Barnabas  01:03
For those who haven't heard any of the episodes of this podcast yet, start here. This episode tells you everything you need to know about what codes are, ciphers are, and all the other code and spy terminology that you might hear on the podcast. Without further ado, start the show.

Barnabas  02:10
Welcome to the kids' code podcast. My name is Barnabas, your host. I have here Steve, my co-host, and a couple of my other friends: Fred Fine, who is a police officer, and Codemaster Cole, the leader of the good spy ring. In this episode we try to resolve some major code questions. What is the difference between a code and a cipher? What is a Transposition cipher, what is a Substitution cipher, and what does deciphered mean? Older listeners might be wondering what this episode numbering is about. It is actually a bonus episode, but it's enough like a full episode that I just put it in as one.

Barnabas  03:17
Let's start with what is probably the biggest question: What is the difference between a code and a cipher? Most people know that they are both ways of hiding messages, but are they even different at all? Well, the answer is yes, but depending on who you ask, the definitions will be different. I can't tell you what the actual definition is, but I can tell you what my sources think. According to The Dangerous Book for Boys by Con and Hal Igulden, "codes are impossible to break without a key or detailed knowledge of the people involved." It also says that "ciphers, on the other hand, are scrambled messages, not a secret language. In a cipher a plaintext message is concealed by replacing the letters according to a pattern."

Steve  04:25
That basically means that a code is something that you need the key to understand, whereas the cipher has a pattern.

Barnabas  04:36
Top Secret, a book by Paul B. Janeczko, has a different definition. It say that "a code is a system where every word or phrase in your message is replaced by another word, phrase, or series of symbols. . .on the other hand, a cipher is a system where every letter of your message is replaced by another letter or symbol."

Fred Fine  05:05
In other words, in a code each word is changed, but in a cipher, each letter is changed.

Barnabas  05:17
Next question: what is a Substitution cipher, what is a Transposition cipher, and what is the difference? Well, according to Top Secret, in a Substitution cipher you substitute one symbol for every letter in a plaintext, whereas, and I quote, "In a Transposition cipher you transpose, or rearrange, the positions of the letters. Substitution and Transposition cipher systems both have their advantages and disadvantages. Substitution ciphers are much easier to break* - did you know that out of a thirty-five letter message there are enough combinations that if one person could check 1 combination per second and if all the people in the world worked 24 hours a day to check it, it would take more than a thousand times the lifetime of the universe to check all the possibilities! But Transposition ciphers aren't as easy to use. You have to agree on a specific combination, which is less secure than having it not as clear, or you don't say and then it could take years for the person to understand it. It is important to know what both systems are and how each operates for codebreaking and other purposes.

Barnabas  07:18
Third question: what do Enciphering, Encoding, and Codemaking mean? They're usually thought to be the same thing and are about both codes and ciphers - the creation side - but actually codemaking and encoding are about codes and enciphering is about ciphers. It works similarly with decoding, deciphering, and codebreaking. Here are a few other terms:

Barnabas  08:00

Barnabas  09:25
Now the spy terms.

Fred Fine  12:30

Codemaster Cole  13:01

Barnabas  13:25

Now that we've worked out some of the terms, it's time for the story.

Announcer  16:13
Previously on The Kids' Code Podcast:

(Clip) Steve  16:20
Oh no, he really is a spy!

(Clip) Codemaster Cole  16:25
We'll have to go in through that little door over there.

(Clip) Steve  16:31
Well, It looks like they packed up and left.

Dan  16:34
But look, there's still this piece of paper.

(Clip) Evil Ant  16:40
To the land of barbed wire I have gone.

Dangerous Dave  16:45
I, to take all your things, like your gong.

New Recruit  16:51
I to the place where the shadows creep.

Emily End  16:56
and me, for your secrets in the deep.

(Clip) Steve  17:00
We'd better go. Let's split up and go all 4 of those places.

Al  17:06
I'll take Fred and we'll go back to the prison.

Codemaster Cole  17:13
I'll go to the HQ.

Steve  17:17
I'll go try to protect my gong.

Caw the Crow  17:21
And I'll go to the convention of criminals with Dan.

Barnabas  17:27
Codemaster Cole and Bob Bot had gone to the headquarters. When they first got inside, they didn't notice anything different until they went into the second room and found a peeled and half eaten banana on the table and the lights on.

Bob Bot  17:53
Emily End has got in here already.

Codemaster Cole  17:58
That's bad. She probably has some of our secrets.

Barnabas  18:04
Said Codemaster Cole. They went further and started hearing a faint voice.

Emily End  18:13
They made a satellite shaped like Codemaster Cole's 3rd birthday cake.

Codemaster Cole  18:18
Hey, that's personal information.

Barnabas  18:23
When they came into the room that the voice seemed to be coming from, they found Emily End talking to the Evil Ant and telling him some of the good spy ring's secrets. She didn't see them right away, so they took the chance and took away the machines that she was using and were surrounding her.

Bob Bot  18:57
We have caught you. You are now surrounded.

Barnabas  19:02
Said Bob Bot.

Emily End  19:05
I can't get out!

Barnabas  19:07
Said Emily End.

Codemaster Cole  19:10
Now we just need to get a phone and call Fred and Al.

Barnabas  19:20
Said Codemaster Cole.

Codemaster Cole  19:23
Barnabas, what's there number again?

Barnabas  19:28
618-546-9145.

Codemaster Cole  19:34
Thanks, Barnabas. That really was helpful. And fast. Maybe I'll change my mind about being a bad narrator.

Barnabas  19:48
Thank you. I would like to be called a good narrator. Meanwhile, Fred and Al found the Evil Ant negotiating with one of the prisoners at the prison.

Al  20:11
Now that wasn't as bad as I feared. I thought he would be doing terrible things.

Evil Ant  20:27
I heard you. Wait, you're back already? I thought it would take you longer.

Fred Fine  20:40
Uh oh, he heard us.

Barnabas  20:46
The Evil Ant ran off before they could catch him and was gone.

Al  20:52
Aw, man. I shouldn't have said anything.

Fred Fine  20:59
Whatever. I think we're getting a call.

Barnabas  21:06
Steve hadn't found anything at his house. He looked everywhere, but there was no hint that anyone had been there, so he sat on his couch, and played video games.

Steve  21:27
Well, I guess I'd better wait until someone gets here. And my gong's right here, so I'll probably be okay.

Barnabas  21:38
THE END.

Barnabas  21:46
Well, I hope you liked that story. There are some important positions in a spy ring. You need:

Steve  23:02
I think we're about done for this episode.

Barnabas  23:08
The sources used in this episode are Top Secret by Paul B. Janeczko, the Explorer Academy Codebreaking Activity Adventure by Dr. Gareth Moore, The Spy's Guidebook by Falcon Travis, Judy Hindley, and others, the Crypto Corner website, The Dangerous Book for Boys  by Con and Hal Igulden,

Emily End  23:40
and The Daring Book for Girls by Andrea Buchanan and Miriam Peskovitz.

Steve  23:47
That's all for today.

Barnabas  23:50
Happy New Year, and Keep on Cracking!

Steve  24:09
So, It's the Post Show. I guess I should make some funny joke or something, but I just don't feel like it. Oh well, maybe another time.

*Except for Polyalphabetic Substitution ciphers, but that's another story.