On the Subject of The Inverted Cornflower Cipher

Centaureae cyani colores pulchros habent.

On the module, you will see 3 screens, a keyboard, 2 arrows, and a submit button that displays the current page you’re on.

Pressing the right arrow takes you to the next page. Pressing the left arrow takes you to the previous page. There is a total of 2 pages.

To prepare, interpret the first character of the serial number as a base-36 digit and convert it to a 6-digit binary number. This manual will refer to the individual digits of this binary number as “bit 1”, “bit 2”, “bit 4”, “bit 8”, and “bit 16”. (Bit 32 is not used.)

Step 1: Ping-pong Straddling Checkerboard Cipher

For this step, concatenate the last screen on page 1 and the first screen on page 2. We will refer to this as the “coded word”. You will also need the words on the middle and bottom screens on page 2, called KW1 and KW2, respectively.

In this step, we will create two straddling checkerboards. We will use the first one to convert the coded word into a bunch of digits, and the second to convert those digits back into letters.

For the first straddling checkerboard, obtain the following numbers:

• d1 = number of indicators, modulo 6
• d2 = number of ports, modulo 6; if equal to d1, add 1 and modulo 6 again

Also create an alphabet key from KW1 as follows:

• Remove all duplicate letters from the keyword (retain first occurrences).
• Write the entire alphabet with the letters from the keyword removed.
• If bit 8 is 1, place the alphabet after the keyword, otherwise before.

To create a straddling checkerboard, start with a table with 5 rows and 6 columns. Label the columns with the numbers 0–5. Cross out all the first-row cells except for those in columns labeled d1 and d2. Fill the remaining 26 cells with the alphabet key. If bit 16 is 1, use column order (fill the first column from top to bottom, then the second column etc.); otherwise, use reading order.

Also label the rows except the first with the numbers 0–5 but omitting d1 and d2.

Now convert every letter from the coded word to digits. Each letter that occurs in the first row gets turned into the single digit that labels its column; all other letters turn into digits labeling the row followed by the column.

Now create the second straddling checkerboard as before, but with the following changes:

• Instead of d1 & d2, use the following numbers:
• d3 = number of batteries, modulo 6
• d4 = number of lit indicators, modulo 6; if equal to d3, add 1 and modulo 6 again
• Instead of KW1 and bit 8, use KW2 and bit 2 to create the alphabet key.
• Instead of bit 16, decide the fill order using bit 4.

Convert the string of digits back into letters. If the first digit is d3 or d4, use the corresponding letter from the first row. Otherwise, use a pair of digits, where the first identifies the row and the second the column, to obtain a letter. If you are left with a single row digit, ignore it.

Once completed, this process produces a new keyword, KW3.

Example

Encrypted Word: LPFOENYHO; bits: 01111

KW1: NEVER, d1 = 2, d2 = 0
bit 8 ⇒ NEVR + alphabet
 0 1 2 3 4 5 N # E # # # 1 V R A B C D 3 F G H I J K 4 L M O P Q S 5 T U W X Y Z
L → 40, P → 43, F → 30, O → 42, E → 2, N → 0, Y → 54, H → 32, O → 42
Digits: 4043304220543242
KW2: NOTARY, d3 = 1, d4 = 0
bit 2 ⇒ NOTARY + alphabet
bit 4 ⇒ column order
 0 1 2 3 4 5 N Y # # # # 2 O B F J P V 3 T C G K Q W 4 A D H L S X 5 R E I M U Z
40 → A, 43 → L, 30 → T, 42 → H, 20 → O, 54 → U, 32 → G, 42 → H
KW3: ALTHOUGH

Step 2: Chain Rotation Cipher

Example

Encrypted: KNQMKJ
N = 8
Caesar | Cycle | Rest
J–K → Y | Y | KNQMK
K–M → X | XY | KNQM
M–Q → V | XYV | KNQ
Q–N → C | CXYV | KN
N–K → C | XYVCC | K
K → K | CCKXYV |
Result: CCKXYV

Use the encrypted word from the top screen on Page 1 and the number on the middle screen on Page 1, which we will call N. Follow these steps repeatedly until you run out of letters:

• The last letter of the word is your next obtained letter. Remove it from the word.
• Caesar-shift this letter backward by the alphabetic position of what is now the last letter of the word. (Ignore this instruction if you’ve run out.)
• Prepend this letter to the start of your result so far.
• Cycle your result right by N positions.

Step 3: Stunted Blind Polybius Cipher

This step requires the 8-letter keyword KW3 obtained from step 1 and the encrypted word obtained from step 2.

The following diagrams will be used:

 ? ? ? ? ? ? ? ?
 1 2 3 4 1 2 3 4

Begin by filling the Stunted Polybius square (right) with the letters A–P. Start with KW3. Remove all duplicated letters (retain first occurrences) and remove all letters Q–Z. Write the remaining letters A–P in alphabetical order with the letters from KW3 removed. If bit 1 is 1, place the alphabet after the keyword, otherwise before. Write these 16 letters into the grid in reading order.

Now label the rows and columns of the Blind Polybius Square (left). The columns are labeled with numbers 1–4 in an order based on the first 4 letters of KW3. Label these letters 1–4 in alphabetical order. In case of recurring letters, label those from left to right. Proceed similarly to label the rows with numbers 1–4 in an order based on the last 4 letters of KW3.

Write the encrypted word in Unified English Braille (using only single-letter codes, no shortcuts). Stack the Braille patterns on top of one another.

Now convert the first 12 rows of dots, one 2×2 tile at a time, to new letters. Find each 2×2 tile in the Blind Polybius Square and observe its row and column labels, then find the new letter in the Stunted Polybius Square using the matching row and column numbers.

Finally, observe the right column of dots in the last 6 rows. For each filled dot, Caesar-shift the new letter in the same position forward by 13 (ROT-13).

Example

ALTH → 1342
OUGH → 3412

 1 3 4 2 3 4 1 2

KW3: ALTHOUGH; bits: 01111
Encrypted word: CCKXYV

 1 2 3 4 1 A L H O 2 G B C D 3 E F I J 4 K M N P

→ r3c2 → F
→ r2c1 → G
→ r3c1 → E
→ r3c3 → I
→ r2c3 → C
→ r2c1 → G
→ ROT-13 1 & 2
→ ROT-13 3
→ ROT-13 6

Before ROT-13 = FGEICG
After ROT-13 = STRICT

Once completed, the result is your decrypted word, which you can now submit. Once you start typing, all the screens will go black and the bottom screen will show what you are typing.

To clear it, just click one of the arrows. This goes to one of the pages and clears any input you put in. It will not let you go over 6 letters on input.

Once you are satisfied with your input, press the button labeled "SUB" to submit your answer. On a strike, the module will go back to the first page of the module, but it does not regenerate.