Cryptology in Fiction
Fiction Titles in Henry Langen's Cryptology Bibliography (1956)

Last Updated 23 August 2012

This list is most of the titles that are classified as (Novel) or (Short Story) in Henry E. Langen's bibliography of cryptologic literature.

Langen, Henry, E. 1956. Bibliography of the Literature of Cryptography. Unpublished manuscript. North Carolina State University, Jack E. Levine Collection. Box 34, File 308.34.

Henry E. Langen (1918 - 1962) was the editor-in-chief of The Cryptogram, the magazine of the American Cryptogram Association (ACA) from 1952 - 1956. He was later the vice-president of the ACA. His ACA nom was HELCRYPT. Langen was a life-long fan of cryptography and had an extensive personal library of cryptographic titles, both fiction and non-fiction. For several years he also contributed a regular column The Crypto-Black Chamber to The Cryptogram. During World War II he served in the Army Air Forces as an undercover CID agent. This bibliography was created by Langen during his tenure as editor of The Cryptogram and is dated December 31, 1956.

There are over 850 total entries in the bibliography and more than 300 examples of crypto fiction titles in the bibliography. Not all of them are listed here for a number of reasons. Some of the entries only mention a cryptogram, but give no examples of the cryptogram, the cryptographic system, or of cryptanalysis. Some of the entries also only mention Morse code but list no other cryptographic systems, and so were not included in this web page. There are several entries listed as fiction in the bibliography that do not have any cryptograms or descriptions of cryptograms or cryptographic systems in them. These were also not included in this web page.

There are also a number of errors in Langen's list. These include errors in dates, the names or locations of publishers, the spelling of author's names, and the spelling of words in story titles. There are also a few stories where Langen got the cryptographic system wrong or where he left out a description altogether. All of these have been corrected in this list.

The Crypto Fiction Titles

  1. Albrand, Martha. 1954. Nightmare in Copenhagen. paperback ed. New York: Random House. pgs.
    Spy story with a simple code in which each letter of a word stands for a codeword.

  2. Allingham, Margery. 1936. The White Elephant. In Mr. Campion, Criminologist. New York: Doubleday & Company. 21 pgs.
    Albert Campion solves a simple name code and saves Auntie Flo, the Dowager Countess of Marle, from a burglary gang. The gang uses a book of common names and their meanings to transmit short, simple messages via radio. Campion deduces this and discovers whre Auntie Flo is being held captive. The story is lively and typically witty.

  3. Anderson, Frederick Irving. 1913. Counterpoint. In Adventures of The Infallible Gadahl. New York: Thomas Y. Crowell Company, Publishers. 266 pgs.
    Ace thief, the Infallible Godahl is engaged to steal a ring from Mr. Mapes, who at one time was in charge of a spy ring, but has apparently retired. Mr. Mapes, though has some letters in his possession that appear to have been steamed open. The letters contain stock information on one side, and musical scribblings on the other. The scribblings turn out to be a simple cipher akin to a Baconian biliteral cipher. Pairs of notes are turned into letters of the alphabet. For example, a = aa, b = ab, c = ac, f = ba, etc. The letters turn out to describe US military defense plans for the Panama Canal.

  4. Appleton, Victor. 1933. Tom Swift and his Television Detector: or Trailing the Secret Plotters. hardcover ed. New York: Grosset & Dunlap. 217 pgs.
    From The book opens with Ned Newton working on "small, but complicated mechanism." Ultimately, we find it is a "pocket wireless sender" to be used to communicate via a cipher code if/when one of the chums is in trouble. He proposes to Tom that a means of seeing through brick walls would be invaluable in "finding criminals and anyone who might be kidnapped." Tom has other things on his mind, and pooh-poohs the idea. It seems that a secret vault, located below his lab and protected by double-locks and alarms has been penetrated, and a small wooden box containing the formula for a deadly war gas has been stolen. Tom must recover the formula before it can be used to cause death & destruction at home and abroad. It is learned that the formula was purloined by a nefarious foreigner who goes by the moniker "The Leopard." He leaves three muddy thumbprints as a calling card whenever he works his evil deeds, and seems to be able to come and go whenever he pleases, in spite of locks, alarms, and watchmen. He was even seen to appear to fly over a fifteen foot tall electrified fence. In short, Ned's worst fears are realized when he is captured and held as ransom against Tom finishing his detector and using it to locate the Leopard and the stolen formula. Along the way, Tom & Ned are accosted by not one, but two bearded (-they are always bearded...) spies and anarchists. They suffer hardships and solve technical mysteries that threaten the project's completion. Ned is able to contact Tom with his pocket wireless, and send the secret code.

  5. Bailey, Henry C. 1926. Mr. Fortune's Trials. hardcover ed. New York: E. P. Dutton, Publishers. 248 pgs.
    Mr. Fortune solves another crime that contains a coded message. This time it's a transposition cipher.

  6. -----. 1929. The German Song. In Mr. Fortune Speaking. London, UK: Ward, Lock & Company. 320 pgs.
    A selection of short stories about the famous Mr. Fortune, sleuth, doctor, and all around cool guy. In "The German Song", Mr. Fortune finds the key to a cipher message. The message gives the location of some stolen property. The monoalphabetic substitution cipher uses a German song as its key.

  7. -----. 1932. The Mountain Meadow. In Case for Mr. Fortune. London, UK: Ward, Lock & Company. 308 pgs.
    Mr. Fortune is called in to the mysterious case of a millionaire who dies in London and whose teeth are found on the side of a mountain in Switzerland. The story contains a coded message using code words.

  8. -----. 1941. The Bishop's Crime. hardcover ed. New York: Doubleday Doran and Company. 308 pgs.
    Reggis Fortune investigates a series of murders of petty criminals and the attempted murder of a cathedral dean. Medieval documents and gold highlight the crimes. A code book is discussed but no examples of coded messages or cryptanalysis are given.

  9. Barker, Elsa. 1926. The Key in Michael. Red Book Magazine.
    In 1920, Dexter Drake solves a mixed-alphabet monoalphabetic substitution cipher that uses the numbers on a roulette wheel to mix the alphabet. The cipher message uncovers a puzzle in the form of a short poem that leads to a Russian family treasure. The story is very well written and plausible and there is a good discussion of Drake's thought processes as he unravels the mystery.

  10. Barry, Charles (pseudonym of Bryson, Charles). 1927. The Mouls House Mystery. hardcover ed. New York: E. P. Dutton. 240 pgs.
    A Scotland Yard Mystery. Contains a simple monoalphabetic substitution cipher.

  11. Barton, George. 1918. The Adventure of the Stolen Message. hardcover ed. Boston, MA: Page and Company. pgs.
    Bromley Barnes, Detective series. This story contains a null cipher. Langen gets the name wrong. HIs story is titled "Adventure of the Stolen Messenger." The original book is out of print and unavailable except for a Kindle ebook version in a collection titled "Bromley Barnes, Detective: A Collection of Mysteries (Twelve Bromley Barnes mysteries in one collection!) " published in 2010.

  12. Bax, Roger (pseudonym of Paul Winterton). 1949. Two if By Sea. hardcover ed. New York: Harper & Bros. pgs.
    Standard escape tale - a foreign correspondent has married a Russian woman and needs to smuggle her out of the Soviet Union. A null cipher is used in a radio broadcast. Originally published in Britain as "Come the Dawn." Later made into a movie by MGM.

  13. Bechtel, J. 1942. The Pig's Birthday. hardcover ed: The Moody press. 248 pgs.
    Contains a number cipher.

  14. Beeding, Francis. 1934. The One Sane Man. hardcover ed. Boston: Little Brown and Co. 258 pgs.
    Uses a code book message.

  15. -----. 1938. The Nine Waxed Faces. hardcover ed. New York: Burt and Co. 319 pgs.
    Contains an example of a book code. (Langen gives the publication date as 1936.)

  16. Bell, William Dixon. 1940. Trailed by G-Men. hardcover ed. New York: The World Publishing Company. 244 pgs.
    A classic FBI versus the mob story. Uses steganography (invisible ink).

  17. Bentley, John. 1945. Dark Disguise: A Thriller in War-Time England. hardcover. London: Hutchinson & Company. 176 pgs.
    Spy story about a German spy ring in England in the middle of WW2. Contains a cryptogram (215 letters; 43 five-letter groups) that is a transposition - by cipher group - of a simple mixed-alphabet monoalphabetic substitution cipher. The cipher gives away one of the spies, leading to the others.

  18. Birmingham, George A. 1931. The Hymn Tune Mystery. hardcover ed. Indianapolis: Bobbs-Merrill Co. 295 pgs.
    Uses an example of a musical cipher. Birmingham is a pseudonym of the Irish (Anglican) cleric Rev. James Owen Hannay.

  19. Blaine, John. 1947. The Rocket's Shadow. hardcover ed. New York: Grosset and Dunlap. 209 pgs.
    Rick Brant's father is trying to build a rocket to reach the moon. A large monetary prize has been offered for the first group able to do so and the Brant group is the leading contender. However, there are other groups in the chase and one of them is a criminal group that does everything it can to sabotage the Brant effort. The novel contains a book code.

  20. Blake, Nicholas (pseudonym of Cecil Day-Lewis). 1939. The Smiler with the Knife: A Nigel Strangeways Mystery. hardcover ed. New York: Harper Collins. pgs.
    A bad guy tries to instigate the Fascist takeover of Great Britain on the eve of World War II. There is an example of a book code in the novel.

  21. Bond, Raymond T. 1947. Famous Stories of Code and Cipher. Hardcover. New York: Rinehart and Company. 342 pgs.
    A collection of mystery stories all of which involve codes or ciphers. The book includes an excellent short introduction to cryptology. This original edition includes Dorothy Sayers' story "The Learned Adventure of the Dragon's Head" rather than "Code No. 2" by Edgar Wallace which is in the 1965 paperback edition.

  22. Boucher, Anthony. 1943. QL 696 .C9. Ellery Queen's Mystery Magazine.
    Disgraced cop Nick Noble decodes the Library of Congress call letters left by the murder victim and uncovers the killer. The Library of Congress call letters lead to the catgory that gives a hint to the identity of the murderer. A second cipher in a "typewriter code" where a plaintext letter is replaced with the one above it in the QWERTY keyboard pattern is also used for a spy ring of which the murderer is a member.

  23. -----. 1986. The Case of The Baker Street Irregulars. paperback. New York: Carroll & Graf Publishers, Inc. 252 pgs.
    The Baker Street Irregulars, a group of Holmes enthusiats, help solve the murder of a writer. Several clues turn up using three different ciphers. The first is a death threat using the Dancing Men cipher. The second is a book cipher variant that uses record albums instead of a book to give the location of an accomplice. And the third is an anagram, the dying man's last message and his epitaph. The book is a clever, involved story with a couple of good discussions on elementary cryptanalytic techniques.

  24. Browne, Barum (pseudonym of Hilary Aidan Saint George Saunders). 1931. The Devil and X.Y.Z. hardcover ed. Garden City, NY: The Crime Club (Doubleday). 288 pgs.
    Contains a cipher written in Greek characters. the cipher is tattooed in four lines onto the chests of three men. From "The Devil And X.Y.Z. - After an over-convivial dinner with his uncle, Harry Hansell speeds back to Oxford in order to beat the midnight curfew. As he drives through the narrow roads of the villages near the university, to his horror he suddenly sees a man in the road ahead of him - and, unable to stop in time, hits him. After bringing his car to a skidding halt, Hansell hurries back and examines the man by matchlight, trying to detect breathing or a pulse. He discovers two things - that the man has four rows of Greek letters tattooed across his chest, and that he is dead. Hansell goes through the man's pockets, looking for identification, but finds only a notebook filled with writing in French, plus two phrases in English referring to a local hotel, and a bathing-place. He then drives on to the nearest house, where he rouses the owner and gives a stumbling explanation of the situation. The man, a Mr Origen Blaithwaite, tells him there is no doctor nearby but that he has some medical knowledge and will come with him - after he gets dressed. After what Hansell considers this unnecessary delay, he and Blaithwaite return to the scene of the accident - but the body is gone... Waking the next morning to a splitting headache and uncertain recollections, Hansell tells his story to his roommate, Roderick Ffolliott. Longing to accept Ffolliott's comforting suggestion that the man was only stunned and left the scene under his own power, Hansell decides to act on the directions in the notebook and takes himself to the bathing-place known as the Parson's Pleasure, in case the man is there. He does not find him, but is stunned to observe another man with Greek letters tattooed on his chest... This chance encounter plunges Hansell and Ffolliott into a bizarre and terrifying adventure, as they learn of the key to a long-hidden fortune that was divided between three friends, Xavier, Yves and Zennor, comrades together in the hellish prison colony of Cayenne; and of another man, a defrocked priest known generally as "the Devil" by those who know him best, who seeks not the fortune itself, but something else darkly hinted at - that which is beside..."

  25. Brundidge, Harry T. 1954. 3-X The Man Behind the Gun. American Mercury Magazine, April 1954, 59-63.
    Mysterious coded messages appear at a New York newspaper threatening murder if the messages aren't printed. The messages demand the return of coded documents. All the messages are signed "3-X The Man Behind the Gun". After two murders, 3-X announces he has his documents and disappears.

  26. Bush, Christopher. 1929. The Perfect Murder Case. 314 ed. New York: The Crime Club (Doubleday). pgs.
    A murder case that leads detective Ludovic Travers nearly around the globe. Contains a null cipher.

  27. -----. 1931. Dead Man's Music. hardcover ed. New York: The Crime Club (Doubleday). 310 pgs.
    Ludovic Travers is given a sheet of music by a man who soon turns up dead. Deciphering the musical cipher leads to the killer.

  28. Carr, John Dickson. 1933. Hag's Nook. hardcover ed. New York: Harper Co. 222 pgs.
    On the night of his 25th birthday, the Starberth heir is found beneath a balcony with his neck broken. Dr. Gideon Fell must solve the murder to break the Starberth family curse. The cipher message uses beginning letters of certain words to form a message; these words are then replaced by equivalents and disguised as a poem.

  29. Chambers, Robert W. 1919. In Secret. hardcover. New York: Grosset and Dunlap. pgs.
    Evelyn Erith, member of the E.C.D, recovers a code book and decrypts a cryptogram in book code that uncovers a German spy ring during WW1.

  30. -----. 1934. Secret Service Operator 13. hardcover ed. New York: D. Appleton Century. 405 pgs.
    Actress Gail Loveless is initiated into the Union Secret Service during the American Civil War and is sent on a mission to spy on Confederate General Jeb Stuart. There she meets and falls in love with Confederate spy Jack Gaillard. Confusion ensues. Novel contains examples of secret inks and coded signals.

  31. Cheyney, Peter. 1943. The Stars are Dark. hardcover ed. New York: Dodd Mead, Company. 192 pgs.
    WW2 spy novel. Contains an example of a book code.

  32. -----. 1947. Dark Interlude. hardcover ed. New York: Dodd Mead & Company. 191 pgs.
    WW2 spy novel. Contains a book code.

  33. Christie, Agatha. 1933. The Four Suspects. In The Tuesday Club Murders. New York: Dodd, Mead & Company. 16 pgs.
    Miss Marple does it again, solving a book code message hidden in a letter and exposing an assassin. Flowers and a flower catalog provide the meaning of the code words.

  34. -----. 1951. They Came To Baghdad. hardcover ed. London: Collins Crime Club. 256 pgs.
    An adventure/spy story rather than a typical Christie whodonit. Tourist Victoria Jones discovers a dying British secret agent in her Baghdad hotel room and his dying words are a code she needs to crack to prevent the disruption of a peace conference. Also describes how a secret message is woven into a piece of cloth.

  35. Clason, Clyde B. 1939. Dragon's Cave. hardcover ed. New York: The Crime Club (Dodd, Mead & Co.). 260 pgs.
    From Publisher's Weekly: Historian and amateur sleuth Lucius Theocritus Westborough is called upon by the police, in the form of his longtime friend Chicago Lt. Johnny Mack, when Mack is stumped by the classic locked room murder of antique weapon collector Jonas Wright. Wright was found in his mansion's weapons room, the apparent victim of a deadly blow from a halberd, but there was no obvious way for his killer to escape the room while leaving the door and windows still bolted. The field of suspects include the dead man's three children, three men with designs on the daughter of the house, and a servant with a skeleton in her closet. The novel contains an example of a key monoalphabetic substitution cipher.

  36. Clift, Denison. 1944. The Spy in the Room. paperback ed. New York, NY: Metro Publications. 126 pgs.
    Story about a spy in Room 40. Contains a substitution cipher and a book code that must be solved to find the identity of the spy.

  37. Collins, Gilbert. 1932. Red Death. hardcover ed. New York: Henry Holt Company. 272 pgs.
    Theatrical shenanigans in China. The plot involves a secret society, knife throwing, a kidnapped heroine, a deserted monastery and murder. Novel contains a dictionary book code.

  38. -----. 1934. Death Meets the King's Messenger. hardcover ed. New York: The Crime Club (Doubleday). 308 pgs.
    The murder of the King's messenger on a sleepy English train leads to drug rings, abduction and takes the reader from Scotland Yard to the Surete. Novel contains an example of a monoalphabetic key substitution cipher.

  39. Connington, J. J. 1928. The Case with Nine Solutions. hardcover ed. Boston, MA: Little, Brown and Company. 280 pgs.
    Chief Detective Sir Clinton Driffield is called into a grisly double, triple, and then quadruple murder. One of the victims was the possible lover of one of the others. Two maids may have seen or heard too much are the other two victims. Is it murder/suicide? Is it a serial killer? The novel contains a couple of clues including coded newspaper messages and a simple substitution cipher.

  40. -----. 1933. Gold Brick Island. Hardcover. Boston: Little, Brown, and Company. 310 pgs.
    Colin Trent and Cyril Northfleet solve a clever transposition cipher that leads to smugglers and a fencing operation on a small island off the coast of Scotland. The text contains a very good description of how to cryptanalyze a complete rectangle transposition cipher.

  41. -----. 1940. The Four Defences. hardcover ed. Boston, MA: Little, Brown and Company. pgs.
    Connington's other detective, radio broadcaster Mark Brand (aka 'The Counselor'), leaps into a multiple murder case with all his brash and arrogant style. The plot is complex and Brand is very clever, even employing an analytical chemist to analyze soil samples. The novel contains a good example of a ralifence transposition cipher.

  42. Copplestone, Bennet. 1917. The Adventuress. hardcover ed. New York: Harper & Bros. unknown pgs.
    Can't find this book. Langen says it contains an example of usage of secret inks.

  43. Crofts, Freeman W. 1924. Inspector French's Greatest Case. hardcover ed. 252 pgs.
    In the Hatton Garden district of London, a jewelry store safe is open, the head clerk is dead, and all the jewels are gone. This is how Inspector Joseph French's first and greatest (well, maybe) case begins. A classic police procedural, a bit plodding at times, but good in the end. The novel contains a cipher message that uses stock exchange symbols in the message.

  44. -----. 1926. Inspector French and the Cheyne Mystery. hardcover ed. New York: Albert and Chaboni. 289 pgs.
    This is the second of the Inspector French novels. There are kidnappings, gangs of criminals, murder attempts, robberies, ciphers, and a treasure trove at the end of it all. There is plenty of action and Inspector French wraps things up nicely at the end. The novel contains a null cipher.

  45. Daly, Elizabeth. 1950. Death and Letters. hardcover ed. New York: Rinehart and Company. 217 pgs.
    The Maples is a secluded estate north of New York along the Hudson River. It is the home of the powerful Coldfield clan, which recently has several questions to answer. Why did Glendon Coldfield suddenly commit suicide? Why is his widow held prisoner in an upstairs bedroom? What clues are contained in a carefully ordered crossword puzzle? The answers lay hidden in letters from the past; letters whose message is danger, adultery, and hatred. The younger Mrs. Coldfield has only one chance to get a message to detective Henry Gamadge. She doesn't know what her in-laws have planned for her since her husband's death, and Gamadge must ferrit out the truth. The novel also contains a transposition cipher.

  46. Darlington, W. A. 1948. The "Baby" Cipher. Ellery Queen's Mystery Magazine, May 1948, 81 - 93.
    Originally written in 1939. The story uses a substitution cipher with Morse Code.

  47. Davis, Frederick C. 1942. Deep Lay The Dead. hardcover ed. Garden City, NY: The Crime Club (Doubleday, Doran). 304 pgs.
    In the countryside near Doylestown, PA, a doctor and a young mathematician, are brought together by the State Department during WW2 to create an indecipherable cipher for war use. Danger hovers, striking twice to prevent their success. Two of the doctor's previous assistants are murdered by one of the stranded house guests; there are suspects galore, for the work is going on in the midst of a strangely assorted snowbound houseparty. The novel contains a monoalphabetic substitution cipher that the doctor uses to test the skills of the mathematician. There are are also several discussions about cryptology (including mention of Herbert Yardley and the American Black Chamber) and cryptanalysis. Davis gets a few minor things wrong; for example, he says that the Playfair cipher is three hundred years old. (It was invented by Charles Wheatstone in 1854 and popularized by Lord Playfair.) As part of his research for the novel Davis must have read "The American Black Chamber" and correctly states that difficult ciphers must eliminate repetitions in the ciphertext, but he's obviously not heard of the Vernam cipher at this point.

  48. Davis, J. Frank. 1920. The Chinese Label. hardcover ed. Boston, MA: Little, Brown & Co. 320 pgs.
    U.S. Federal Treasury agent Julian Napier is sent to San Antonio, hot on the trail of diamond smugglers. The novel contains two instances where Napier uses a code book to decipher coded telegrams from his boss. The code book is not identified, and neither the original coded telegrams nor the process of the decryption are included.

  49. DeMille, James. 1871. The Cryptogram. hardcover ed. New York: Harper and Brothers Publishers. 267 pgs.
    A series of cryptograms (all in various monoalphabetic ciphers) uncovers the secrets of the life of the late Pemberton Pomeroy. Chapters VII and VIII describe the first set of cryptograms and provides a nice description of frequency analysis and decrypting monoalphabetic substitution ciphers. Chapter LXXVII gives the details of the final cryptogram solution. Most of the original cryptograms themselves are not shown.

  50. Dorling, Henry Taprell (pseudonym Taffrail). 1932. Cypher K. hardcover ed. London, UK: Hodder and Stoughton. 300 pgs.
    The latest cipher system is stolen from a Royal Navy cruiser. A retired naval officer works on the case. A Vigenere cipher message is included in the novel.

  51. Douglas, Lloyd C. 1929. Magnificent Obsession. Hardcover. New York: Houghton Mifflin Company. 330 pgs.
    The novel tells the story of Robert Merrick, a neurosurgeon who is given the secret journal of his mentor, Dr. Hudson. The journal is written in script in a railfence cipher, which is solved by the young neurosurgeon and sets him on his life's work. The novel is a classic of popular fiction from the first third of the twentieth century. The cipher is never named as a "railfence" and the entire cryptanalysis relies on an "Aha!" moment by Dr. Merrick. The system also uses the Greek letters mu and omega to indicate line breaks (omega) and where to split the railfence into two lines (mu) in the ciphered journal entries.

  52. -----. 1939. Dr. Hudson's Secret Journal. hardcover ed. New York: Houghton Mifflin. 472 pgs.
    This is the prequel to Magnificent Obsession and contains the same railfence cipher that is in the first novel.

  53. Doyle, Sir Arthur Conan. 1893. The Adventure of the "Gloria Scott". The Strand Magazine, 395-406.
    An old school friend of Holmes' calls him down to his country home to solve the mystery of his father's death. Trevor's father dies of dispair after being blackmailed. A note in which every third letter reveals a cipher message and which says 'The game is up, Hudson has told all. Fly for your life.' pushes the old man over the edge.

  54. -----. 1903. The Adventure of the Dancing Men. The Strand Magazine.
    Sherlock Holmes solves a case involving a series of mysterious messages - a bit late to save his client. The messages are in a simple substitution cipher, using stick figures as the cipher letters. One quirk is the use of "flags" to indicate word stops. The symbols are sometimes hard to distinguish, and there are some errors in the messages as documented in Kahn's "The Codebreakers" (page 797).

  55. -----. 1911. Adventure of the Red Circle. The Strand Magazine.
    An Italian couple in London use a simple cipher with lights to communicate across a street. In the cipher, one flash equals A, two flashes equals B, three flashes equals C, etc. Cumbersome but doable. It takes Holmes about ten seconds to figure it out.

  56. -----. 1914. The Valley of Fear: Part 1 The Tragedy of Birlstone. The Strand Magazine.
    Holmes solves a message in a book cipher that uses an almanac as its key. From just the single message plus a follow-up letter begging him to destroy the message, Holmes deduces the book used for the cipher and decrypts the message.

  57. Endicott, John S. 1932. Crime, Inc: A Mystery Novel. hardcover ed. New York: The Fiction League. 312 pgs.
    Supposedly gives an example of the use of code words. Not confirmed yet.

  58. England, George Allan. 1916. Pod, Bender, and Co. hardcover ed. New York: McBride Co. 388 pgs.
    While imprisoned, Pod and Bende use Morse code to communicate. Not really cryptograms here.

  59. Farjeon, Benjamin L. 1899. Samuel Boyd of Catchpole Square. hardcover ed. New York: Hutchinson and Co. 405 pgs.
    In the course of a murder and blackmail investigation we find a bit of steganography in the form of invisible ink, and a simple substitution cipher that reveals how to open a hollow cane containing a fortune in jewels.

  60. Freeman, R. Austin. 1927. The Blue Scarab. In The Dr. Thorndyke Omnibus. New York: Dodd, Mead & Co. 1-38 pgs.
    Dr. Thorndyke solves a cipher using Egyptian hieroglyphics phonetically as English words to uncover a cache of jewels.

  61. -----. 1927. The Puzzle Lock. In The Dr. Thorndyke Omnibus. New York: Dodd, Mead & Co. 1-35 pgs.
    Dr. Thorndyke must solve a chronogram to escape from a safe containing stolen goods and a corpse. The key to the 15 digit puzzle hinges on the Roman numerals hidden in a short poem inscribed on a bracelet worn by the victim.

  62. -----. 1973. The Moabite Cipher. In The Best Dr. Thorndyke Detective Stories. New York: Dover. 151-173 pgs.
    Dr. Thorndyke uncovers a hidden message underneath what appears to be a cipher (but isn't) to solve a robbery and capture the members of the burglary ring. What appears to be a substitution cipher turns out to be steganography (the message is written in invisible ink across the "cipher"). The story leads the reader to believe right up till the end that the cipher message is real.

  63. Froest, Frank. 1913. The Grell Mystery. hardcover ed. New York: Grosset and Dunlap Publishers. pgs.
    From Chapter XVII, ""Cipher!" he exclaimed. It was undoubtedly cipher, but whether a simple or abstruse one Foyle was in no position to judge. He had an elementary knowledge of the subject, but he had no intention of attempting to solve it by himself. There were always experts to whom appeal could be made. A successful detective, like a successful journalist, is a man who knows the value of specialists’Äîwho knows where to go for the information he wants. That meaningless jumble of letters could only be juggled into sense by an expert. Foyle nevertheless scrutinised them closely, more as a matter of habit than of reading anything from them. They were’Äî UJQW. BJNT. FJ. UJM. FJTV. UIYIQL. SK. DQUQZOKKEYJPK. ANUJ. M.Q. NG. N. AYUQNQIX. IGZ. ANUJ. SIO. IGZ. SMPPN. RT. 12845 HGZVFSF." The cipher uses a repeating numeric key that gives the count of how many letters down from the plaintext letter is the next ciphertext letter. See Chapter XXIX. (Book is also in Project Gutenberg)

  64. Futrelle, Jacques. 1905. The Problem of Cell 13. Boston American, 1905.
    The Thinking Machine accepts a challenge to break out of a prison cell within a week. The story was originally published in the Boston American newspaper and later (in 1907) in the story collection "The Thinking Machine". The story contains a bit of steganography and a simple transposition cipher.

  65. -----. 1909. Elusive Isabel. hardcover ed. Indianapolis, IN: Bobbs-Merrill. 273 pgs.
    The American Secret Service tries to break up a spy ring (really a plot by the Italian secret service). The novel contains messages in invisible ink (milk-based) and a cryptogram transmitted in Morse code (but the cryptogram is never deciphered in the novel), and also a mention of a "Secret Service code".

  66. Gaboriau, Emile. 1913. Caught in the Net. Hardcover. New York: Charles Scribner's Sons. 365 pgs.
    Three con men try to convince the Duke de Champdoce and his former lover, Diana the Countess of Mussidan, that one of them is their long lost illlegitimate son. Part of their "proof" is a cipher message - a message in French written backwards (so it's technically a transposition cipher) in which the Countess begs the Duke to see her son again. The cipher is read in "Caught in the Net" but the story doesn't conclude until the end of the sequel, "The Mystery of Champdoce" when the real son is found.

  67. Gardner, Erle Stanley. 1941. The Case of the Empty Tin. paperback ed. New York: Ballantine Books (Random House). 250 pgs.
    Perry Mason must solve a book code to get his client off.

  68. Gluck, Sinclair. 1924. The House of the Missing. hardcover ed. New York: A. L. Burt Company. 303 pgs.
    Contains a simple substitution cipher.

  69. -----. 1925. The Green Blot. hardcover ed. New York: Dodd Mead & Co. 294 pgs.
    Novel contains a null cipher.

  70. Gold, H. L. 1938. A Matter of Form. Astounding Science Fiction, December 1938, 9 - 50.
    Contains a cryptogram that uses a Polybius square. (Can not confirm)

  71. Gordon, Neil (pseudo. for A. G. MacDonell). 1933. The Shakespeare Murders. hardcover ed. New York: Henry Holt Co. 274 pgs.
    An old, dark mansion, homocide, a hidden family treasure, and a set of mysterious clues - all misquotations from Shakespeare - lead to a jolly good mystery. The novel includes a book code.

  72. Grant, Maxwell. 1934. Chain of Death. The Shadow Magazine, 8-96.
    The Shadow deals a blow to Crime Incorporated. The story contains a cryptogram using a monoalphabetic substitution cipher.

  73. -----. 1935. The Man From Scotland Yard. The Shadow Magazine, 6-99.
    The Shadow breaks up a smuggling ring. The novel contains a monoalphabetic substitution cipher.

  74. -----. 1936. The Ghost Murders. The Shadow Magazine #93, January 1, 1936.
    A murder, a stolen cigarette case, a coded message that leads to a hidden treasure. The Shadow must solve the coded message to stop the murderer from killing again. "Such ordinary items as letter frequency had not concerned The Shadow long. Fribbs had covered that ground. The Shadow, was looking for artifices; points that made this cryptogram different from ordinary ones. His first thought concerned spacings. They would be needed in this blocky code. Off to the extreme right were four blocks, one for each line, all of which were blank. They could mean spaces, particularly since a word might end on the first line; and certainly a word would mark the finish of the fourth line. Despite the fact that spaces might be unnecessary at the ends of lines, The Shadow held to this idea. He could see that this code was a simple one; almost crude, once its basic system was known. It had been fashioned in painstaking manner. It was not a code used in regular correspondence; it had been used to carry a single message." The cipher message is a simple monoalphabetic substitution with the ciphertext arranged in blocks of letters rather than divided by words or in five-letter groups.

  75. -----. 1939. Wizard of Crime. The Shadow Magazine #180, August 15, 1939.
    The Shadow takes on his most nefarious enemy - the Wizard of Crime! The story includes a simple transposition cipher and a "visual cipher" where the Shadow signals one of his henchmen with his eyes using a complicated cipher while both are tied up by the Wizard's minions.

  76. -----. 1946. The Blackest Mail. The Shadow Magazine #306, August, 1946.
    The Shadow once again comes up against Crime, Inc. The story contains a bit of steganography in the form of a hidden message written around the edges of a deck of cards. When the deck is shuffled the message disappears; when the deck is back in the right order, it reappears.

  77. Gribble, Leonard. 1932. The Stolen Statesman (aka The Stolen Home Secretary). hardcover ed. New York: Dodd Mead and Company. 264 pgs.
    The novel contains a dictionary book code. (Not confirmed.)

  78. Hagerty, Harry J. 1936. The Jasmine Trail. hardcover ed. New York: Lothrop, Lee & Shepard Company. 260 pgs.
    A detective fiction novelist tries to solve three murders, a millionaire, a young physician, and a famous surgeon, each killed in a different way. The story features a monoalphabetic substitution cipher. See Chapter 12, "The Cryptogram."

  79. Haggard, H. Rider. 1888. Colonel Quaritch, Q. V.: A Tale of Country Life. Hardcover. London: Longmans, Green and Company. 771 pgs.
    Colonel Quaritch deciphers the dying note of Sir James de la Molle. The note gives a hint to the location of the family treasure that old Sir James buried to save from Cromwell's men. The cipher is hidden in the knight's last message and is deciphered by taking the first letter of every fifth word in the note. The Colonel comes upon the solution purely by chance - he's looking at the note in a poor light without his glasses and focuses on the right letters. The discovery of the treasure enables the Colonel to marry his lady love.

  80. Halliday, Brett. 1954. Dead Man's Code. This Week Magazine, November 28, 1954, 9 - 20.
    Actually written by Halliday's wife - the mystery writer Helen McCloy ("Panic"). The first of several short stories that contain cryptograms. Detective Mike Shayne solves a murder.

  81. -----. 1955. Death Has Three Lives. hardcover ed. New York: Dodd Mead Company. 191 pgs.
    Mike Shayne must solve a cipher message in order to prevent the next in a series of murders - and he may be the victim! The cipher is a null type cipher where the plaintext message is hidden in the cryptogram as the last letter of each word in the message.

  82. Harris, Colver. 1938. Murder in Amber. hardcover ed. New York: Hillman Curl, Inc. 262 pgs.
    On board a trans-Pacific liner, a whack on the head kills one traveler, another dies suspiciously, and detective Fowler, has a nice problem. Smuggled jewels, man of mystery. a cryptogram, and comic lady enliven a rather pedestrian shipboard tale. Novel contains a book code.

  83. Heard, H. F. 1942. Reply Paid. hardcover ed. New York: The Vanguard Press. 282 pgs.
    Heard's second novel with the touchy, conceited Sidney Silchester, and his ponderous mentor, Myles Mycroft (A Taste for Honey) as they work together, not always amicably, on the race for an invaluable mineral, whose location is hidden in a death rewarding code. (from Kirkus Reviews)

  84. Henry, O. 1905. Calloway's Code. In Whirligigs. New York: Doubleday and Companypgs.
    To avoid censors during the Russo-Japanese War, reporter Calloway transmits his messages in code - a code that no one in the newspaper office knows. It takes a young reporter to find the key. The code depends on knowing the second half of several colloquial phrases, as in "foregone conclusion.

  85. Hume, Fergus. 1899. Hagar of the pawn-shop. hardcover ed. New York: F. M. Buckles and Company. 296 pgs.
    In Chapter II, "The First Customer and the Florentine Dante", newly ensconsed pawn shop operator Hagar decrypts a book code (that turns into a null cipher) and finds the "treasure" of his uncle's inheritance for Eustace Lorn, and her eventual love.

  86. -----. 1900. The Crimson Cryptogram. hardcover. New York: F. M. Buckles and Company. 255 pgs.
    A dying man scrawls a clue to his murderer in his own blood on his arm in a pigpen cipher. The clue (which also includes a drawing of a lizard) leads to an address book and the ultimate identity of the killer.

  87. -----. 1909. The Disappearing Eye. hardcover ed. New York: G. W. Dillingham Company. 312 pgs.
    Cyrus and Gertrude, two young lovers, must find out who killed Mrs. Caldershaw and stole her glass eye in order to clear themselves. Alas, the eye (and the cipher engraved on the back side) keeps on disappearing and reappearing all over southern England. The cipher is really a puzzle diagram that gives instructions on how to find a treasure in diamonds - Gertrude's inheritance.

  88. Jaediker, Kermit. 1947. Tall, Dark, and Dead. hardcover ed. New York: Mystery House. 256 pgs.
    A hard-boiled detective finds a possible blackmailer dead with a knife in her. Two more deaths follow. What is going on? The key may lie in a cryptogram. A good discussion of transposition ciphers is included.

  89. James, Montague Rhodes. 1904. The Treasure of Abbot Thomas. In The Ghost Stories of an Antiquary. New York: Longmans, Green and Company, Inc.pgs.
    Mr. Somerton uncovers a cryptogram under some paint on a set of stained-glass windows. Solving the transposition cipher he goes in search of Abbot Thomas' gold and is scared out of his wits.

  90. Johnston, William. 1919. The Apartment Next Door. hardcover ed. Boston: Little, Brown and Company. 301 pgs.
    Heroine Jane Strong helps decipher coded messages and break up a German spy ring that is communicating ship convoy information during World War I. The novel uses two types of cipher, a book code that uses an almanac as the book, and a null-type cipher that uses the length of the first word of an advertisement for dental cream to give the count for a message hidden in the ad. (e.g. REMEMBER is 8 letters long, so one extracts every eighth letter in the ad to recover the hidden message)

  91. -----. 1920. The Mystery in the Ritsmore. hardcover ed. Boston, MA: Little, Brown and Company. 293 pgs.
    Bob LeBaron and his new wife Betty's honeymoon at the swanky Hotel Ritsmore begins badly when a young woman, stabbed through the heart, falls out of their bedroom wardrobe. The novel uses a book code.

  92. -----. 1923. The Waddington Cipher. hardcover. New York: A. L. Burt Company. 300 pgs.
    Socialite, war hero, and bon vivant James Waddington Hurd learns of his ownership of the old family estate in upstate New York on his twenty-fifth birthday. Traveling there he becomes embroiled in working out the terms of his great-grandfather's forty-year-old will, which will disinherit his great-uncles in eight days if they don't reconcile. He also becomes interested in finding the "Waddington jewels", a treasure hidden by his great-grandfather and hinted at in the will, but as yet undiscovered. The cipher in the title is a poem in the will that points to three gold chain-links that give instructions for finding the jewels.

  93. Jones, Charles R. 1931. The Van Norton Murders. hardcover ed. New York: Macauley Company. 301 pgs.
    The novel contains a null cipher (no confirmation yet).

  94. Kauffman, Reginald Wright. 1929. Barbary Bo: A Story of the Barbary Pirates. hardcover ed. New York: Hampton Publishing Company. 261 pgs.
    An adventure tale of the Barbary pirates. The story contains a message written in invisible ink.

  95. Keeler, Harry S. 1929. The Spectacles of Mr. Cagliostro. hardcover ed. New York: E. P. Hutton, Publishers. 278 pgs.
    Jerome Middleton is in the middle of a plot to defraud him of his $10 milliion inheritance and kill him in the process. Middleton is committed to an insane asylum (by the plotters) for being paranoid. So here's his problem. He is committed for being paranoid and he's trying to convince the doctors that he's sane AND that there really are people plotting against him. Oh, and to get his $10 million, Middleton must wear a pair of blue goggles (the spectacles) for a year, just so he can read an invisible ink message that is only visible through the blue lenses.

  96. -----. 1930. Riddle of the Yellow Zuri. hardcover ed. New York: E. P. Dutton, Publishers. 294 pgs.
    Jake Jenningw is willing to pay a small fortune for the return of his wife's Yellow Zuri (an Indian Tiger Snake). Cliff Carson is eager to help. And that's where the mystery begins. Story contains a null cipher.

  97. -----. 1938. Finger, Finger! hardcover ed. New York: E. P. Dutton, Publishers. 392 pgs.
    Chinese and Japanese gangs are struggling for control in America. The thirteenth coin of Confucius will decide the winner. However, it has been stolen and is now sewn into an overcoat. But which overcoat? There seem to be a lot of them in this novel. Also involved in the labyrinthine plot are missing fingers-two of them-a literary con artist and his long-winded employee, and a host of other odd characters.The novel contains a good example of a Caesar monoalphabetic substitution cipher.

  98. Keene, Carolyn. 1939. Clue of the Tapping Heels. hardcover ed. Nancy Drew #16. New York: Grosset and Dunlap, Publishers. 192 pgs.
    Nancy Drew is drawn into the mystery of strange tapping in the house of Miss Carter, a retired actress and cat fancier. The tapping turns out to be in Morse code and Nancy must discover how the tapper gets into the securely locked house. No real cryptograms here, but Nancy must decipher the Morse code and figure out the meaning of the messages.

  99. Kendrick, Bayard. 1941. The Odor of Violets. hardcover ed. Boston, MA: Little, Brown and Company. 307 pgs.
    Captain Duncan Maclain is a private detective (and in the original story a government agent) who is called in - by the mother - to help break up a May-December romance between a 17-year old girl and a 50-year old actor. It turns out that the girls father is working on a top-secret government project that the Nazis would love to get their hands on. A good combination of a puzzle mystery and a spy story. The story contains a null cipher - and a dog.

  100. Keystone, Oliver. 1948. Major Crime. hardcover ed. Prize Mystery Novels #30. New York: Phoenix Press. 253 pgs.
    A mystery set in post-war Germany. Contains an excellent example of a phonetic cipher.

  101. King, C. Daly. 1933. Obelists at Sea. hardcover ed. New York: Afred A. Knopf. 326 pgs.
    This was the first of King’Äôs novels and the first of his ’ÄòObelist’Äô trilogy, all of which combine murder, travel and psychiatry. It is set on a luxury transatlantic liner traveling from New York to Cherbourg. One evening lightning shorts out the generator and the first class smoking lounge is plunged into darkness. While the lights are out a shot is fired and when they return, self-made millionaire Victor Smith is dead, his female companion’Äôs pearl necklace has been stolen and another man, a shady lawyer, is literally holding a smoking gun. But nothing is what it seems. Indeed it turns out that Smith has not one but two bullets inside him, one immediately on top of the other, even though only one shot was heard ’Äì and neither has been fired from the lawyer's gun. The twist here is that there is not one detective but four - four psychologists, each of whom is pretty incoompetent as a detective. The novel contains a transposition cipher.

  102. Kipling, Rudyard. 1888. The Man Who Would Be King. In The Phantom Rickshaw and other Eerie Tales. Allahabad: A. H. Wheeler and Company. 352 pgs.
    From the novel: "The letter?" Oh! The letter! Keep looking at me between the eyes, please. It was a string-talk letter, that we’Äôd learned the way of it from a blind beggar in the Punjab. - I remember that there had once come to the office a blind man with a knotted twig and a piece of string which he wound round the twig according to some cypher of his own. He could, after the lapse of days or hours, repeat the sentence which he had reeled up. He had reduced the alphabet to eleven primitive sounds; and tried to teach me his method, but failed."

  103. Knox, Ronald A. 1925. The Viaduct Murder. hardcover ed. London: Methuen & Co. Ltd. 252 pgs.
    Four friends (a clergyman, a retired don, a former military-intellegence officer, and a ne'er-do-well) meet at a local hostelry for a vacation of golf. One of our heros slices his drive over the trees and, while searching a railroad viaduct, finds the ball as well as a dead body. A few clues around the scene of the crime (e.g. the victim's hat is 15 feet from his body) and on the body lead the four to suspect foul play. A classic British mystery with four bumbling 'detectives'. and a solution that they should trip over, but don't. The novel contains a book code message.

  104. Koehler, Robert P. 1948. The Blue Parakeet Murders. hardcover ed. New York: Phoenix Press. 252 pgs.
    The novel contains a book code.

  105. Lamb, George. 1933. Wanted, A Corpse. The Cryptogram, February 1933, 1-3.
    A story within a story within a story, all in 2 and a half pages! The story contains a short monoalphabetic substitution cipher.

  106. Le Queux, William. 1901. Her Majesty's Minister. hardcover ed. London: Houghton. 402 pgs.
    Adventures of an English Ambassador. There are no real cryptograms in the novel, but it gives a good representation of using a code book to encipher and decipher code messages.

  107. -----. 1914. The Four Faces. hardcover ed. New York: Brentano's. 345 pgs.
    Our hero, Michael Berrington, is tracking down a gang of very sophisticated, very high-class thieves who rob the mansions of upper crust English genry. There are robberies, murders, mind control, hypnosis, coded messages (using a substitution cipher) in newspapers, and even a romance. It's got it all. The cryptograms use a progressive key substitution where the first sutstitution uses a standard alphabet starting at B, the next substitution uses the alphabet starting at D, the next starting at F, etc. repeating. There is also a message using a word code.

  108. -----. 1919. Cipher Six. hardcover. London: Hodder and Stoughton, Ltd. 320 pgs.
    Major Nicholas Nicholson probes the mysterious death 'by natural causes' of Ruby Hollis. The perpetrators, a couple who run a crime syndicate, use a book cipher. The book is Samuel Johnson's "Rasselas: Prince of Abissinia". The cipher messages are transmitted in the personals column of the newspaper using some number of sixes before a period to indicate the page, sixes before a colon to indicate a line, sixes before a semi-colon to indicate a word on the line, and sixes before a comma to indicate which letter in the word. There is also a bit of steganography when one of the victims uses lemon juice to hide a declaration of innocence in an otherwise incriminiating letter.

  109. -----. 1928. The Crime Code. hardcover ed. New York: Macauley. 314 pgs.
    Contains a cipher that uses musical notes to convey the message. An innocent man gets involved with a gang of society crooks.

  110. LeBlanc, Maurice. 1910. The Hollow Needle. hardcover ed. New York: Doubleday Page Company. 168 pgs.
    The treasures of the Kings of France are in The Hollow Needle, and Aursene Lupin must decrypt a monoalphabetic substitution cipher which leads to a puzzle to find the treasure. His only problem is a young detective racing to find the solution as well.

  111. Lee, Babs. 1945. Passport to Oblivion. hardcover ed. New York: Charles Scribners Sons. 233 pgs.
    With war-time Lisbon serving as the background for the backstairs activities of Nazi sympathizers and collaborators the plot revolves around two murders in and out of cafe society. Argue Steele, a private detective, and Ellen, his USO girl, solve the murders and prevent a pro-fascist plot. A coded message using a roulette wheel as the key is central to the plot.

  112. Lee, Thorne. 1949. The Monster of Lazy Hook. hardcover ed. New York: Duell, Sloan, and Pearce. 221 pgs.
    From the book jacket: "In swift succession, three men ’Äî all leading citizens of the little California coastal town of Lazy Hook ’Äî vanished without a trace. All three had been connected with the late Spencer Van Dyke, eccentric millionaire, who though he died of natural causes had managed to surround his death with many-sided mystery. What had Spencer Van Dyke done with the huge sum of cash withdrawn from his bank shortly before his death? What was the meaning of the fantastic poem he caused to be engraved on his marble gravestone? Why had he bequeathed the vast and dilapidated Van Dyke mansion to his hermit butler? Had he come from beyond the grave to spirit away Lyman Hobbs, his undertaker, Henri Picard, his lawyer, and Peter Ramsey, the local editor? These were the questions that were thrust at the strange pair of detectives who set out to solve the apparently insoluble. The two, handicapped Julian Renard, mostly brains, and Robert Bannister, mostly brawn, found themselves in a peculiar and dangerous setup, and only their assorted but well-balanced gifts, together with a certain bit of luck, brought them through alive and entitled to the rewards they had been promised." The novel contains a cipher message using a null cipher.

  113. Lincoln, Joseph C., and Freeman Lincoln. 1939. The Ownley Inn. hardcover ed. New York: Coward-McCann, Inc. 316 pgs.
    (Partly from the Chicago Tribune) The novel is an intriguing story about the theft of a valuable first edition from a college library. The scene shifts to an island off Cape Cod, where the inn is located. There's plenty of mystery, considerable action, much quaint conversation, a romance, and some slugging, but only one death’Äîapparently accidental. There's also a null cipher that leads to the solution.

  114. Lincoln, Natalie S. 1918. The Three Strings. hardcover ed. New York: D Appleton and Company. 321 pgs.
    A mysterious man is found dead in the Preston's home. No one knows how he got there and no one knows who he is. A suspiciion of a German spy ring evolves. The novel contains a cipher that uses a series of chess end game diagrams. The alphabet is embedded in the top half of the board and the letters are read off the white pieces in the order of their power King, Queen, etc.

  115. -----. 1924. The Thirteenth Letter. hardcover ed. New York: D. Appleton and Company. 289 pgs.
    A murder mystery that uses the postage stamps on a series of letters to create a cipher message.

  116. -----. 1926. The Blue Car Mystery. hardcover ed. New York: A. L. Burt and Company. 314 pgs.
    Uses a pigpen cipher (also called the angle cipher).

  117. Locke, Clinton W. 1931. Who Opened the Safe? (The Perry Pierce Mystery Stories for Boys #2). hardcover ed. New York: M. A. Donohue and Company. 216 pgs.
    Perry and his friends help pretty Jessica Kenwood and her grandfather look for his inheritance - a safe containing a treasure. The clue is a grille cipher message (pages 161 - 162). Unfortunately, there are others looking for the safe as well.

  118. Locke, Gladys E. 1923. The Scarlet Macaw. hardcover ed. Boston, MA: L. C. Page & Company. 350 pgs.
    When Genevera Tressady is poisoned in her locked study the mystery begins. Hal Inderwick rushes to the side of his soon to be love, Jasmine Holland and jumps into the deep end of the mystery. A book code that uses Macbeth as its text provides the final clue to the murderer.

  119. Lockmiller, Frank. 1947. The Case of the Cryptic Will. Fifty Crosswords Magazine, 1947.
    Langen states that this short story contains a transposition cipher. (Neither magazine nor story found. Author is believed to be Frank Ulrey Lockmiller, 1910 - ?.)

  120. MacLeod, Adam Gordon. 1926. The Cathra Mystery. hardcover ed. New York: The Dial Press. 302 pgs.
    A murder in the North Country sends Scotland Yard on the hunt. The novel contains a null cipher message.

  121. Martinek, Frank V. 1940. Don Winslow and the Scorpion's Stronghold. hardcover ed. Racine, WI: Whitman Publishing Company. 248 pgs.
    A novel that is based on the newspaper comic strip created by retired Lieutenant Commander Frank V. Martinek. Navy officer Don Winslow battles a foreign sabotage ring led by a mysterious figure calling himself ’ÄúThe Scorpion’Äù, who barks his orders to his agents through a giant TV screen in their underwater hideout. As The Scorpion unfolds plan after plan to stop the Navy from constructing a new base Winslow finds himself a hair away from certain death at the end of each chapter. The novel contains a railfence cipher message.

  122. Mason, F. van Wyck. 1930. Seeds of murder. hardcover ed: Published for the Crime Club, Inc. by Doubleday, Doran & Co., Inc. 302 pgs.
    A number of gypsy signs are used as a cipher message.

  123. -----. 1932. The Fort Terror Murders. hardcover ed. New York: Doubleday. 309 pgs.
    Captain Hugh North of Army intelligence is posted to the Philippines. While at a dinner party in the commanding officer's house a story about a treasure is told and in impromptu treasure hunt is organized. While on the hunt one man is stabbed to death and another is missing. North figures that the treasure is a clue to the murder and so begins to search for both treasure and the murderer. His only clues are a couple of rosaries with the wrong number of beads. The story includes a Mirabeau cipher. A Mirabeau is a monoalphabetic sustitution cipher that arranges the keyed letters of the alphabet in five groups of five letters each. Each group is also numbered, so that the cipher text for each letter is a two number sequence (group, index of letter within group).

  124. -----. 1932. The Branded Spy Murders. hardcover ed. New York: Grosset and Dunlap Publishers. 301 pgs.
    Captain Hugh North is sent to Hawaii to try to catch a Russian spy. Instead he stumbles headlong into political intrigue between the Japanese and the United States (it is 1932) and spies everywhere. A dead woman floating near a dock with a suspicious tattoo and a lovely Russian who might just be the spy he's looking for complicate the search. The novel contains a Playfair cipher.

  125. -----. 1935. The Washington Legation Murders. hardcover ed. New York: Doubleday and Company. 300 pgs.
    Captain Hugh North and his British intelligence buddy scoursWashington for a spy known as the "Guardsman" who is stealing military secrets and blueprints for weaponry in the era just after Hitler comes ot power and Japan invades China. Several messages using secret inks are used.

  126. -----. 1935. The Budapest Parade Murders. hardcover ed. New York: Grosset and Dunlap. 308 pgs.
    Captain Hugh North looks for spies in Budapest. Secret ink messages are involved in the plot.

  127. -----. 1937. The Hong Knog Airbase Murders. hardcover ed. New York: Grosset and Dunlap. 339 pgs.
    Captain Hugh North (G-2) is sent to Hong Kong to prevent foreign agents (in 1937 they're all Japanese and German) from stealing a secret airplane fuel formula developed by Trans-Pacific Airways. Of course there's a murder (or two) and several clues including some messages that use secret ink.

  128. -----. 1938. The Cairo Garter Murders. hardcover ed. New York: Grosset and Dunlap. 305 pgs.
    Captain Hugh North of G-2 Army Intelligence is called to Cairo to help a British agent, Major Bruce Kilgour, on a case involving a series of murders in Cairo. The killer leaves a red-and-black women's garter on the left arm of each victim. The murders are somehow linked a group supplying weapons to Arab nationalists. Solution of the crimes is aided by the ability of North and his allies to decode messages, including a simple monoalphabetic substitution cipher. Another message is written in hieroglyphics.

  129. -----. 1939. The Singapore Exile Murders. hardcover ed. New York: Grosset and Dunlap. 300 pgs.
    Captain (and later Major) Hugh North is sent to Singapore at the very beginning of WW2 to find a man who has developed a new formula for a lightweight but strong alloy that could be vital to the U.S. war effort. Messages hidden with secret ink give clues. The feeling in Singapore is given by the following quote: "Portents of increasing tension hung still heavier in the air. Police in silent and watchful squads of four stalked along streets eddying with a restless, polyglot crowd. On the horizon in the direction of Tanglin and the Naval Base, searchlights played, raking the hot, starry sky with tenuous, silver fingers. Newsboys, hoarse with excitement, rushed about waving extras printed in English, Chinese, Malay and Sanskrit. Before glaring clusters of naked electric bulbs illuminating native shops, dark-faced men argued and gesticulated. Lights glowed, too, in the official offices in the Fullerton building, and quantities of chit coolies ran errands as if the devil were after them. A lively disquiet filled North. What the devil could be going on at the other end of the cables and the radio stations? Of only one thing was he sure: The breath of war beat hot on Singapore."

  130. -----. 1941. The Rio Casino Intrigue. hardcover ed. New York: Grosset and Dunlap. pgs.
    Set in Brazil after the fall of France, but before Pearl Harbor, this Hugh North adventure takes the G-2 Major from Sao Paulo to Rio de Janeiro investigating Nazi sympathizers in an American company. When the president of the company is murdered at a party filled with Axis sympathizers, North is hot on the trail, trying to find the murderer and to stop a ship loaded with supplies for the Nazis. North solves a crossword puzzle cipher message as part of the novel.

  131. McCloy, Helen. 1943. The Goblin Market. hardcover ed. New York: William Morrow. 249 pgs.
    When an American wire service reporter is murdered on the island of Santa Teresa off the coast of Brazil during WW2, our hero must solve the murder. Down-on-his-luck former journalist Philip Stark is hired by the wire service to find the murderer. Nazi activity, submarines attacking transport ships, and secret codes (using a journalistic short-hand code in telegram messages, "cablese") provide one problem after another that must be solved before the murderer is revealed.

  132. McNeile, H. C. 1934. Bulldog Drummond at Bay. hardcover ed. New York: Doubleday, Doran Co. 254 pgs.
    Bulldog Drummond is relaxing in his Scottish retreat when a rock with a coded message attached smashes his window. The rock was thrown by an inventor who is being kidnapped for the secret to his new airplane design.

  133. Mearson, Lyon. 1924. The Whisper on the Stair. hardcover ed. New York: Macauley Company. 301 pgs.
    The novel contains a concealment cipher (a form of steganography).

  134. Morrison, Arthur. 1903. The Red Triangle: being some further chronicles of Martin Hewitt, Investigator. hardcover ed. London, UK: L. C. Page, Company. 304 pgs.
    Featuring his famous detective Martin Hewitt, this collection of Morrison's short stories contains two that have references to codes and ciphers in them. In "The Adventure of the Channel Marsh", Hewitt solves a transposition cipher that uses a knight's tour as the route through the cryptograms table. While there are no cryptograms in "The Case of The Admiralty Code" the entire story revolves around the theft (and recovery) of the British Admiraltiy's code book.

  135. Newman, Bernard. 1940. Papa Pontivy and the Maginot Murder. hardcover ed. New York: Henry Holt Company. 328 pgs.
    A mutilated corpse in a Maginot Line ammunition room leads our here to Brittany and an archeological expedition on the Breton coast. Enlisting the aid of an English actor-spy, and with Papa Pontivy using his instincts to the limit, they ferret out ciphers, identities, and organization and solve the murder and catch (sort of) the murderer. All the ciphers in the book are simple substitution ciphers.

  136. O'Brien, Howard V. 1928. Four and Twenty Blackbirds. hardcover ed. New York: A. L. Burt Company. 251 pgs.
    Novel contains a monoalphabetic substitution cipher.

  137. O'Higgins, Harvey. 1915. The Blackmailers. In The Adventures of Detective Barney. New York: D. Appleton-Century Company, Inc.pgs.
    Young Barney Cook starts his career as a detective by grabbing the pocket dictionary that is the key to a blackmail ring's dictionary code. His boss uses the dictionary to decrypt several messages, leading to the blackmailer's apprehension.

  138. Ostrander, Isabel. 1918. Suspense. hardcover ed. New York: Grosset and Dunlap. 352 pgs.
    Poor Miss Page is hired as a seamstress for a rich woman and gets involved in smuggling and other nefarious doings. A steganographic word code is used in the novel. For example, one message reads: "Your letter received. Send me ten of the thousand circulars quoting sheep prices for March. Home market good this week for forty or fifty and even more points rise if my brokers handled the situation properly." Reading every third word reveals the hidden message.

  139. -----. 1919. The Twenty-Six Clues. hardcover ed. New York: W.J. Watt and Company. 277 pgs.
    Calvin Norwood, a high society financier is hosting a dinner party. Mr. Norwood has a private museum of crime artifacts that fascinates his dinner guests, especially, scientific detective Wade Terhune and retired NYC detective Timothy McCarty. A good time is had by all until someone discovers Norwood’Äôs neighbor Evelyn Jarvis dead under one of the displays. Terhune’Äôs science and deduction is pitted against McCarty’Äôs dogged procedural plodding to find the murderer. McCarty comes through albeit using some of Terhune's own techniques. McCarty finds an accusatory message on a seemingly blank sheet of paper. (Not secret ink, but an accidental steganographic message composed on a typewriter with no ribbon.)

  140. -----. 1925. The Black Joker. hardcover ed. New York: A. L. Burt Company. 361 pgs.
    Intrigue on a Mediterranean steamship.The plot involves a girl embroiled in a shipboard mystery. She has at least two gangs after her and possibly the police, as her father may, or may not, have been a master criminal. She doesn't know whom to trust. There is, of course, a mysterious and sinister deck of cards involved. A keyphrase monoalphabetic substitution cipher is used.

  141. Otis, James. 1891. The Braganza Diamond. hardcover ed. Philadelphia, PA: Penn Publishing Company. 383 pgs.
    Plot unknown. Juvenile fiction involving pirates and cipher messages.

  142. Packard, Frank L. 1918. The Wire Devils. hardcover ed. New York: A. L. Burt Company Publishers. 318 pgs.
    Harry Maul, aka "The Hawk" has just gotten out of Sing Sing prison and he takes up his larcenous ways again. This time the Hawk is trailing a gang of railway thieves, staying one step ahead of them and stealing their loot before they can get at it. The Hawk can stay ahead of the crooks because he's figured out the key to their cipher system. They're using a transposition cipher with nulls added to the cipher text and transmitting their messages over the railway line's telegraph wires. The Hawk decrypts several cryptograms during the course of the novel. There is a nice twist at the end.

  143. -----. 1922. Doors of the Night. hardcover ed. New York: A. L. Burt Company, Publishers. 248 pgs.
    Billy Kane, confidential secretary to multi-millionaire David Ellsworth is framed for murder. Billy runs and must find the real murderer before he's caught. Luckily for Billy he is the spitting image of a small-time crook - the Rat - and so descends into New York's underworld to save himself and find the murderer. A simple substitution cipher is used for a couple of messages in the novel. Each word is reversed and then shifted just one place in the standard alphabet.

  144. Parker, Maude. 1953. Invisible Red. hardcover ed. New York: Rinehart and Company. 247 pgs.
    Anne Douglass, long residing behind the Iron Curtain is dispatched from Moscow to contact a scientist with a dangerous chemical formula. John Pickering, attorney and government agent falls for Anne, but doesn't trust her. Invisible ink messages on the backs of a pack of playing cards provide a clue.

  145. Parker, Robert B. 1950. Ticket to Oblivion. hardcover ed. New York: Rinehart and Company. 247 pgs.
    American spy, Peter Morrow, is dispatched to Paris to break up a Soviet plot to run terrorist trains from Hungary into France. On the way he meets and falls for Kitty Blake, whose parents are being held by the Soviets in Bucharest. Morrow saves the parents, and catches the evil Soviet angents in a thrilling chase through a train. A transposition cipher is used in the novel.

  146. Propper, Milton. 1934. The Family Burial Murders. New York: Harper and Sons. pgs.
    Tommy Rankin, homicide investigator for the Philadelphia police, is called in on a strange case. An elderly dowager has died a peaceful and natural death and is being buried. Unfortunately, one of her nephew's also ends up in the coffin, having died most unnaturally. A cipher that uses a telephone keypad to create messages is described and used in the novel.

  147. Queen, Ellery. 1938. The Four of Hearts. hardcover ed. New York: Fred Stokes Company. 250 pgs.
    Ellery Queen is having a go at Hollywodd. He's working for studio head Jacques Butcher on a biopic about two stars John Royle and Blythe Stuart, whose on-again-off-again romance and long simmering feud are Hollywood legend. When John and Blythe decide to (re)marry and are then murdered in their honeymoon plane (poison; nobody else in the plane), Queen steps in to investigate. It turns out that Blythe had been receiving a series of bizarre letters, each containing a playing card. And now her daughter Bonnie is also receiving letters and cards. Queen has to figure out the cryptic message hidden in the cards to solve the murders. The playing cards form a coded message that Queen solves in the end.

  148. Reeve, Arthur. 1912. The Germ of Death. In The Poisoned Pen. New York: Harper and Row. 398 pgs.
    Craig Kennedy is on the hunt for Soviet spies who are poisoning some Russian refugees in New York. A checkerboard cipher (a simple substitution similar to a Polybius square) is used to communicate between the spies and Kennedy easily decrypts an intercepted message.

  149. -----. 1917. The Treasure Train. hardcover ed. New York: Harper and Row. 334 pgs.
    A collection of Craig Kennedy short stories, several of which contain cryptograms, including The Mystic Poisoner, which contains a substitution cipher.

  150. -----. 1917. The Mystic Poisoner. In The Treasure Train. New York: Harper and Row. 334 pgs.
    Craig Kennedy is drawn into a mysterious murder. The victim is seemingly paralyzed but is able to write a mysterious message before he expires. A digraphic cipher is used with a two letter key (one letter to start the first letter of the plaintext alphabet across the columns, and one to start the plaintext letters down the rows of the 27 x 27 grid that contains the ciphertext pairs.

  151. -----. 1917. The Adventuress. hardcover ed. New York: Harper Brothers. 342 pgs.
    Who killed Marshall Maddox? That is the question Craig Kennedy must answer. The mystery revolves around the death of the American munitions manufacturer. Was it a crime of passion? Paquita, the adventuress is interested in the Maddox brothers. Was it to steal the secrets of the new weapon, the teleautomaton? It appears that only Criag Kennedy and his scientific detection can figure this one out. A checkerboard cipher (like a Polybius square) is used in the novel.

  152. Reynolds, Baillie. 1923. The Lost Discovery. hardcover ed. New York: Doran and Company. 320 pgs.
    A man is murdered in his library for the secret to an ancient treasure. A monoalphabetic substitution cipher message holds the key.

  153. Rhode, John. 1935. Hendon's First Case. hardcover ed. New York: Dodd, Mead and Company Publishers. 278 pgs.
    Jimmy Waghorn, an indifferent Cambridge student, enrolls in the new Hendon Police College and is given a chance to solve a break-in. The break-in turns into a murder and Jimmie is up to his eyeballs in problems. Dr. Priestly comes in at the end, and gives a good discourse on solving ciphers. Jimmy proceeds to solve the cipher message and solve the crimes. The cipher uses the signature at the bottom of the message as a key for a homophonic, polygraphic cipher The signature is 25 letters long, forming a 13 x 12 rectangle where the letters of the alphabet are continuously written one per cell, starting with 'a' to fill in the table. A plaintext letter is mapped to two ciphertext letters. Because multiple copies of the alphabet are used to fill the table, there are either six or seven plaintext letters in the table and any of the row/column headers may be the ciphertext for a particular plaintext letter. For example, a plaintext 'e' can be encrypted as any of AT, NN, RH, EE, BF, GA, or NL.

  154. Rohmer, Sax. 1927. Moon of Madness. hardcover ed. New York: McBride Company. pgs.
    Fu Manchu is out there being bad again. Novel contains a simiple monoalphabetic substitution cipher.

  155. Russell, Charllotte M. 1942. The Message of the Mute Dog. hardcover ed. New York: Doubleday Publishers. 155 pgs.
    During World War II, in Rockport Illinois (a thinly disguised Rock Island, IL), amateur sleuth Jane Amanda Edwards leaps into the mystery surrounding an attempted sabotage and the subsequent the murder of the owner of the local defense plant. It's important that she solve the murder because her brother Arthur is one of the suspects! Jane finds a cipher message in a porcelain dog and must decipher it to uncover the saboteurs. The cipher is a monoalphabetic substitution cipher that uses the manufacturer's information on the bottom of the dog as the keyword and uses numbers to represent the vowels and fill out the alphabet.

  156. Scott, Mansfield. 1927. The Phantom Passenger. hardcover ed. New York: Edward J. Clode. 313 pgs.
    Novel contains a word code message.

  157. Seaman, Augusta H. 1919. The Slipper Point Mystery. hardcover ed. New York: The Century Company. 221 pgs.
    Doris, Sally, and little Genevieve are exploring around Slipper Point when they discover a cave. Inside the cave they find an old tin box and in the box is a scrap of paper with a peculiar alphabet table written on it. Further in the cave is what appears to be an old cedar door that conceals a tunnel that leads to Miss Camilla's basement! An old mysterious message found in a notebook combined with the cipher key from the tin box yields the solution to a fifty year old mystery! The cipher is a Polybius square with a key sequence.

  158. -----. 1930. The Charlemonte Crest: A Novel of Modern Haiti. hardcover ed. Garden City, NY: Doubleday Doran. 252 pgs.
    An historical mystery novel set in Haiti. The story shifts between modern-day Haiti and the adventures of two American families and the turbulent time in the 1820s as Haiti fought for its independencd from France. The novel contains a simple monoalphabetic substitution cipher.

  159. -----. 1949. The Vanishing Octant Mystery. hardcover ed. Garden City, NY: Doubleday Company. 206 pgs.
    A mystery based on a navigator's octant. Contains a simple monoalphabetic substitution cipher message.

  160. Selkirk, Jane. 1942. Clue of the Cipher Key. hardcover ed. New York: Dodd Mead and Company. 291 pgs.
    The setting is a Georgia town. An architect with a mysterious past loses his suitcase containing his latest building plans that he hopes will revitalize his career. On top of this, his home is burglarized. A group of local kids takes on the job of solving the mystery. But eventually, it is the children who solve the puzzle. There is a simple monoalphabetic substitution cipher in the novel.

  161. -----. 1949. Mystery of Horseshoe Caves. hardcover ed. New York: Dodd, Mead and Company. 209 pgs.
    The novel contains a simple monoalphabetic substitution cipher message. No other plot details are available.

  162. Sherwood, John. 1949. Dr. Bruderstein Vanishes. hardcover ed. Garden City, NY: Doubleday for The Crime Club. 190 pgs.
    Mr. Blessington, a staid and settled Englishman, is sent on a financial mission to the English sector of post World War II Germany. He is accidentally involved in a spy ring, gold smuggling and chasing a secret, evil Nazi underground. Blessington chases clues all around war-torn Germany, including a mysterious message written in a null cipher. At the end Dr. Bruderstein is found alive and the gold is recovered almost intact.

  163. Shiel, M. P. 1895. The S. S. In Prince Zaleski. Boston, MA: Roberts Brothers. 100 pgs.
    Prince Zaleski is forced to leave his stately (if dark) estate to try to solve a mysterious series of apparent suicides all across Europe. They start with the death of an elderly wealthy man of science, Professor Dr. Schleschinger. Next to Schleschinger's body is a piece of papyrus with a message written in mysterious symbols (hence a symbol cipher - monoalphabetic substitution; the cipher is like a rebus and decrypts to a Latin sentence). As Zaleski's investigations continue, more suicides crop up in Germany, France, and Britain, all of whom have the same cryptic message beside them. A very philosophical mystery story, the end of the story leads Zaleski to ruminate on the fate of society and of humanity itself.

  164. Smith, Laurence Dwight. 1938. The G-Men In Jeopardy. hardcover ed. New York: Grosset and Dunlap. 238 pgs.
    The third in Smith's "G-Men" series. The novel contains a dictionary code. In 1943 Smith also wrote a trade book on "Cryptography: The Science of Secret Writing" which was an acclaimed introduction to cryptology. A Dover edition was published in 1955, after Smith's death.

  165. Sterline, Stewart. 1949. Dead Sure. hardcover ed. New York: E. P. Dutton Company. pgs.
    Fancy hotel detective, Gil Vane handles a case where a candy tycoon is murdered just as he is about to recognize a long-lost daughter. His second wife and son stand to inherit. Gil has to find the murderer. Codes and ciphers are mentioned and described but there are no messages to decrypt in the novel.

  166. Stilson, Charles. 1923. Seven Blue Diamonds of Baroda. Short Stories, April 25, 1923, 69.
    Contains a 28 letter monoalphabetic substitution cipher message.

  167. Stoutenburg, Adrien. 1943. The Model Airplane Mystery. hardcover ed. New York: Doubleday, Doran & Company. 249 pgs.
    The first of Stoutenburg's many juvenile fiction books. Contains a number substitution cipher.

  168. Sutphen, Van Tassel. 1922. In Jeopardy. hardcover ed. New York: Harper and Brothers Publishers. 300 pgs.
    There is a mystery surrounding the otherwise lovely Maryland horse country estate called the "Hildebrand Hundred". For the last 60 years or so, the owners keep dying - all within a day of the summer solstice, and all while in the gorgeous library of the estate. Hugh Hildebrand gets involved in the mystery while attending the funeral of his cousin, the latest master of the 'Hundred' to meet his maker. There is a long Vigenere cipher message that is key to unravelling the mystery and a very good description of how to encrypt and decrypt Vigenere cipher messages. Chapter XIII "Le Chifre Indechiffrable" gives a concise treatment of ciphers and the Vigenere table. Chapter XXI explains how to decipher a Vigenere.

  169. Theiss, Lewis E. 1919. The Hidden Aerial. hardcover ed. Boston, MA: W. A. Wilde Company. 332 pgs.
    A hunt for spies that are listening in on wireless traffic and sending code messages to their handlers. The Boy's Reserve during World War I comes to the rescue. The novel contiains a word code with null words in it.

  170. Trant, Balmer and. 1910. The Private Band Puzzle. hardcover ed. Boston, MA: Small, Maynard and Company. pgs.
    This reference is in Langen's list, but has not been found anywhere.

  171. Van Dine, S. S. 1928. The Greene Murder Case. hardcover ed. New York: Charles Scribners Sons. 388 pgs.
    In this Philo Vance mystery, the amateur detective is called in to help with a series of murders at the Greene Mansion in the upper East side of New York. It seems as though someone has it in for the Greene family, shooting two sons, and two daughters over a several week period, and poisoning the matriarch, Mrs. Greene. The novel has everything, a dark, brooding mansion, a cast of not very likable suspects, mood-setting snowstorms, murder, and lots of dark and stormy nights. There is a seeming cipher message that throws suspicion on one of the family members, but it turns out to be a hoax (and really a rebus, not a cipher).

  172. Vanardy, Varick. 1913. The Return of The Night Wind. hardcover ed. New York: G. W. Dillingham Company Publishers. 326 pgs.

  173. Bingham Harvard, aka, "The Night Wind" has returned to New York to clear his name of robbery and assault charges and to clean up a gang of corrupt New York City cops. With the help of his wife "Lady Kate" and his best friend, Tom Clancy, Harvard works his way through the clues and the criminals to find the evidence he needs. The key piece is a cipher message (a monoalphabetic substitution cipher) that also contains coded names of the perpetrators.

  174. Walk, Charles E. 1910. The Paternoster Ruby. hardcover ed. Chicago: A. C. McClurg. 374 pgs.
    The famous, valuable Paternoster ruby has vanished! Felix Page, Chicago millionaire, businessman and owner of the Paternoster ruby has been murdered and the ruby is missing. Detective Swift of the Chicago PD is assigned to the case and must deal with several not pleasant characters (and one very pleasant one in the form of Miss Genevieve Cooper) on his way to a solution. A graphic cipher message is found that leads to the resolution of the disappearance of the ruby.

  175. Wallace, Edgar. 1908. Angel Esquire. hardcover ed. New York: Henry Holt Company. 332 pgs.
    Mr. Reale, an elderly and successful crook and proprieter of gambling establishments, is killed by one of his associates as he describes how he is going to leave his millions to the person who can solve a puzzle. The puzzle is a poem that is a cipher that must be solved. The solution should lead to the fortune, but instead it leads to another cipher puzzle, a substitution cipher this time.

  176. -----. 1927. The Feathered Serpent. hardcover ed. London, UK: Hodder & Stoughton. 196 pgs.
    People begin receiving calling cards with the words "The Feathered Serpent". And then someone who receives a card is murdered. Reporter Peter Derwin smells a story and gets on the trail of the Feathered Serpent. The novel contains a simple monoalphabetic substitution cipher as a clue.

  177. -----. 1929. The India-Rubber Men. hardcover ed. London, UK: Hodder & Stoughton. 326 pgs.
    Inspectors Wade and Elk are tracking a gang of criminals in the area of London near the Thames. The gang's trademark is to dress in rubber masks, crepe rubber shoes, and rubber gloves and to hurl gas bombs to avoid pursuit. When they kidnap the lovely Lila Smith, things get ugly. The Novel contains a simple monoalphabetic substitution cipher message that Inspector Wade dispatches quickly.

  178. Wells, Carolyn. 1919. The Diamond Pin. hardcover ed. Philadelphia, PA: Lippincotts Publishers. 312 pgs.
    The key to the whereabouts of dear old (and seemingly murdered) Aunt Ursula's jewelry is in 39 cipher letters engraved on the head of a diamond pin. The cipher is a very short Vigenere cryptogram that must be solved by finding the key. Detective Fleming Stone and his assistant Fibsy (yes, Fibsy) solve the cipher, which, of course, leads to another puzzle and eventually to the jewels.

  179. Wentworth, Patricia. 1927. Hue and Cry. hardcover ed. Philadelphia: J. B. Lippincott Company. 320 pgs.
    Mally Lee is hired by Sir George Peterson to be the governess of his daughter, Barbara. Barbara is a budding artist, much to her father's dismay, and one day when Mally scoops up a set of Barbara's drawings she inadvertedly picks up a coded message. Rather than expose his (illegal and treasonous) dealings, Sir George and his brother-in-law and co-conspirator Mr. Craddock accuse Mally of stealing a priceless diamond broach from her employer. Scotland Yard issues a warrant for Mally and before long she's on the run. Scotland Yard is after her, but so is Mr. Craddock, who wants the coded message and will do anything to get it back. The coded message that is so important is a 'crossword' puzzle that uses two names from the title of the puzzle as the key to a monoalphabetic substitution cipher and the first letters of each of the crossword clues as the cipher message.

  180. Wilde, Percival. 1941. Design for Murder. hardcover ed. New York: Random House. 274 pgs.
    A group of n'er-do-well and pretty amoral young rich folks get together at a Connecticut estate and decide to play a game of "murder". Unfortunately for them the murder turns real and then a second death occurs. There is no real detective here. Each of the players narrates part of the story, imagined as if the people are writing down their impressions as the game and investigation progresses. One solution is proposed, but that suspect is the second victim. A second solution is proposed and the novel ends; but that solution is wrong as well. An appendix to the book contains the real murder's confession. A null substitution cipher is included in the novel.

  181. William, Peter. 1944. The Affair at Abu Mina. hardcover ed. New York: Macrae Smith Company. 238 pgs.
    South African secret agent Dan Dupreee is sent into the North African desert during WW II to investigate strange goings-on at Abu Mina. He suspects it is being used as a rendezvous for Rommel's tanks for their next push against the Allies. Working with a beautiful spy, Eve, Dan uncovers a Nazi collaborator, and the catacombs being used to hide the German tanks. A military code and code book are used in the novel.

  182. Williams, Valentine. 1924. The Yellow Streak. hardcover ed. New York: Houghton Mifflin. pgs.
    Hartley Parrish, successful businessman and country squire is dead. Was it murder or suicide? If it's murder who did it? His soon-to-be fiancee? Her unrequited lover? The butler? With the discovery of a series of strange letters from an import-export business and a grille, it seems as if murder is on the menu. A grille cipher is key to solving the murder.

  183. -----. 1924. The Three of Clubs. hardcover ed. London, UK: Hodder & Stoughton. 320 pgs.
    Godfrey Cairsdale, a British secret agent is sent to Hundary to investigate a group of conspirators that use playing cards (notably the three of clubs) as their secret identification. Waiting for him is Valerie, an Austrian spy, who, of course, falls for him as well. Unfortunately for Valerie, there's another woman - Virginia, a spunky American who chases after her lover when he disappears. Tragedy is inevitable. The novel contains coded messages that use playing cards as the cipher elements.

  184. -----. 1932. The Gold Confit Box (The Mystery of the Gold Box). hardcover ed. London, UK: Hodder and Stoughton, Limited. 313 pgs.
    British Secret Service agent Philip Clavering is on the trail of a gold snuff box. His colleague the late George Forrest was relieved of the box and murdered with a stiletto on a train from Berlin to Brussels. Clavering wanders Europe in search of the box, conflicted over the affections of the German spy Madeline and his true love Garnet Wolseley. Nobody knows why the box is so important, but it's imperative that Clavering find it and return it to London. A code message that is an anagram is the key to the mystery of the box.

  185. Woodford, Jack, and John B. Thompson. 1952. Desire in New Orleans. hardcover ed. Baltimore, MD: Signature Press. 190 pgs.
    The novel contains a book code.

  186. Yates, Margaret Taylor. 1938. Death Sends a Cable. hardcover ed. New York: Macmillan Publishers. 276 pgs.
    Two young cable operators at Guantanamo Bay are murdered and Special Investigator Bill Duncan is sent to solve the case. He's helped by a nurse who is also the wife of the Base doctor. A puncture cipher message is a clue to the murderer. (A puncture cipher system puts small holes under the letters of the plaintext message.)

Creative Commons License
Unless otherwise expressly stated, all original material of whatever nature created by John F. Dooley and included in this web site and any related pages, including the site's archives, is licensed under a Creative Commons License.