it contains more than 20 previously unpublished code poems by Marks, as well as descriptions of how they were used and by whom.

  9. Classical cipher - Wikipedia

    en.wikipedia.org/wiki/Classical_cipher

    In the Chinese cipher's method of transposing, the letters of the message are written from right to left, down and up columns to scramble the letters. Then, starting in the first row, the letters are taken in order to get the new ciphertext. For example, if the message needed to be enciphered was THE DOG RAN FAR, the Chinese cipher would look ...