671.0B+ configurations tested and eliminated

Bespoke

Non-standard methods inspired by the physical sculpture or military cipher systems. These approaches don't fit neatly into classical categories. Includes DRYAD charts, Morse code analysis, and coordinate-based approaches.

What we tested: VIC ciphers, DRYAD military charts, Morse code interpretations, coordinate-based approaches, and many other non-standard ideas have all been tested. The evidence increasingly points toward something outside textbook cipher families. Sanborn stated the method is "bespoke but hand-executable." The surviving possibilities include a procedural cipher using Sanborn's own encoding charts (the original was sold at auction in 2025 for $962,500).

123 eliminations recorded.

Title Configs Best Verdict Tier
VIC cipher narrative-driven sweep: Berlin Wall date + FIVE + NDYAHR top-row + 100K keygroups
VIC cipher narrative-driven sweep: Berlin Wall date + FIVE + NDYAHR top-row + 100K keygroups — using military or Cold War era cipher systems (VIC, DRY…
922,400,000 9/24 (0.0) NOISE N/A
VIC non-standard key schedule (personal_no as offset, CB alphabet from chain-add sort)
VIC non-standard key schedule (personal_no as offset, CB alphabet from chain-add sort) — using military or Cold War era cipher systems (VIC, DRYAD, on…
256,816,000 10/24 (0.0) NOISE N/A
2D matrix keying (punch-card model)
2D matrix keying (punch-card model) — using methods based on the physical properties of the sculpture itself. 26.1 million key/parameter combinations …
26,142,912 9/24 (0.0) NOISE N/A
Interrupted Key Vig
Interrupted Key Vig — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 14.7 million key/parameter combinations were te…
14,700,624 0/24 (0.0) NOISE N/A
Weltzeituhr orrery (solar system model) as K4 key material
Weltzeituhr orrery (solar system model) as K4 key material — using methods based on the physical properties of the sculpture itself. 2.4 million key/p…
2,357,725 7/24 (0.0) NOISE N/A
NDYAHR raised letters as VIC cipher keygroup digits
NDYAHR raised letters as VIC cipher keygroup digits — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 1.7 million key…
1,664,451 0/24 (0.0) NOISE N/A
Full VIC cipher pipeline (key generation + CB + double transposition)
Full VIC cipher pipeline (key generation + CB + double transposition) — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.…
1,311,903 0/24 (0.0) NOISE N/A
Sculpture Path Search
Sculpture Path Search — using methods based on the physical properties of the sculpture itself. 977 thousand key/parameter combinations were tested.
976,765 0/24 (0.0) NOISE N/A
DDR-era (1989) Weltzeituhr city list as K4 key material
DDR-era (1989) Weltzeituhr city list as K4 key material — using methods based on the physical properties of the sculpture itself. 636 thousand key/par…
636,006 0/24 (0.0) NOISE N/A
VIC cipher with K2 coordinate digits as direct Line-H
VIC cipher with K2 coordinate digits as direct Line-H — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 473 thousand …
472,800 0/24 (0.0) NOISE N/A
ABSCISSA=x-coordinate hypothesis (addendum to E-ROMAN-04)
ABSCISSA=x-coordinate hypothesis (addendum to E-ROMAN-04) — using methods based on the physical properties of the sculpture itself. 348 thousand key/p…
348,048 7/24 (0.0) NOISE N/A
Anomaly-derived cipher parameters
Anomaly-derived cipher parameters — using methods based on the physical properties of the sculpture itself. 227 thousand key/parameter combinations we…
226,789 6/24 (0.0) NOISE N/A
Berlin Clock Perm Results
Berlin Clock Perm Results — using methods based on the physical properties of the sculpture itself. 188 thousand key/parameter combinations were teste…
188,232 0/24 (0.0) NOISE N/A
ABSCISSA/PALIMPSEST/KRYPTOS coordinate-based triple transposition
ABSCISSA/PALIMPSEST/KRYPTOS coordinate-based triple transposition — using methods based on the physical properties of the sculpture itself. 188 thousa…
188,184 8/24 (0.0) NOISE N/A
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi…
174,906 0/24 (0.0) NOISE N/A
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi…
174,906 0/24 (0.0) NOISE N/A
ITA-2/Baudot XOR with key-stepping
ITA-2/Baudot XOR with key-stepping — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 175 thousand key/parameter combi…
174,906 0/24 (0.0) NOISE N/A
S
S — using a method based on non-standard or physically-inspired methods. 77 thousand key/parameter combinations were tested.
76,582 6/24 (0.0) NOISE N/A
S
S — using methods based on the physical properties of the sculpture itself. 71 thousand key/parameter combinations were tested.
71,038 6/24 (0.0) NOISE N/A
Comprehensive Roman Numeral Hypothesis
Comprehensive Roman Numeral Hypothesis — using a method based on non-standard or physically-inspired methods. 67 thousand key/parameter combinations w…
66,648 6/24 (0.0) NOISE N/A
Installation Key Split Combiner
Installation Key Split Combiner — using methods based on the physical properties of the sculpture itself. 52 thousand key/parameter combinations were …
51,534 6/24 (0.0) NOISE N/A
NATO/COMSEC protocol keys (DRYAD, KA running key, chain addition)
NATO/COMSEC protocol keys (DRYAD, KA running key, chain addition) — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). E…
30,000 5/24 (0.0) NOISE Tier 2
Team Physical Transpositions
Team Physical Transpositions — using methods based on the physical properties of the sculpture itself. 28 thousand key/parameter combinations were tes…
28,160 6/24 (0.0) NOISE N/A
Abscissa-derived linear keys
Abscissa-derived linear keys from physical sculpture layout — using methods based on the physical properties of the sculpture itself. Every possible c…
25,000 5/24 (0.0) NOISE Tier 2
DRYAD-style matrix code lookup
DRYAD-style matrix code lookup using computationally reconstructed grids — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, e…
15,000 3/24 (0.0) NOISE Tier 3
Roman numeral / coordinate-based decryption
Roman numeral / coordinate-based decryption using sculpture position data — using a method based on non-standard or physically-inspired methods. Every…
10,000 4/24 (0.0) NOISE Tier 2
Soviet Threestep 20260328
Soviet Threestep 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 7 thousand key/parameter combinations wer…
7,290 0/24 (0.0) NOISE N/A
Weltzeituhr (World Clock) Berlin permutations
Weltzeituhr (World Clock) Berlin permutations as transposition or key source — using methods based on the physical properties of the sculpture itself.…
6,000 4/24 (0.0) NOISE Tier 2
Wilson Prime Mask 20260324
Wilson Prime Mask 20260324 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations we…
5,148 0/24 (0.0) NOISE N/A
Wilson Prime Mask 20260328
Wilson Prime Mask 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations we…
5,148 0/24 (0.0) NOISE N/A
Misspelling-derived tableau reconstruction
Misspelling-derived tableau reconstruction from K1-K3 known errors — using a method based on non-standard or physically-inspired methods. Every possib…
5,000 5/24 (0.0) NOISE Tier 2
Ubchi Null Insertion 20260328
Ubchi Null Insertion 20260328 — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 5 thousand key/parameter combinations…
4,563 0/24 (0.0) NOISE N/A
Grid-coordinate-derived substitution keys on 73-char column mask extract
Tested 150+ key derivation functions from (row, col) grid coordinates: row, col, row+col, row-col, |col-15|, modular keys, KRYPTOS keyword cycling, be…
3,726 5/24 (0.0) NOISE Tier 2
Sanborn 2025 clue phrases as key material (periodic, running, columnar, combined)
Sanborn 2025 clue phrases as key material (periodic, running, columnar, combined) — using a method based on non-standard or physically-inspired method…
2,233 6/24 (0.0) NOISE N/A
Ct80 Cipher Attack
Ct80 Cipher Attack — using a method based on non-standard or physically-inspired methods. 2 thousand key/parameter combinations were tested.
2,010 0/24 (0.0) NOISE N/A
Null palette letters encode numbers via visual resemblance (leetspeak)
Null palette letters encode numbers via visual resemblance (leetspeak) — using a method based on non-standard or physically-inspired methods. 2 thousa…
1,935 5/24 (0.0) NOISE N/A
26 padding E's in K0 Morse code carry cipher information for K4
26 padding E's in K0 Morse code carry cipher information for K4 — using methods based on the physical properties of the sculpture itself. 445 key/para…
445 5/24 (0.0) NOISE N/A
Physically-motivated extraction masks on K4 CT
Physically-motivated extraction masks on K4 CT — using methods based on the physical properties of the sculpture itself. 379 key/parameter combination…
379 0/24 (0.0) NOISE N/A
Weltzeituhr procedural cipher + non-standard reading routes
Weltzeituhr procedural cipher + non-standard reading routes — using methods based on the physical properties of the sculpture itself. 377 key/paramete…
377 0/24 (0.0) NOISE N/A
ITA-2/Baudot mod-31 reflective encoding
ITA-2/Baudot mod-31 reflective encoding — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 288 key/parameter combinati…
288 0/24 (0.0) NOISE N/A
ITA-2/Baudot mod-31 reflective encoding
ITA-2/Baudot mod-31 reflective encoding — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.). 288 key/parameter combinati…
288 0/24 (0.0) NOISE N/A
Null value sequence OBKOGBOWWKWIWGZIG used as key material for K4 decryption
Null value sequence OBKOGBOWWKWIWGZIG used as key material for K4 decryption — using a method based on non-standard or physically-inspired methods. 14…
144 24/24 (0.0) NOISE N/A
S
S — using methods based on the physical properties of the sculpture itself. 43 key/parameter combinations were tested.
43 0/24 (0.0) NOISE N/A
'The point' = compass EAST → EASTNORTHEAST direction as key seed
'The point' = compass EAST → EASTNORTHEAST direction as key seed — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
One or more crib positions may be mis-indexed by ±1
One or more crib positions may be mis-indexed by ±1 — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Berlin Clock Route
Berlin Clock Route — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) NOISE N/A
Map keystream Polybius coordinates to physical K4 grids
Map keystream Polybius coordinates to physical K4 grids — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) NOISE N/A
Morse Indexed Alphabet
Morse Indexed Alphabet — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) ELIMINATED N/A
K4 keystream derived from physical paper fold/overlay operations
K4 keystream derived from physical paper fold/overlay operations — using methods based on the physical properties of the sculpture itself.
N/A 8/24 (0.0) NOISE N/A
K5-inspired position-dependent cipher analysis
K5-inspired position-dependent cipher analysis — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) NOISE N/A
Key derived from dates, coordinates, words, or sculpture features
Key derived from dates, coordinates, words, or sculpture features — using methods based on the physical properties of the sculpture itself.
N/A 6/24 (0.0) NOISE N/A
Coordinate and date-derived key experiments
Coordinate and date-derived key experiments — using methods based on the physical properties of the sculpture itself.
N/A 8/24 (0.0) NOISE Tier 4
K2 Coordinate Key Generation
K2 Coordinate Key Generation — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) NOISE N/A
Procedural Anomaly Attacks
Procedural Anomaly Attacks — using methods based on the physical properties of the sculpture itself.
N/A 7/24 (0.0) NOISE N/A
Wsw Compass Attack
Wsw Compass Attack — using methods based on the physical properties of the sculpture itself.
N/A 7/24 (0.0) NOISE N/A
Yar Anomaly Audit
Yar Anomaly Audit — using methods based on the physical properties of the sculpture itself.
N/A 0/24 (0.0) NOISE N/A
VIC Gap Close
VIC Gap Close — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 7/24 (0.0) NOISE N/A
Sawtooth Mask
Sawtooth Mask — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 0/24 (0.0) NOISE N/A
Sawtooth Mask
Sawtooth Mask — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 0/24 (0.0) NOISE N/A
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 0/24 (0.0) NOISE N/A
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 0/24 (0.0) NOISE N/A
Wheatstone Clock
Wheatstone Clock — using military or Cold War era cipher systems (VIC, DRYAD, one-time pads, etc.).
N/A 0/24 (0.0) NOISE N/A
Col6 Defector Palette
Col6 Defector Palette — using a method based on non-standard or physically-inspired methods. Best match: 15/24 known letters — slightly above random, …
N/A 15/24 (0.0) NOISE N/A
Crib Keystream Topology
Crib Keystream Topology — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Crossmodel Palette
Crossmodel Palette — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
DMPQ Exclusion Rule
DMPQ Exclusion Rule — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Index Mask
Palette Index Mask — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Enrichment Topology
Enrichment Topology — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
GKO Ap Analysis
GKO Ap Analysis — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
GKO Key Sweep
GKO Key Sweep — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
GKO Position Key
GKO Position Key — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
GKO Reverse Plaintext
GKO Reverse Plaintext — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Letter Shape Null Correlation
Letter Shape Null Correlation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Deep Followup
Palette Deep Followup — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Deep Investigation
Palette Deep Investigation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Ka Row Extremeness
Palette Ka Row Extremeness — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Mod35 Tiebreaker
Palette Mod35 Tiebreaker — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette NDYAHR Investigation
Palette NDYAHR Investigation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Null Separator
Palette Null Separator — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Null Separator
Palette Null Separator — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Position Rule Hunt
Palette Position Rule Hunt — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Reproducibility Audit
Palette Reproducibility Audit — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Palette Reverse Specificity
Palette Reverse Specificity — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
D13 Hybrid Exploitation
D13 Hybrid Exploitation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
AP-constrained pos 34-37 extension (pos 36 = null)
AP-constrained pos 34-37 extension (pos 36 = null) — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
S 47b
S 47b — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Ap Constrained SA
Ap Constrained SA — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Argenti Null Rule
Argenti Null Rule — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Berlin Cable Templates
Berlin Cable Templates — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Berlin Wall Crib Drag
Berlin Wall Crib Drag — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Error Hypothesis
Error Hypothesis — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Period6 Comprehensive
Period6 Comprehensive — using a method based on non-standard or physically-inspired methods. Best match: 16/24 known letters — slightly above random, …
N/A 16/24 (0.0) NOISE N/A
Period6 P13 Deep
Period6 P13 Deep — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
TKAS
TKAS — using a method based on non-standard or physically-inspired methods. Best match: 19/24 known letters (statistically expected at this key length…
N/A 19/24 (0.0) NOISE N/A
Fresh MCMC Attack
Fresh MCMC Attack — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Gap Filling Four Tasks
Gap Filling Four Tasks — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Phase 2: Global constant-difference rule sweep across all lags and deltas
Phase 2: Global constant-difference rule sweep across all lags and deltas — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Grid Key Generation
Grid Key Generation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Keystream Ap Followup
Keystream Ap Followup — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Keystream Ap Investigation
Keystream Ap Investigation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Keystream Ap Significance
Keystream Ap Significance — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Memory Audit
Memory Audit — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Positional keying via (pos%M, pos%N) lookup table
Positional keying via (pos%M, pos%N) lookup table — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Mod35 Table Derivation
Mod35 Table Derivation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Model B Deep Investigation
Model B Deep Investigation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Null Char Assignment
Null Char Assignment — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Null Insertion Structure
Null Insertion Structure — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Prosign Interleave Model
Prosign Interleave Model — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Statistical Appendix Bean
Statistical Appendix Bean — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Statistical Validation
Statistical Validation — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Stehle Delta4 Comprehensive
Stehle Delta4 Comprehensive — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Table Generation Deep
Table Generation Deep — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
Ka 01 Keyed Tableau
Ka 01 Keyed Tableau — using non-standard encryption tables or lookup charts.
N/A 0/24 (0.0) NOISE N/A
Ka 02 Extended Gaps
Ka 02 Extended Gaps — using non-standard encryption tables or lookup charts.
N/A 0/24 (0.0) NOISE N/A
Tableau Keystream
Tableau Keystream — using non-standard encryption tables or lookup charts.
N/A 0/24 (0.0) NOISE N/A
Tableau OTP
Tableau OTP — using non-standard encryption tables or lookup charts.
N/A 0/24 (0.0) NOISE N/A
Rowkey NDYAHR K2
Rowkey NDYAHR K2 — using a method based on non-standard or physically-inspired methods. Best match: 13/24 known letters — slightly above random, almos…
N/A 13/24 (0.0) NOISE N/A
K3 NDYAHR Followup
K3 NDYAHR Followup — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
K3 CT contains a second hidden message via NDYAHR letter removal/modification
K3 CT contains a second hidden message via NDYAHR letter removal/modification — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
NDYAHR Blind Cryptanalysis
NDYAHR Blind Cryptanalysis — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
NDYAHR Displacement
NDYAHR Displacement — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
NDYAHR Paired Forces
NDYAHR Paired Forces — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A
S
S — using a method based on non-standard or physically-inspired methods.
N/A 0/24 (0.0) NOISE N/A