On the Optimization of Encrypted Hangman

Do not commit sudoku. Maybe all of the other manuals will help you instead.

Summary

Determine the module that was used on Encrypted Hangman and the cipher used, and submit its encryption. (Max 24 letters displayed on the module) Guessing incorrectly 10 times will reset the module with a new set.

WARNING: Hangman must be disarmed before any instance of the module identified by its message. Solving any matching module before Hangman incurs a strike and the module will reset. Some modules are exempt from this even if they appear as the message, see the ignore list for Encrypted Hangman for all listed modules.

* - If the module contains diacritic letters in its name, Hangman will try to replace those letters with their English counterparts. Some modules are also excluded from being chosen by Hangman as the message, specifically those without any English letters in their name.

Appendix - Non-Trivial C1PH3R2

Cipher How does it work? What is the key?
Vigenère Cipher In Vigenère Cipher, every letter in the message is added to the letter with the same position as the key. Take this sum modulo 36 and look what letter is represented by this value. Each letter has a specific value which you can find in the Vigenére Cipher manual. The key is always as long as the message itself.
If the key is “ABCDE” and the message is “KTANE”: A + K = 8 + 32 = 40%36 = 4 = R; B + T = 0 + 25 = 25 = T; ... The encrypted messege is then “RTZLG”.
This cipher uses numbers too. If the message or the key has numbers leave them as they are. If numbers occur in the encrypted message they will be substituted with A0J9.
The key is the serial number. Adapt the length of the serial number by repeating it. (With S# of ABCDEF and a length of 9, the key is ABCDEFABC.)

Appendix - Non-Trivial C1PH3R2 (Continued)

Cipher How does it work? What is the key?
Playfair Cipher

Playfair Cipher uses a 5×5 grid. Begin by placing all distinct characters (no duplicates) of the key in reading order into such a grid. Then fill up the rest using the alphabet. All J’s are substituted by I’s.

With a key of “Playfair Cipher” the grid looks like this:

P L A Y F
I R C H E
B D G K M
N O Q S T
U V W X Z

Next the message is split into pairs of 2 characters. If there is an odd number of letters, an X is added at the end. If any pair have the same letter change the second one to Z. If they are Z then change the second one to X.

For each pair:

  • If the letters are in the same row in the table, shift both letters one to the right in that row. In the example grid above, DK → GM; ST → TN; etc.
  • If the letters are in the same column in the table, shift both letters down in that column. In the example grid above, PU → IP; GW → QL; etc.
  • Otherwise, the letters are in the corners of a rectangle formed by the given letters. Take the other corner in the same row. In the example grid above, PX → YU; HN → IS; etc.
Serial number (Numbers should be translated into letters using A0J9)

Standard Encryptions

When using the Affine Encryption Table, use the last digit of the serial number as the row; when using the Caesar Encryption Table, use the first digit of the serial number as the row.

Affine Encryption Table
0ABCDEFGHIJKLM NOPQRSTUVWXYZ
1CFILORUXADGJM PSVYBEHKNQTWZ
2EJOTYDINSXCHM RWBGLQVAFKPUZ
3GNUBIPWDKRYFM TAHOVCJQXELSZ
4IRAJSBKTCLUDM VENWFOXGPYHQZ
5KVGRCNYJUFQBM XITEPALWHSDOZ
6MZMZMZMZMZMZM ZMZMZMZMZMZMZ
7ODSHWLAPETIXM BQFUJYNCRGVKZ
8QHYPGXOFWNEVM DULCTKBSJARIZ
9SLEXQJCVOHATM FYRKDWPIBUNGZ
Caesar Encryption
1BCDEFGHIJKLMN OPQRSTUVWXYZA
2CDEFGHIJKLMNO PQRSTUVWXYZAB
3DEFGHIJKLMNOP QRSTUVWXYZABC
4EFGHIJKLMNOPQ RSTUVWXYZABCD
5FGHIJKLMNOPQR STUVWXYZABCDE
6GHIJKLMNOPQRS TUVWXYZABCDEF
7HIJKLMNOPQRST UVWXYZABCDEFG
8IJKLMNOPQRSTU VWXYZABCDEFGH
9JKLMNOPQRSTUV WXYZABCDEFGHI
0KLMNOPQRSTUVW XYZABCDEFGHIJ
ROT-13 Encryption
-NOPQRSTUVWXYZ ABCDEFGHIJKLM
Atbash Encryption
-ZYXWVUTSRQPON MLKJIHGFEDCBA

Standard Encryptions (Continued)

When using the Modern Cipher Encryption Table, use the sum of digits in the serial number, modulo 26 as the row.

Modern Cipher Encryption Table
0ABCDEFGHIJKLM NOPQRSTUVWXYZ
1SNVFRGHJOKLZQ MPAWTDYIBECUX
2DMBGTHJKPLZXW QASEYFUONRVIC
3FQNHYJKLAZXCE WSDRUGIPMTBOV
4GWMJUKLZSXCVR EDFTIHOAQYNPB
5HEQKILZXDCVBT RFGYOJPSWUMAN
6JRWLOZXCFVBNY TGHUPKADEIQSM
7KTEZPXCVGBNMU YHJIALSFROWDQ
8LYRXACVBHNMQI UJKOSZDGTPEFW
9ZUTCSVBNJMQWO IKLPDXFHYARGE
10XIYVDBNMKQWEP OLZAFCGJUSTHR
11COUBFNMQLWERA PZXSGVHKIDYJT
12VPINGMQWZERTS AXCDHBJLOFUKY
13BAOMHQWEXRTYD SCVFJNKZPGILU
14NSPQJWERCTYUF DVBGKMLXAHOZI
15MDAWKERTVYUIG FBNHLQZCSJPXO
16QFSELRTYBUIOH GNMJZWXVDKACP
17WGDRZTYUNIOPJ HMQKXECBFLSVA
18EHFTXYUIMOPAK JQWLCRVNGZDBS
19RJGYCUIOQPASL KWEZVTBMHXFND
20TKHUVIOPWASDZ LERXBYNQJCGMF
21YLJIBOPAESDFX ZRTCNUMWKVHQG
22UZKONPASRDFGC XTYVMIQELBJWH
23IXLPMASDTFGHV CYUBQOWRZNKEJ
24OCZAQSDFYGHJB VUINWPETXMLRK
25PVXSWDFGUHJKN BIOMEARYCQZTL

Vigenère Value Table

Unfortunately, this is where it ends for me.

B0M18
41Q19
52Y20
P3S21
R4J22
E5223
L6Z24
07T25
A8U26
69927
G10I28
F11129
D12N30
H13331
O14K32
815733
C16V34
W17X35
A8S21
B0T25
C16U26
D12V34
E5W17
F11X35
G10Y20
H13Z24
I2807
J22129
K32223
L6331
M1841
N3052
O1469
P3733
Q19815
R4927