## On the Subject of Cryptic Cycles

This module is as ֆਮߠߠߠ႞႞ןিȾฯ as it looks.

This module consists of a screen, eight labelled dials, and three randomised keyboards that can be cycled through using the arrow buttons.

The labels on the dials, when decrypted and read from left to right, spell out an eight letter word.

Each dial gives two bits, which, when put into the module’s corresponding logical operators, returns two truth values.

• Add the number of ports to the number of 90° clockwise rotations, starting from north, to the direction the dial is pointing.
If the number is odd, the first bit of the dial is a 1, otherwise it is a 0.
• Find the number of 90° clockwise rotations, starting from the direction the dial is pointing, to the direction the label is pointing.
If the number is odd, the second bit of the dial is a 1, otherwise it is a 0.

These truth values dictate what each letter in the word changes to in order to produce the encrypted word.

Each letter of the encrypted word is translated into a glyph from one of three sets.
The negative spaces of these glyphs are labelled on the dials.

Once deciphered, find the word in the table below, the word written below it is the word that should be entered.

Apply the same encryption to the response word, and type out the encrypted response word using the keys.

The encrypted response must use the glyphs from the same set as the dial labels.

The word is automatically submitted when eight keys are pressed.

The red button can be pressed at any time before the eighth key is pressed to delete the last input.

Inputting any of the eight glyphs incorrectly will cause a strike to be issued and reset the module.

### Operators

Separate the eight dials into two groups of four, consisting of the four upper and four lower dials respectively.

Starting from OR, move one space in the direction of each dial in each set:

• The first operator is given by the upper dials.
• The second operator is given by the lower dials.

If both sets of dials give the same operator, the second operator becomes NAND.
If there are no unique ports on the bomb, negate the outputs of both operators.

AND
XNORXOR
NORNOR
XORXNOR
ANDORAND
XNORXOR
NORNOR
XORXNOR
AND

### Encryption Tables

The glyphs in the table are facing north.
This is also how they appear on the keyboards.

Set 1Set 2Set 3
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
1st truth valueTF
2nd truth valueTFTF
LetterAGVCX
BOEMA
CRNFS
DIJOD
EYXVT
FSDGW
GHHIR
HQPAP
IBSNU
JFCRJ
KLRQZ
LPGWF
MZKBY
NABJQ
OTMDG
PNQHE
QKLTI
RVYZL
SCAEC
TUFYK
UJTKV
VMWXO
WDZUH
XEILN
YXUPM
ZWOSB

### Keyword Table

FORWARDSJIGSAWEDHAZARDEDNUMERALSMONOTONEQUICKESTTOGETHERYOURSELF
CIPHEREDCIRCUITSCOMPUTERCONTINUEDECRYPTSDIVISIONDISCOVERDISPOSAL
DISPOSALHUNKEREDILLUSIONBULLETEDVOLATILESTARTINGFORTRESSSTANDARD
EXAMINEDEXAMPLESEQUATIONEQUIPPEDFINISHEDFINDINGSFORTRESSFORWARDS
GLOOMINGMULTIPLYULTRAREDBILLIONSNANOGRAMKNUCKLEDYEASAYERJIMMYING
GAUNTLETGAMBLINGGATHEREDGLOOMINGHAZARDEDHAZINESSHUNKEREDHUNTSMAN
INDICATEINDIGOESILLUSIONILLUMINEJIGSAWEDJIMMYINGJUNCTIONJUDGMENT
OBSCUREDLABELINGZUGZWANGVOLTAGESUNDERLIECOMPUTERINDICATEZYMOGRAM
JUNCTIONCIPHEREDMULLIGANHUNTSMANREVERSEDNUMBEREDPOSITIVEZIGZAGGY
MONOGRAMMONOTONEMULTIPLYMULLIGANNANOGRAMNANOTUBENUMBEREDNUMERALS
YELLOWEDOCTUPLESROTATIONGATHEREDCIRCUITSOBSERVEDYIELDINGCONTINUE
OCTANGLEOCTUPLESOBSERVEDOBSCUREDPROGRESSPROJECTSPOSITIONPOSITIVE