Bespoke
Non-standard methods inspired by the physical sculpture or military cipher systems. These approaches don't fit neatly into classical categories. Includes DRYAD charts, Morse code analysis, and coordinate-based approaches.
What we tested: VIC ciphers, DRYAD military charts, Morse code interpretations, coordinate-based approaches, and many other non-standard ideas have all been tested. The evidence increasingly points toward something outside textbook cipher families. Sanborn stated the method is "bespoke but hand-executable." The surviving possibilities include a procedural cipher using Sanborn's own encoding charts (the original was sold at auction in 2025 for $962,500).
123 eliminations recorded.
| Title | Configs | Best | Verdict | Tier |
|---|---|---|---|---|
|
VIC cipher narrative-driven sweep: Berlin Wall date + FIVE + NDYAHR top-row + 100K keygroups
VIC cipher narrative-driven sweep: Berlin Wall date + FIVE + NDYAHR top-row + 100K keygroups — using military or Cold War era cipher systems (VIC, DRY… |
922,400,000 | 9/24 (0.0) | NOISE | N/A |
|
VIC non-standard key schedule (personal_no as offset, CB alphabet from chain-add sort)
VIC non-standard key schedule (personal_no as offset, CB alphabet from chain-add sort) — using military or Cold War era cipher systems (VIC, DRYAD, on… |
256,816,000 | 10/24 (0.0) | NOISE | N/A |
|
2D matrix keying (punch-card model)
2D matrix keying (punch-card model) — using methods based on the physical properties of the sculpture itself. 26.1 million key/parameter combinations … |
26,142,912 | 9/24 (0.0) | NOISE | N/A |
|
Interrupted Key Vig
Interrupted Key Vig — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 14.7 million key/parameter combinations were te… |
14,700,624 | 0/24 (0.0) | NOISE | N/A |
|
Weltzeituhr orrery (solar system model) as K4 key material
Weltzeituhr orrery (solar system model) as K4 key material — using methods based on the physical properties of the sculpture itself. 2.4 million key/p… |
2,357,725 | 7/24 (0.0) | NOISE | N/A |
|
NDYAHR raised letters as VIC cipher keygroup digits
NDYAHR raised letters as VIC cipher keygroup digits — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 1.7 million key… |
1,664,451 | 0/24 (0.0) | NOISE | N/A |
|
Full VIC cipher pipeline (key generation + CB + double transposition)
Full VIC cipher pipeline (key generation + CB + double transposition) — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.… |
1,311,903 | 0/24 (0.0) | NOISE | N/A |
|
Sculpture Path Search
Sculpture Path Search — using methods based on the physical properties of the sculpture itself. 977 thousand key/parameter combinations were tested. |
976,765 | 0/24 (0.0) | NOISE | N/A |
|
DDR-era (1989) Weltzeituhr city list as K4 key material
DDR-era (1989) Weltzeituhr city list as K4 key material — using methods based on the physical properties of the sculpture itself. 636 thousand key/par… |
636,006 | 0/24 (0.0) | NOISE | N/A |
|
VIC cipher with K2 coordinate digits as direct Line-H
VIC cipher with K2 coordinate digits as direct Line-H — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 473 thousand … |
472,800 | 0/24 (0.0) | NOISE | N/A |
|
ABSCISSA=x-coordinate hypothesis (addendum to E-ROMAN-04)
ABSCISSA=x-coordinate hypothesis (addendum to E-ROMAN-04) — using methods based on the physical properties of the sculpture itself. 348 thousand key/p… |
348,048 | 7/24 (0.0) | NOISE | N/A |
|
Anomaly-derived cipher parameters
Anomaly-derived cipher parameters — using methods based on the physical properties of the sculpture itself. 227 thousand key/parameter combinations we… |
226,789 | 6/24 (0.0) | NOISE | N/A |
|
Berlin Clock Perm Results
Berlin Clock Perm Results — using methods based on the physical properties of the sculpture itself. 188 thousand key/parameter combinations were teste… |
188,232 | 0/24 (0.0) | NOISE | N/A |
|
ABSCISSA/PALIMPSEST/KRYPTOS coordinate-based triple transposition
ABSCISSA/PALIMPSEST/KRYPTOS coordinate-based triple transposition — using methods based on the physical properties of the sculpture itself. 188 thousa… |
188,184 | 8/24 (0.0) | NOISE | N/A |
|
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi… |
174,906 | 0/24 (0.0) | NOISE | N/A |
|
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi… |
174,906 | 0/24 (0.0) | NOISE | N/A |
|
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi… |
174,906 | 0/24 (0.0) | NOISE | N/A |
|
S
S — using a method based on non-standard or physically-inspired methods. 77 thousand key/parameter combinations were tested. |
76,582 | 6/24 (0.0) | NOISE | N/A |
|
S
S — using methods based on the physical properties of the sculpture itself. 71 thousand key/parameter combinations were tested. |
71,038 | 6/24 (0.0) | NOISE | N/A |
|
Comprehensive Roman Numeral Hypothesis
Comprehensive Roman Numeral Hypothesis — using a method based on non-standard or physically-inspired methods. 67 thousand key/parameter combinations w… |
66,648 | 6/24 (0.0) | NOISE | N/A |
|
Installation Key Split Combiner
Installation Key Split Combiner — using methods based on the physical properties of the sculpture itself. 52 thousand key/parameter combinations were … |
51,534 | 6/24 (0.0) | NOISE | N/A |
|
NATO/COMSEC protocol keys (DRYAD, KA running key, chain addition)
NATO/COMSEC protocol keys (DRYAD, KA running key, chain addition) — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). E… |
30,000 | 5/24 (0.0) | NOISE | Tier 2 |
|
Team Physical Transpositions
Team Physical Transpositions — using methods based on the physical properties of the sculpture itself. 28 thousand key/parameter combinations were tes… |
28,160 | 6/24 (0.0) | NOISE | N/A |
|
Abscissa-derived linear keys
Abscissa-derived linear keys from physical sculpture layout — using methods based on the physical properties of the sculpture itself. Every possible c… |
25,000 | 5/24 (0.0) | NOISE | Tier 2 |
|
DRYAD-style matrix code lookup
DRYAD-style matrix code lookup using computationally reconstructed grids — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, e… |
15,000 | 3/24 (0.0) | NOISE | Tier 3 |
|
Roman numeral / coordinate-based decryption
Roman numeral / coordinate-based decryption using sculpture position data — using a method based on non-standard or physically-inspired methods. Every… |
10,000 | 4/24 (0.0) | NOISE | Tier 2 |
|
Soviet Threestep 20260328
Soviet Threestep 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 7 thousand key/parameter combinations wer… |
7,290 | 0/24 (0.0) | NOISE | N/A |
|
Weltzeituhr (World Clock) Berlin permutations
Weltzeituhr (World Clock) Berlin permutations as transposition or key source — using methods based on the physical properties of the sculpture itself.… |
6,000 | 4/24 (0.0) | NOISE | Tier 2 |
|
Wilson Prime Mask 20260324
Wilson Prime Mask 20260324 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations we… |
5,148 | 0/24 (0.0) | NOISE | N/A |
|
Wilson Prime Mask 20260328
Wilson Prime Mask 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations we… |
5,148 | 0/24 (0.0) | NOISE | N/A |
|
Misspelling-derived tableau reconstruction
Misspelling-derived tableau reconstruction from K1-K3 known errors — using a method based on non-standard or physically-inspired methods. Every possib… |
5,000 | 5/24 (0.0) | NOISE | Tier 2 |
|
Ubchi Null Insertion 20260328
Ubchi Null Insertion 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations… |
4,563 | 0/24 (0.0) | NOISE | N/A |
|
Grid-coordinate-derived substitution keys on 73-char column mask extract
Tested 150+ key derivation functions from (row, col) grid coordinates: row, col, row+col, row-col, |col-15|, modular keys, KRYPTOS keyword cycling, be… |
3,726 | 5/24 (0.0) | NOISE | Tier 2 |
|
Sanborn 2025 clue phrases as key material (periodic, running, columnar, combined)
Sanborn 2025 clue phrases as key material (periodic, running, columnar, combined) — using a method based on non-standard or physically-inspired method… |
2,233 | 6/24 (0.0) | NOISE | N/A |
|
Ct80 Cipher Attack
Ct80 Cipher Attack — using a method based on non-standard or physically-inspired methods. 2 thousand key/parameter combinations were tested. |
2,010 | 0/24 (0.0) | NOISE | N/A |
|
Null palette letters encode numbers via visual resemblance (leetspeak)
Null palette letters encode numbers via visual resemblance (leetspeak) — using a method based on non-standard or physically-inspired methods. 2 thousa… |
1,935 | 5/24 (0.0) | NOISE | N/A |
|
26 padding E's in K0 Morse code carry cipher information for K4
26 padding E's in K0 Morse code carry cipher information for K4 — using methods based on the physical properties of the sculpture itself. 445 key/para… |
445 | 5/24 (0.0) | NOISE | N/A |
|
Physically-motivated extraction masks on K4 CT
Physically-motivated extraction masks on K4 CT — using methods based on the physical properties of the sculpture itself. 379 key/parameter combination… |
379 | 0/24 (0.0) | NOISE | N/A |
|
Weltzeituhr procedural cipher + non-standard reading routes
Weltzeituhr procedural cipher + non-standard reading routes — using methods based on the physical properties of the sculpture itself. 377 key/paramete… |
377 | 0/24 (0.0) | NOISE | N/A |
|
ITA-2/Baudot mod-31 reflective encoding
ITA-2/Baudot mod-31 reflective encoding — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 288 key/parameter combinati… |
288 | 0/24 (0.0) | NOISE | N/A |
|
ITA-2/Baudot mod-31 reflective encoding
ITA-2/Baudot mod-31 reflective encoding — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 288 key/parameter combinati… |
288 | 0/24 (0.0) | NOISE | N/A |
|
Null value sequence OBKOGBOWWKWIWGZIG used as key material for K4 decryption
Null value sequence OBKOGBOWWKWIWGZIG used as key material for K4 decryption — using a method based on non-standard or physically-inspired methods. 14… |
144 | 24/24 (0.0) | NOISE | N/A |
|
S
S — using methods based on the physical properties of the sculpture itself. 43 key/parameter combinations were tested. |
43 | 0/24 (0.0) | NOISE | N/A |
|
'The point' = compass EAST → EASTNORTHEAST direction as key seed
'The point' = compass EAST → EASTNORTHEAST direction as key seed — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
One or more crib positions may be mis-indexed by ±1
One or more crib positions may be mis-indexed by ±1 — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Berlin Clock Route
Berlin Clock Route — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Map keystream Polybius coordinates to physical K4 grids
Map keystream Polybius coordinates to physical K4 grids — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Morse Indexed Alphabet
Morse Indexed Alphabet — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | ELIMINATED | N/A |
|
K4 keystream derived from physical paper fold/overlay operations
K4 keystream derived from physical paper fold/overlay operations — using methods based on the physical properties of the sculpture itself. |
N/A | 8/24 (0.0) | NOISE | N/A |
|
K5-inspired position-dependent cipher analysis
K5-inspired position-dependent cipher analysis — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Key derived from dates, coordinates, words, or sculpture features
Key derived from dates, coordinates, words, or sculpture features — using methods based on the physical properties of the sculpture itself. |
N/A | 6/24 (0.0) | NOISE | N/A |
|
Coordinate and date-derived key experiments
Coordinate and date-derived key experiments — using methods based on the physical properties of the sculpture itself. |
N/A | 8/24 (0.0) | NOISE | Tier 4 |
|
K2 Coordinate Key Generation
K2 Coordinate Key Generation — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Procedural Anomaly Attacks
Procedural Anomaly Attacks — using methods based on the physical properties of the sculpture itself. |
N/A | 7/24 (0.0) | NOISE | N/A |
|
Wsw Compass Attack
Wsw Compass Attack — using methods based on the physical properties of the sculpture itself. |
N/A | 7/24 (0.0) | NOISE | N/A |
|
Yar Anomaly Audit
Yar Anomaly Audit — using methods based on the physical properties of the sculpture itself. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
VIC Gap Close
VIC Gap Close — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 7/24 (0.0) | NOISE | N/A |
|
Sawtooth Mask
Sawtooth Mask — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Sawtooth Mask
Sawtooth Mask — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Col6 Defector Palette
Col6 Defector Palette — using a method based on non-standard or physically-inspired methods. Best match: 15/24 known letters — slightly above random, … |
N/A | 15/24 (0.0) | NOISE | N/A |
|
Crib Keystream Topology
Crib Keystream Topology — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Crossmodel Palette
Crossmodel Palette — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
DMPQ Exclusion Rule
DMPQ Exclusion Rule — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Index Mask
Palette Index Mask — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Enrichment Topology
Enrichment Topology — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
GKO Ap Analysis
GKO Ap Analysis — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
GKO Key Sweep
GKO Key Sweep — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
GKO Position Key
GKO Position Key — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
GKO Reverse Plaintext
GKO Reverse Plaintext — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Letter Shape Null Correlation
Letter Shape Null Correlation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Deep Followup
Palette Deep Followup — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Deep Investigation
Palette Deep Investigation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Ka Row Extremeness
Palette Ka Row Extremeness — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Mod35 Tiebreaker
Palette Mod35 Tiebreaker — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette NDYAHR Investigation
Palette NDYAHR Investigation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Null Separator
Palette Null Separator — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Null Separator
Palette Null Separator — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Position Rule Hunt
Palette Position Rule Hunt — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Reproducibility Audit
Palette Reproducibility Audit — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Palette Reverse Specificity
Palette Reverse Specificity — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
D13 Hybrid Exploitation
D13 Hybrid Exploitation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
AP-constrained pos 34-37 extension (pos 36 = null)
AP-constrained pos 34-37 extension (pos 36 = null) — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
S 47b
S 47b — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Ap Constrained SA
Ap Constrained SA — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Argenti Null Rule
Argenti Null Rule — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Berlin Cable Templates
Berlin Cable Templates — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Berlin Wall Crib Drag
Berlin Wall Crib Drag — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Error Hypothesis
Error Hypothesis — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Period6 Comprehensive
Period6 Comprehensive — using a method based on non-standard or physically-inspired methods. Best match: 16/24 known letters — slightly above random, … |
N/A | 16/24 (0.0) | NOISE | N/A |
|
Period6 P13 Deep
Period6 P13 Deep — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
TKAS
TKAS — using a method based on non-standard or physically-inspired methods. Best match: 19/24 known letters (statistically expected at this key length… |
N/A | 19/24 (0.0) | NOISE | N/A |
|
Fresh MCMC Attack
Fresh MCMC Attack — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Gap Filling Four Tasks
Gap Filling Four Tasks — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Phase 2: Global constant-difference rule sweep across all lags and deltas
Phase 2: Global constant-difference rule sweep across all lags and deltas — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Grid Key Generation
Grid Key Generation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Keystream Ap Followup
Keystream Ap Followup — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Keystream Ap Investigation
Keystream Ap Investigation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Keystream Ap Significance
Keystream Ap Significance — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Memory Audit
Memory Audit — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Positional keying via (pos%M, pos%N) lookup table
Positional keying via (pos%M, pos%N) lookup table — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Mod35 Table Derivation
Mod35 Table Derivation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Model B Deep Investigation
Model B Deep Investigation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Null Char Assignment
Null Char Assignment — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Null Insertion Structure
Null Insertion Structure — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Prosign Interleave Model
Prosign Interleave Model — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Statistical Appendix Bean
Statistical Appendix Bean — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Statistical Validation
Statistical Validation — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Stehle Delta4 Comprehensive
Stehle Delta4 Comprehensive — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Table Generation Deep
Table Generation Deep — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Ka 01 Keyed Tableau
Ka 01 Keyed Tableau — using non-standard encryption tables or lookup charts. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Ka 02 Extended Gaps
Ka 02 Extended Gaps — using non-standard encryption tables or lookup charts. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Tableau Keystream
Tableau Keystream — using non-standard encryption tables or lookup charts. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Tableau OTP
Tableau OTP — using non-standard encryption tables or lookup charts. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
Rowkey NDYAHR K2
Rowkey NDYAHR K2 — using a method based on non-standard or physically-inspired methods. Best match: 13/24 known letters — slightly above random, almos… |
N/A | 13/24 (0.0) | NOISE | N/A |
|
K3 NDYAHR Followup
K3 NDYAHR Followup — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
K3 CT contains a second hidden message via NDYAHR letter removal/modification
K3 CT contains a second hidden message via NDYAHR letter removal/modification — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
NDYAHR Blind Cryptanalysis
NDYAHR Blind Cryptanalysis — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
NDYAHR Displacement
NDYAHR Displacement — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
NDYAHR Paired Forces
NDYAHR Paired Forces — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |
|
S
S — using a method based on non-standard or physically-inspired methods. |
N/A | 0/24 (0.0) | NOISE | N/A |