Eliminations by Category
Eliminations organized by cipher type. Each record includes what was tested, results, what it doesn’t rule out, and a command to verify the result yourself.
Bespoke
Non-standard methods inspired by the physical sculpture or military cipher systems. These approaches don't fit neatly into classical categories. Includes DRYAD charts, Morse code analysis, and coordinate-based approaches.
Fractionation
Methods that break each letter into smaller pieces (like grid coordinates), scramble those pieces, then reassemble them into new letters. Includes Bifid, Playfair, Four-Square, and ADFGVX.
Key Models
Different ways to generate the secret key: from a passage in a book, from a date, from a mathematical formula, or from the sculpture itself. Includes running keys, autokey, and keyword-derived approaches.
Multi Layer
Combined approaches that stack multiple encryption steps. For example, replacing letters first, then scrambling their order. Includes null extraction, cascaded layers, and joint optimization.
Substitution
Methods that replace each letter with a different letter using a key or pattern, like a secret alphabet. Includes Vigenère, Beaufort, Quagmire, Hill, and more.
Transposition
Methods that scramble the order of letters without changing them, like writing a message into a grid and reading it back in a different order. Includes columnar, rail fence, route, and grille ciphers.