Challenges (1) 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Challenges

Challenges
Challenges
Challenge 1 : Who is the killer…?
In a chilling turn of events, tragedy struck yesterday when Walaa was found dead. As investigators
scoured the crime scene for clues, they discovered an enigmatic encrypted message concealed near her
lifeless body . They believe that this message holds crucial information about the killer's identity .
Investigators are baffled, and suspicion falls on Saad, Nancy, Zeinab, Farah, and Reem. Time is ticking
as detectives race to decrypt the message and uncover the truth. Will justice prevail and the killer be
unmasked? The answers lie within the encrypted message. The message consists of two parts that have
been encrypted using different techniques. Experts in cryptography believe that the first part of the
message is encrypted using the Rail Fence Cipher, while the second part is encrypted using the
Row/Column Cipher.
Hint : The phone number belonging to Walaa was included in the encrypted message for unknown
reasons.
Here is the message:
PTTTIUSPUYAATNINHSSORATPOTNTYEOIYLORI
UEURBEOTLOMEAOSFTAIODZKHGRLCRWTNYJCTIIDICLYELSEVSRONAOESLNRLS
NILUITLDEETYOERSITREEUUSDWX
Challenge 2 : CPV
In the heart of the kingdom of Cryptonia, nestled amidst rolling hills and lush forests, a shadow looms
over the tranquil streets. The town Cryptonia, once known for its peaceful way of life, now finds itself
embroiled in the midst of a bitter war with a neighbouring kingdom.
As the conflict rages on, whispers of espionage and intrigue fill the air, and rumors abound of stolen
messages and covert operations. Determined to uncover the truth and protect their homeland from
further harm, the leaders of Cryptonia issue a call to the town's most skilled cryptographers to aid in the
investigation.
The stolen message :
“IRUHVW EXUQLQJ .
EDAQBNRGBPKYORXBANOVXPFYUZ.
VBVTQB YO LCPB .”
NB: Experts have discovered that the 3 substitution techniques used must be : caesar cipher-playfair
cipher-vigenere cipher .
and key(s) used contain these letters: I-C-O-R-V-T-Y .

You might also like