On the Subject of The Ultimate Cycle

This cycle is exactly as bad as full password cycle...

This module consists of a screen, eight dials with red labels, and a QWERTY keyboard.

The labels on the dials, when decrypted and read from left to right, spell out an eight letter word.

The word has been encrypted through a series of ciphers, indicated by the direction each dial is pointing, from left to right.

To decipher it, decrypt the word from right to left instead.

Once deciphered, find the word in the table below, the word written below it is the word that should be entered.

Apply the same sequence of encryptions to the response word, and type out the encrypted response word using the keys.

The word is automatically submitted when eight keys are pressed.

The red button can be pressed at any time before the eighth key is pressed to cancel the input.

Inputting any of the eight letters incorrectly will cause a strike to be issued and reset the module.

Note: Unless stated otherwise, any reference to a letter’s alphabetic position starts at A = 1. Similarly, any reference to the position of a dial starts from the leftmost dial = 1.

R means the number of 45° rotations, starting from north, while its subscript # stands for the position of the dial while the subscript n refers to the position of the current cipher dial.

e.g. R4 refers to number of 45° rotations of the 4th dial, Rn-1 refers to number of 45° rotations of the 3rd dial, if the cipher dial is the 4th.

0/N: Atbash Logic Cipher

If LED below the north pointing dial is lit, the process of encrypting is Atbash > Logic.
Otherwise, Logic > Atbash.

Take the number of 45° rotation of the Nth position in the following order: 12 34 56 78 13 57 24 68; then replace the number to 1 if it’s odd, otherwise replace it with 0.

Using the operator corresponding to the position of the north pointing dial (starting with AND = 1), find the truth values of each pair; the encrypted letter depends on whether each is true or false.

B1B2AND(P1)OR(P2)XOR(P3)⇒(P4)NAND(P5)NOR(P6)XNOR(P7)⇐(P8)
11TTFTFFTT
10FTTFTFFT
01FTTTTFFF
00FFFTTTTT

Atbash > Logic (lit)

LetterZYXWVUTSRQPONMLKJIHGFEDCBA
TrueUFZWDBVCLSHIJMNQGXKYTEOPRA
FalseNVYPWAHOQCMUGFDIRLTXBSKZJE

Logic > Atbash (unlit)

LetterABCDEFGHIJKLMNOPQRSTUVWXYZ
TrueFUADWYEXOHSRQNMJTCPBGVLKIZ
FalseMEBKDZSLJXNFTUWRIOGCYHPAQV


1/NE: Caesar Cipher

Each letter in the word has been shifted right(+) through the alphabet by the number of 45° clockwise rotations, of the individual dials.

If the LED of NE dial is lit, each letter is then shifted right(+) by the position of the dial corresponding to this cipher.
Otherwise, each letter is then shifted left(-) by the position of the NE dial.

2/E: Playfair Cipher

    The indexing of the lists start at zero.
  • If the last dial is pointing east, use the word corresponding to R1.
    Otherwise, use the word corresponding Rn+1.
  • If there are less than three unique ports on the bomb, use the keyword from List A
    Otherwise, use the keyword from List B.
  • The keyword gives the first ten letters of the keysquare.
    • If the LED corresponding to this cipher is lit, the keyword is entered into the keysquare in reverse reading order.
    • Otherwise, the keyword is entered into the keysquare in reading order.
  • The word is split into four pairs of letters.
  • Each pair of letters is altered:
    • If both letters are the same, the encrypted pair is two of the letter diametrically opposite in the keysquare.
    • Otherwise, normal rules from Playfair Cycle applies.

Important:

  • If the pair of letters is XX, the pair is unchanged by the cipher.
  • If the pair of letters is either X# or #X, where # is not X, the X is changed to the other letter, forming a double letter pair, and enciphered normally.
    Then, the new letter is changed back to an X.
ListKeywordKW Reversed (lit)Remaining letters
A0ALGORITHMSSMHTIROGLABCDEFJKNPQUVWYZ
A1AUTHORIZEDDEZIROHTUABCFGJKLMNPQSVWY
A2BLUEPRINTSSTNIRPEULBACDFGHJKMOQVWYZ
A3DESPICABLYYLBACIPSEDFGHJKMNOQRTUVWZ
A4FORMIDABLEELBADIMROFCGHJKNPQSTUVWYZ
A5HYPERBOLICCILOBREPYHADFGJKMNQSTUVWZ
A6IMPORTANCEECNATROPMIBDFGHJKLQSUVWYZ
A7LABYRINTHSSHTNIRYBALCDEFGJKMOPQUVWZ
B0WANDERLUSTTSULREDNAWBCFGHIJKMOPQVYZ
B1VANQUISHEDDEHSIUQNAVBCFGJKLMOPRTWYZ
B2ULTRASONICCINOSARTLUBDEFGHJKMPQVWYZ
B3SCRAMBLINGGNILBMARCSDEFHJKOPQTUVWYZ
B4PRECAUTIONNOITUACERPBDFGHJKLMQSVWYZ
B5OSTRACIZEDDEZICARTSOBFGHJKLMNPQUVWY
B6METHODICALLACIDOHTEMBFGJKNPQRSUVWYZ
B7MAGNITUDESSEDUTINGAMBCFHJKLOPQRVWYZ

3/SE: Pigpen Cipher

Normal rules from Pigpen Cycle applies.

If the LED corresponding to this cipher is unlit, use cipher I.
Otherwise, use cipher II.





4/S: ChaoCipher

  • The two lists give the keywords for two 5x5 (not really) keysquares, the keyword from List A is used for the first keysquare and the keyword from List B is used for the second:
    • If the sum of serial number is more than 9,
      A = Position of dial - 1
      B = Rn-1.
    • Otherwise,
      B = Position of dial - 1
      A = Rn-1.
    • If the dial is first, Rn-1 = R8 .
  • These keywords are used to construct two cipher alphabets where each keyword preceeds the remaining sixteen letters.
  • For each letter, from left to right, consider the status of the LED below the dial in its position:
    • If the status of the LED of the south dial is the same, the second cipher alphabet is shifted to the left by the number of 45° rotations from north to where the dial is pointing.
    • Otherwise, the first cipher alphabet is shifted to the left by the number of 45° rotations from north to where the dial is pointing.
  • Find the unencrypted letter in the first cipher alphabet.
    The encrypted letter is in the same position as this letter in the second cipher alphabet.

Note: The shifted alphabets are not reset after each letter is encrypted.

ListKeywordRemaining lettersListKeywordRemaining letters
A0AFTERSHOCKBDGIJLMNPQUVWXYZB0DOWNSTREAMBCFGHIJKLPQUVXYZ
A1DESTROYINGABCFHJKLMPQUVWXZB1EMORDNILAPBCFGHJKQSTUVWXYZ
A2DUPLICATESBFGHJKMNOQRVWXYZB2FLASHPOINTBCDEGJKMQRUVWXYZ
A3FARSIGHTEDBCJKLMNOPQUVWXYZB3INTRODUCESABFGHJKLMPQVWXYZ
A4GRACIOUSLYBDEFHJKMNPQTVWXZB4PATHFINDERBCGJKLMOQSUVWXYZ
A5INFAMOUSLYBCDEGHJKPQRTVWXZB5QUADRICEPSBFGHJKLMNOTVWXYZ
A6NIGHTMARESBCDFJKLOPQUVWXYZB6TRAPEZOIDSBCFGHJKLMNQUVWXY
A7PALINDROMEBCFGHJKQSTUVWXYZB7WAVERINGLYBCDFHJKMOPQSTUXZ

5/SW: Monoalphabetic Substitution Cipher

The position of the dial corresponds to which of the eight words in the list below is the keyword for this cipher:

If the LED is lit, the remaining thirteen letters of the alphabet are left in the reverse alphabetical order.
Otherwise, the remaining thirteen letters are positioned in alphabetical order.

  • If there are an even number of batteries, Keyword > Letters.
  • Otherwise, Letters > Keyword.

Each letter of the alphabet is mapped onto the letter of the cipher alphabet with the same alphabetic position.
The letters in the word change accordingly with these mappings.

To decrypt, find the letter in the sequence, determine the position of the letter in the sequence, then swap the letter corresponding to its alphabetic position.

Pos.KeywordRemaining letters (unlit)Remaining Letters (lit)
1DOCUMENTARILYBFGHJKPQSVWXZZXWVSQPKJHGFB
2FLAMETHROWINGBCDJKPQSUVXYZZYXVUSQPKJDCB
3FLOWCHARTINGSBDEJKMPQUVXYZZYXVUQPMKJEDB
4HYDROMAGNETICBFJKLPQSUVWXZZXWVUSQPLKJFB
5METALWORKINGSBCDFHJPQUVXYZZYXVUQPJHFDCB
6MULTIBRANCHEDFGJKOPQSVWXYZZYXWVSQPOKJGF
7TROUBLEMAKINGCDFHJPQSVWXYZZYXWVSQPJHFDC
8UNPREDICTABLYFGHJKMOQSVWXZZXWVSQOMKJHGF

6/W: Hill Cipher

Normal rules for Hill Cycle applies.

If there are more lit than unlit indicators, use List A.
Otherwise, use List B.

The keyword used depends on the rotations of the dials adjacent to the one corresponding to this cipher:

    The indexing of the lists start at zero.
  • If the first dial is pointing west, use the keyword corresponding to 6 + R2.
  • If the last dial is pointing west, use the keyword corresponding to 6 + R7.
  • Otherwise, use the keyword corresponding to Rn-1 + Rn+1.
If the LED corresponding to this cipher is lit, the matrix is then transposed, swapping its top-right and bottom-left entries.
ListKeywordKey MatrixNListKeywordKey MatrixN
A0AEON1-5-15-1423B0BOMB2-15-13-223
A1COPY3-15-16-2523B1BUSY2-21-19-257
A2EACH5-1-3-819B2DICE4-9-3-511
A3GOOD7-15-15-419B3FAUX6-1-21-2411
A4IOTA9-15-20-15B4HUSK8-21-19-111
A5KILO11-9-12-1521B5JUKE10-21-11-51
A6MARK13-1-18-115 B6LIMA12-9-13-125
A7ONCE15-14-3-515B7LOCI12-15-3-919
A8QUIT17-21-9-205B8NAME14-1-13-521
A9RIOT18-9-15-2023B9PUSH16-21-19-87
A10SYNC19-25-14-311B10RISE18-9-19-517
A11UNDO21-14-4-1525B11TASK20-1-19-1111
A12WORK23-15-18-113B12VOID22-15-9-421
A13YEAR24-5-1-189B13XYST24-25-19-2021
A14ZEAL26-5-1-125B14ZOOM26-15-15-133

7/NW: Bitshift Cipher

Find the 3 digit binary representations the numbers of rotations, starting from north, of each of the dials.

If the LED corresponding to a dial is lit, swap the 0s for 1s and the 1s for 0s in its binary representation.

Combine all of the binary representations together, from left to right.
Prepend a 0 and append a 1 to the combined binary representations to produce a 26 bit string.

Separate the alphabet into two sets, depending on whether each letter’s alphabetic position in the string of bits is a 1 or a 0.
The letters in these sets remain in alphabetical order.

If the LED corresponding to the NW dial is lit, each letter in the word is shifted to the right(+) by the position of the NW dial.
Otherwise, each letter is shifted to the left(-) by the position of the NW dial.

Example:
ABCDEFGH
*_*_*_*_ (LED)
01234567 (Rotations)
0 000 001 010 011 100 101 110 111 1 (Before LED Rule)
0 111 001 101 011 011 101 001 111 1 (After LED Rule)


01110011010110111010011111
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shift right by 8: Decrypted: UOPQAESV

Keyword Table

ADVANCEDADVERTEDADVOCATEADDITIONALLOCATEALLOTYPEALLOTTEDALTERING
PROGRESSZYGOTENEQUARTICSLINKAGESQUICKESTORDERINGUNDOINGSZUGZWANG
BINARIESBINORMALBINOMIALBILLIONSBULKHEADBULLHORNBULLETEDBULWARKS
YOKOZUNACOMMANDOGLOOMINGTRICKIERGATEWAYSINCOMINGZYGOMATAFORMULAE
CIPHEREDCIRCUITSCONNECTSCONQUERSCOMMANDOCOMPILERCOMPUTERCONTINUE
BULKHEADRELATIONLINKWORKNANOTUBEMONOTONEYIELDINGILLUMINEKILOBYTE
DECRYPTSDECEIVEDDECIMATEDIVISIONDISCOVERDISCRETEDISPATCHDISPOSAL
NANOBOTSQUINTICSZIGZAGGYMONOMIALULTERIORKNUCKLEDUNDERWAYULTRARED
ENCIPHERENCRYPTSENCODINGENTRANCEEQUALISEEQUATORSEQUATIONEQUIPPED
JUNKYARDQUADRANTTRIANGLERELAYINGNANOGRAMCONNECTSINDICATEBINORMAL
FINALISEFINISHEDFINDINGSFINNICKYFORMULAEFORTUNESFORTRESSFORWARDS
DISCRETEJUNCTIONKILOWATTROTATIONPOSITRONDISPATCHENCIPHERSTANDOUT
GARRISONGARNEREDGATEPOSTGATEWAYSGAUNTLETGAMBLINGGATHEREDGLOOMING
STOCKADEFINDINGSADVANCEDJOURNEYSSTOPPINGLANDMARKEQUATORSVICELESS
HAZARDEDHAZINESSHOTLINKSHOTHEADSHUNDREDSHUNKEREDHUNTSMANHUNTRESS
DISCOVERJUNCTURETOGETHERGARRISONWHATNOTSDIVISIONTOGGLINGYEASAYER
INCOMINGINDICATEINDIRECTINDIGOESILLUDINGILLUSIONILLUSORYILLUMINE
VENOMOUSFORTUNESOBSERVEDQUITTERSHUNKEREDHOTHEADSTOMOGRAMKNOWABLE
JIGSAWEDJIMMYINGJOURNEYSJOUSTINGJUNCTIONJUNCTUREJUNKYARDJUDGMENT
YEARNINGTRIGONALVOLITIONDECRYPTSLABELINGSTARTINGOCTUPLESROTATORS
KILOWATTKILOVOLTKILOBYTEKINETICSKNOCKINGKNOCKOUTKNOWABLEKNUCKLED
POSITIVEBILLIONSWHATEVERFINALISEENCRYPTSOBSTACLEENCODINGADVOCATE
LANGUAGELANDMARKLIMITINGLINEARLYLINGEREDLINKAGESLINKWORKLABELING
CONQUERSEQUATIONGATEPOSTILLUSIONQUIRKISHNUMERATESTANDARDPOSTSYNC
MONOGRAMMONOLITHMONOMIALMONOTONEMULTITONMULTIPLYMULCTINGMULLIGAN
HUNTRESSWINNABLEZYMOLOGYILLUSORYVOLATILETOMAHAWKOCTANGLEADVERTED

Keyword Table cont.

NANOBOTSNANOGRAMNANOWATTNANOTUBENUMBEREDNUMEROUSNUMERALSNUMERATE
ZIPPEREDSTOCCATAVENDETTALINGEREDFINNICKYJUDGMENTHUNDREDSILLUDING
OCTANGLEOCTUPLESORDERINGORDINALSOBSERVEDOBSCUREDOBSTRUCTOBSTACLE
KNOCKINGWINGDINGUNDERLIELINEARLYTRIGGERSPROJECTSALLOTYPEYIELDERS
PROGRESSPROJECTSPROPHASEPROPHECYPOSTSYNCPOSSIBLEPOSITRONPOSITIVE
JIGSAWEDKILOVOLTALLOTTEDRELATIVEPROPHASECOMPILERLIMITINGNANOWATT
QUADRANTQUADRICSQUARTILEQUARTICSQUICKESTQUIRKISHQUINTICSQUITTERS
YELLOWEDMULCTINGGATHEREDWEAKENEDWHATNESSHAZINESSREVOLVEDENTRANCE
REVERSEDREVOLVEDREVEALEDROTATIONROTATORSRELATIONRELATIVERELAYING
FORTRESSWHATSITSBULLHORNGARNEREDINDIGOESLANGUAGECIRCUITSVOLTAGES
STARTINGSTANDARDSTANDOUTSTANZAICSTOCCATASTOCKADESTOPPINGSTOPWORD
REVERSEDJIMMYINGDECEIVEDQUARTILEGAUNTLETHAZARDEDMULTIPLYZYMOGRAM
TRICKIERTRIGONALTRIGGERSTRIANGLETOMOGRAMTOMAHAWKTOGGLINGTOGETHER
MULLIGANZIGGURATALLOCATENUMERALSBULWARKSBINARIESINDIRECTREVEALED
UNDERRUNUNDERWAYUNDERLIEUNDOINGSULTERIORULTIMATEULTRAREDULTRAHOT
JOUSTINGVICINITYQUADRICSMONOLITHORDINALSKNOCKOUTNUMEROUSSTOPWORD
VENOMOUSVENDETTAVICINITYVICELESSVOLITIONVOLTAGESVOLATILEVOLUMING
UNDERRUNDISPOSALWEAPONEDHUNTSMANBULLETEDALTERINGMONOGRAMPOSSIBLE
WEAKENEDWEAPONEDWINGDINGWINNABLEWHATEVERWHATNESSWHATNOTSWHATSITS
EQUALISEOBSTRUCTCOMPUTERSTANZAICDECIMATEEQUIPPEDBINOMIALYEARLONG
YELLOWEDYEARLONGYEARNINGYEASAYERYIELDINGYIELDERSYOKOZUNAYOURSELF
CIPHEREDCONTINUEKINETICSFORWARDSADDITIONFINISHEDGAMBLINGMULTITON
ZIPPEREDZIGGURATZIGZAGGYZUGZWANGZYGOMATAZYGOTENEZYMOLOGYZYMOGRAM
VOLUMINGULTIMATEHOTLINKSNUMBEREDPROPHECYYOURSELFULTRAHOTOBSCURED