On the Subject of Ultimate Cycles

How insecure are these words???

This module consists of a screen, eight dials with red labels, and a QWERTY keyboard.

The labels on the dials, when decrypted and read from left to right, spell out an eight-letter word.

The word has been encrypted through a series of ciphers, indicated by the direction each dial is pointing, from left to right.

The objective of the module is to decrypt the eight letter word using the 45° clockwise rotations, starting from north, of the dials from right to left, then taking the response and encrypting it through the same ciphers from left to right.

Once deciphered, find the word in the table below, the word written below it is the word that should be entered.

Apply the same sequence of encryptions to the response word, and type out the encrypted response word using the keys.

The word is automatically submitted when eight keys are pressed.

The red button can be pressed at any time before the eighth key is pressed to cancel the input.

Inputting any of the eight letters incorrectly will cause a strike to be issued and reset the module.

Note: Unless stated otherwise, any reference to a letter’s alphabetic position starts at A = 1. Similarly, any reference to the position of a dial starts from the leftmost dial = 1.

(d) = Decryption process.
(e) = Encryption process.

0/N: Atbash Logic Cipher

Construct an 8-bit binary string, where each bit is the number of 45° clockwise rotations, starting from north, of each dial from left to right, modulo 2. Create eight pairs of bits using the following positions in the string: 12 34 56 78 13 57 24 68.

Using the operator corresponding to the position of the current cipher dial (starting with AND = 1), find the truth values of each pair; the encrypted letter depends on whether each is true or false.

If the LED below the current cipher dial is lit, use the top half of the table below.
Otherwise, use the bottom half.

To decrypt, reference the row corresponding to the truth value obtained from the binary pair and the logic gate in the half of the table determined earlier. Within that row, find the encrypted letter, and the decrypted letter will be in the same column, in the shaded row.

To encrypt, reference the row corresponding to the truth value obtained from the binary pair and the logic gate in the half of the table determined earlier. Find the unencrypted letter in the shaded row, and the encrypted letter will be in the same column, in the referenced row.

B1B2AND (P1)OR (P2)XOR (P3)IMP ⇒ (P4)NAND (P5)NOR (P6)XNOR (P7)IMPBY ⇐ (P8)
11TTFTFFTT
10FTTFTFFT
01FTTTTFFF
00FFFTTTTT
Lit FEJZKSBXTLRIDFGUMCQOHAWPYVN
TARPOETYKXGQNMJIHSLCVBDWZFU
LetterABCDEFGHIJKLMNOPQRSTUVWXYZ
UnlitTFUADWYEXOHSRQNMJTCPBGVLKIZ
FMEBKDZSLJXNFTUWRIOGCYHPAQV

1/NE: Caesar Cipher

Shift each letter of the word forwards (e)/backwards (d) through the alphabet by the number of 45° clockwise rotations, starting from north, of each dial individually.

If the LED of the current cipher dial is lit, shift all letters further forwards (e)/backwards (d) by the number corresponding to the position of the current cipher dial.
Otherwise, shift all letters backwards (e)/forwards (d) by the number corresponding to the position of the current cipher dial.

2/E: Playfair Cipher

  • The indexing of the lists starts at zero.
  • Use the keyword corresponding to the number of 45° clockwise rotations, starting from north, of the first dial after the current cipher dial, wrapping around back to the first dial if necessary.
  • If there are less than three unique ports on the bomb, use the keyword from List A. Otherwise, use the keyword from List B.
  • The keyword gives the first ten letters/top two rows of the keysquare.
    • If the LED corresponding to the current cipher dial is lit, reverse the keyword.
  • The remaining fifteen letters not present in the keyword fill out the remaining three rows of the keysquare in alphabetical order, excluding X.
  • Split the word into four pairs of letters.
  • For each pair of letters:
    • If both letters are identical, the encrypted pair is two of the letter diametrically opposite in the keysquare.
    • Otherwise, if both letters are in the same row of the keysquare, replace them with the letters to their immediate right (e)/left (d) respectively, wrapping around to the other side of the row if necessary.
    • Otherwise, if both letters are in the same column of the keysquare, replace them with the letters immediately below (e)/above (d) them respectively, wrapping around to the other side of the column if necessary.
    • Otherwise, if the letters are on different rows and columns, replace each of them with the letter on the same row but in the column of the other letter in the original pair.
ListKeywordKW Reversed (lit)Remaining letters
A0ALGORITHMSSMHTIROGLABCDEFJKNPQUVWYZ
A1AUTHORIZEDDEZIROHTUABCFGJKLMNPQSVWY
A2BLUEPRINTSSTNIRPEULBACDFGHJKMOQVWYZ
A3DESPICABLYYLBACIPSEDFGHJKMNOQRTUVWZ
A4FORMIDABLEELBADIMROFCGHJKNPQSTUVWYZ
A5HYPERBOLICCILOBREPYHADFGJKMNQSTUVWZ
A6IMPORTANCEECNATROPMIBDFGHJKLQSUVWYZ
A7LABYRINTHSSHTNIRYBALCDEFGJKMOPQUVWZ
B0WANDERLUSTTSULREDNAWBCFGHIJKMOPQVYZ
B1VANQUISHEDDEHSIUQNAVBCFGJKLMOPRTWYZ
B2ULTRASONICCINOSARTLUBDEFGHJKMPQVWYZ
B3SCRAMBLINGGNILBMARCSDEFHJKOPQTUVWYZ
B4PRECAUTIONNOITUACERPBDFGHJKLMQSVWYZ
B5OSTRACIZEDDEZICARTSOBFGHJKLMNPQUVWY
B6METHODICALLACIDOHTEMBFGJKNPQRSUVWYZ
B7MAGNITUDESSEDUTINGAMBCFHJKLOPQRVWYZ

Important:

  • If the pair of letters is XX, the pair is unchanged by the cipher.
  • If the pair of letters is either X# or #X, where # is a letter other than X, the X is changed to be identical to the other letter in the pair, and the pair is then enciphered/deciphered normally.
    Then, the new letter is changed back to an X.

3/SE: Pigpen Cipher

Translate each letter of the word using one of the two pigpen ciphers below. If the LED corresponding to this cipher dial is unlit, use Cipher I. Otherwise, use Cipher II.

Rotate the shape corresponding to the letter 45° clockwise (e)/counter-clockwise (d) an amount equal to the number of 45° clockwise rotations, starting from north, of its respective dial. Then, translate it back into a letter using the same pigpen diagram determined earlier, shown below.

Cipher I

Cipher II

3/SE j: Pigpen Cipher, The Way That Speakingevil Coded It, But Visualised!!!

Use the left/right half of the table corresponding to the state of the current cipher dial’s LED. Find the letter and move right (e)/left (d) within the row, a number of times equal to the number of 45° clockwise rotations of the corresponding dial, starting from north. Should you reach a coloured square, teleport to the other coloured square of the same colour, without modifying your movement direction. The coloured cells do not count as cells themselves, but rather as portals.

Cipher I (unlit) Cipher II (lit)
Left Two Grids ASCUIVGT ASEWQYMU
BKFOHQDM CDKLOPGH
EN IJ
Right Two Grids JWLYRZPX BTFXRZNV
KFOHQDMB DKLOPGHC
NE JI

4/S: Chaocipher

The indexing of the lists starts at zero. For this cipher, the leftmost dial has a position of zero.

  • The two lists give the keywords for two keystrings, the keyword from List A is used for the first keystring and the keyword from List B is used for the second keystring:
    • If the sum of the digits in the serial is greater than 9, the position of the current cipher dial determines the keyword in List A and the number of 45° clockwise rotations, starting from north, of the previous dial determines the keyword from List B.
    • Otherwise, the position of the current cipher dial determines the keyword in List B and the number of 45° clockwise rotations, starting from north, of the previous dial determines the keyword from List A.
    • If the current cipher dial is the first dial, use the last dial.
  • Take the two keywords, and append the remaining unused sixteen letters in alphabetical order to form your Chaocipher.
  • For each letter in the encrypted word, consider the status of the LED below the dial, referenced by its position from left to right:
    • If the LED of the current cipher dial is the same as the LED of the referenced dial, shift the second keystring to the left by the number of 45° clockwise rotations, starting from north, of the referenced dial.
    • Otherwise, shift the first keystring to the left by the number of 45° clockwise rotations, starting from north, of the referenced dial.
  • Find the letter in the first (e)/second (d) keystring. Take the letter in the same position in the other keystring to get your enciphered/deciphered letter.

Note: The shifted keystrings are NOT reset to default after the encryption/decryption of each letter. Shifting is always performed on the latest iteration of the keystrings.

The interactive is on the next page.

5/SW: Monoalphabetic Substitution Cipher

The position of the current cipher dial corresponds to which of the eight words in the list below is the keyword for this cipher.

Make a new string consisting of the thirteen letters of the alphabet that are not present in the chosen keyword in alphabetical order.
If the LED corresponding to the current cipher dial is lit, then reverse this string.

Pos.KeywordRemaining letters (unlit)Remaining Letters (lit)
1DOCUMENTARILYBFGHJKPQSVWXZZXWVSQPKJHGFB
2FLAMETHROWINGBCDJKPQSUVXYZZYXVUSQPKJDCB
3FLOWCHARTINGSBDEJKMPQUVXYZZYXVUQPMKJEDB
4HYDROMAGNETICBFJKLPQSUVWXZZXWVUSQPLKJFB
5METALWORKINGSBCDFHJPQUVXYZZYXVUQPJHFDCB
6MULTIBRANCHEDFGJKOPQSVWXYZZYXWVSQPOKJGF
7TROUBLEMAKINGCDFHJPQSVWXYZZYXWVSQPJHFDC
8UNPREDICTABLYFGHJKMOQSVWXZZXWVSQOMKJHGF
  • If the number of batteries on the bomb is even, then place this string at the end of the keyword.
  • Otherwise, place this string at the beginning of the keyword.

Write the full alphabet underneath this new keystring. Find the letter in the alphabet (e)/keystring (d) and take the letter at the same position in the other string.

6/W: Hill Cipher

The indexing of the lists starts at zero.

If the bomb has more lit than unlit indicators, the keyword for this cipher belongs to List A. Otherwise, the keyword for this cipher belongs to List B.

The keyword used for this cipher depends on the number of 45° clockwise rotations, starting from north, of the dials adjacent to the current cipher dial:

If the current cipher dial:

  • Is the first dial, use the keyword corresponding to six plus the number of 45° clockwise rotations, starting from north, of the second dial.
  • Is the last dial, use the keyword corresponding to six plus the number of 45° clockwise rotations, starting from north, of the seventh dial.
  • Otherwise, use the keyword corresponding to the sum of the numbers of 45° clockwise rotations, starting from north, of the two dials adjacent to the current cipher dial.
ListKeywordKey MatrixNListKeywordKey MatrixN
A0AEON1-5-15-1423B0BOMB2-15-13-223
A1COPY3-15-16-2523B1BUSY2-21-19-257
A2EACH5-1-3-819B2DICE4-9-3-511
A3GOOD7-15-15-419B3FAUX6-1-21-2411
A4IOTA9-15-20-15B4HUSK8-21-19-111
A5KILO11-9-12-1521B5JUKE10-21-11-51
A6MARK13-1-18-115 B6LIMA12-9-13-125
A7ONCE15-14-3-515B7LOCI12-15-3-919
A8QUIT17-21-9-205B8NAME14-1-13-521
A9RIOT18-9-15-2023B9PUSH16-21-19-87
A10SYNC19-25-14-311B10RISE18-9-19-517
A11UNDO21-14-4-1525B11TASK20-1-19-1111
A12WORK23-15-18-113B12VOID22-15-9-421
A13YEAR25-5-1-189B13XYST24-25-19-2021
A14ZEAL26-5-1-125B14ZOOM26-15-15-133

Create a 2×2 square keymatrix consisting of the alphabetical positions of the letters in the keyword modulo 26.

If the LED of the current cipher dial is lit, swap the top-right and bottom-left values in the matrix.

Find the multiplicative inverse, N, of the determinant of the keymatrix using the following equation, where N is any integer and A, B, C, D are the four values in the keymatrix in reading order:

N(AD - BC) mod 26 = 1

Next, create the adjugate matrix of the keymatrix by copying the original matrix, and swapping A and D and negating B and C (in other words, slapping on a negative sign :P).

Then, multiply the values of the adjugate matrix by the multiplicative inverse, and take each value modulo 26. This is the inverse matrix.

Split the encrypted word into four pairs.

For each pair in order, using the original keymatrix (e)/inverse matrix (d):

  • Turn the letters into their alphabetical positions.
  • Take the sum of the products of the first number with A and the second number with B, modulo 26.
  • Turn this back into a letter to get the first letter.
  • Take the sum of the products of the first number with C and the second number with D, modulo 26.
  • Turn this back into a letter to get the second letter.

Important: Because Z has an alphabetic position of 26, its corresponding alphabetical position for this cipher is zero.

7/NW: Bitshift Cipher

Create a string of 24 bits of binary consisting of the 3 bit binary representations of the numbers of 45° clockwise rotations, starting from north, of each dial from left to right. If the LED corresponding to a given dial is lit, invert the bits of its respective binary representation.

Concatenate all binary representations together, then prepend a zero and append a one.

Write the alphabet out in order above the binary string.

Split the alphabet into two sets, with each set containing the letters corresponding to the zeros and ones in the 26-bit string, retaining their orders.

Find the letter in the correct set:

  • If the LED of the current cipher dial is lit, shift the letter to the right (e)/left (d) within its set by the position of the current cipher dial from left to right.
  • Otherwise, shift the letter to the left (e)/right (d) within its set by the position of the current cipher dial from left to right.

Keyword Table

ADVANCEDADVERTEDADVOCATEADDITIONALLOCATEALLOTYPEALLOTTEDALTERING
PROGRESSZYGOTENEQUARTICSLINKAGESQUICKESTORDERINGUNDOINGSZUGZWANG
BINARIESBINORMALBINOMIALBILLIONSBULKHEADBULLHORNBULLETEDBULWARKS
YOKOZUNACOMMANDOGLOOMINGTRICKIERGATEWAYSINCOMINGZYGOMATAFORMULAE
CIPHEREDCIRCUITSCONNECTSCONQUERSCOMMANDOCOMPILERCOMPUTERCONTINUE
BULKHEADRELATIONLINKWORKNANOTUBEMONOTONEYIELDINGILLUMINEKILOBYTE
DECRYPTSDECEIVEDDECIMATEDIVISIONDISCOVERDISCRETEDISPATCHDISPOSAL
NANOBOTSQUINTICSZIGZAGGYMONOMIALULTERIORKNUCKLEDUNDERWAYULTRARED
ENCIPHERENCRYPTSENCODINGENTRANCEEQUALISEEQUATORSEQUATIONEQUIPPED
JUNKYARDQUADRANTTRIANGLERELAYINGNANOGRAMCONNECTSINDICATEBINORMAL
FINALISEFINISHEDFINDINGSFINNICKYFORMULAEFORTUNESFORTRESSFORWARDS
DISCRETEJUNCTIONKILOWATTROTATIONPOSITRONDISPATCHENCIPHERSTANDOUT
GARRISONGARNEREDGATEPOSTGATEWAYSGAUNTLETGAMBLINGGATHEREDGLOOMING
STOCKADEFINDINGSADVANCEDJOURNEYSSTOPPINGLANDMARKEQUATORSVICELESS
HAZARDEDHAZINESSHOTLINKSHOTHEADSHUNDREDSHUNKEREDHUNTSMANHUNTRESS
DISCOVERJUNCTURETOGETHERGARRISONWHATNOTSDIVISIONTOGGLINGYEASAYER
INCOMINGINDICATEINDIRECTINDIGOESILLUDINGILLUSIONILLUSORYILLUMINE
VENOMOUSFORTUNESOBSERVEDQUITTERSHUNKEREDHOTHEADSTOMOGRAMKNOWABLE
JIGSAWEDJIMMYINGJOURNEYSJOUSTINGJUNCTIONJUNCTUREJUNKYARDJUDGMENT
YEARNINGTRIGONALVOLITIONDECRYPTSLABELINGSTARTINGOCTUPLESROTATORS
KILOWATTKILOVOLTKILOBYTEKINETICSKNOCKINGKNOCKOUTKNOWABLEKNUCKLED
POSITIVEBILLIONSWHATEVERFINALISEENCRYPTSOBSTACLEENCODINGADVOCATE
LANGUAGELANDMARKLIMITINGLINEARLYLINGEREDLINKAGESLINKWORKLABELING
CONQUERSEQUATIONGATEPOSTILLUSIONQUIRKISHNUMERATESTANDARDPOSTSYNC
MONOGRAMMONOLITHMONOMIALMONOTONEMULTITONMULTIPLYMULCTINGMULLIGAN
HUNTRESSWINNABLEZYMOLOGYILLUSORYVOLATILETOMAHAWKOCTANGLEADVERTED

Keyword Table cont.

NANOBOTSNANOGRAMNANOWATTNANOTUBENUMBEREDNUMEROUSNUMERALSNUMERATE
ZIPPEREDSTOCCATAVENDETTALINGEREDFINNICKYJUDGMENTHUNDREDSILLUDING
OCTANGLEOCTUPLESORDERINGORDINALSOBSERVEDOBSCUREDOBSTRUCTOBSTACLE
KNOCKINGWINGDINGUNDERLIELINEARLYTRIGGERSPROJECTSALLOTYPEYIELDERS
PROGRESSPROJECTSPROPHASEPROPHECYPOSTSYNCPOSSIBLEPOSITRONPOSITIVE
JIGSAWEDKILOVOLTALLOTTEDRELATIVEPROPHASECOMPILERLIMITINGNANOWATT
QUADRANTQUADRICSQUARTILEQUARTICSQUICKESTQUIRKISHQUINTICSQUITTERS
YELLOWEDMULCTINGGATHEREDWEAKENEDWHATNESSHAZINESSREVOLVEDENTRANCE
REVERSEDREVOLVEDREVEALEDROTATIONROTATORSRELATIONRELATIVERELAYING
FORTRESSWHATSITSBULLHORNGARNEREDINDIGOESLANGUAGECIRCUITSVOLTAGES
STARTINGSTANDARDSTANDOUTSTANZAICSTOCCATASTOCKADESTOPPINGSTOPWORD
REVERSEDJIMMYINGDECEIVEDQUARTILEGAUNTLETHAZARDEDMULTIPLYZYMOGRAM
TRICKIERTRIGONALTRIGGERSTRIANGLETOMOGRAMTOMAHAWKTOGGLINGTOGETHER
MULLIGANZIGGURATALLOCATENUMERALSBULWARKSBINARIESINDIRECTREVEALED
UNDERRUNUNDERWAYUNDERLIEUNDOINGSULTERIORULTIMATEULTRAREDULTRAHOT
JOUSTINGVICINITYQUADRICSMONOLITHORDINALSKNOCKOUTNUMEROUSSTOPWORD
VENOMOUSVENDETTAVICINITYVICELESSVOLITIONVOLTAGESVOLATILEVOLUMING
UNDERRUNDISPOSALWEAPONEDHUNTSMANBULLETEDALTERINGMONOGRAMPOSSIBLE
WEAKENEDWEAPONEDWINGDINGWINNABLEWHATEVERWHATNESSWHATNOTSWHATSITS
EQUALISEOBSTRUCTCOMPUTERSTANZAICDECIMATEEQUIPPEDBINOMIALYEARLONG
YELLOWEDYEARLONGYEARNINGYEASAYERYIELDINGYIELDERSYOKOZUNAYOURSELF
CIPHEREDCONTINUEKINETICSFORWARDSADDITIONFINISHEDGAMBLINGMULTITON
ZIPPEREDZIGGURATZIGZAGGYZUGZWANGZYGOMATAZYGOTENEZYMOLOGYZYMOGRAM
VOLUMINGULTIMATEHOTLINKSNUMBEREDPROPHECYYOURSELFULTRAHOTOBSCURED