671.0B+ configurations tested and eliminated

Multi Layer

Combined approaches that stack multiple encryption steps. For example, replacing letters first, then scrambling their order. Includes null extraction, cascaded layers, and joint optimization.

What we tested: Combining letter-rearrangement with substitution is the leading hypothesis for K4. We've tested thousands of combinations (over 1.2 billion configs) covering all structured rearrangement methods paired with keyed substitution. What remains open: the possibility that the rearrangement follows a pattern not yet identified, or that the substitution key comes from an unknown source text.

47 eliminations recorded.

Title Configs Best Verdict Tier
Running key from known reference texts + columnar transposition
15+ known reference texts + columnar transposition sweeps — using a combined approach: scramble the letter order AND replace each letter. Every possib…
52,000,000 7/24 (0.0) NOISE Tier 2
Columnar transposition × periodic substitution on 73-char column mask extract
Meet-in-the-Middle attack on 73-char column mask extract: columnar transposition (w7-9 exhaustive, 408,240 permutations) × periodic sub (p1-13) × Vig/…
31,800,000 18/24 (0.0) NOISE: best 18/24 at w9/p11 ≈ expected by chance (Monte Carlo: ~3.6 hits expected) Tier 2
Transposition-guided running key fragment scoring (28M Monte Carlo, 28 cores)
Transposition-guided running key fragment scoring — optimal assignment via Monte Carlo (28M samples, 28 cores) — using a combined approach: scramble t…
28,000,000 0/24 (0.0) NOISE Tier 3
Mitm Mono Transposition
Mitm Mono Transposition — using a combined approach: scramble the letter order AND replace each letter. 4.2 million key/parameter combinations were te…
4,209,541 0/24 (0.0) NOISE N/A
Mitm Periodic Transposition
Mitm Periodic Transposition — using a combined approach: scramble the letter order AND replace each letter. 4.2 million key/parameter combinations wer…
4,209,541 0/24 (0.0) NOISE N/A
Mitm Autokey Transposition
Mitm Autokey Transposition — using a combined approach: scramble the letter order AND replace each letter. 4.2 million key/parameter combinations were…
4,207,963 0/24 (0.0) NOISE N/A
Blitz Strip Cipher V2
Blitz Strip Cipher V2 — using a combined approach: scramble the letter order AND replace each letter. 3.6 million key/parameter combinations were test…
3,608,555 0/24 (0.0) NOISE N/A
Targeted search for transpositions resolving homophonic contradictions
Targeted search for transpositions resolving homophonic contradictions — using a method where each letter can be represented by multiple different sym…
1,282,433 0/24 (0.0) NOISE N/A
Blitz Strip Cipher
Blitz Strip Cipher — using a combined approach: scramble the letter order AND replace each letter. 118 thousand key/parameter combinations were tested…
118,317 0/24 (0.0) NOISE N/A
Monoalphabetic + transposition + running key degrees of freedom analysis
Monoalphabetic + transposition + running key degrees of freedom analysis — using a combined approach: scramble the letter order AND replace each lette…
100,000 0/24 (0.0) NOISE Tier 3
Partitioned encryption — two systems on two message parts. All 24/24 hits are at period ≥13 (underdetermination false positives) and ALL fail Bean constraints.
Partitioned encryption — two systems on two message parts — using multiple encryption steps applied one after another. 75 thousand key/parameter combi…
75,168 24/24 (0.0) NOISE N/A
Four 6x4 grids stacked with independent shifts. Palette overlap = null. DEFECTOR/ABSCISSA AZ_beau + col6/col7.
Four 6x4 grids stacked with independent shifts — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to …
27,848 0/24 (0.0) NOISE N/A
Inclinare Stacked Null Mask
Inclinare Stacked Null Mask — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real m…
4,313 0/24 (0.0) NOISE N/A
Null cipher / skip cipher / steganographic extraction patterns
Null cipher / skip cipher / steganographic extraction patterns on K4 CT — using the hypothesis that some letters in the carved text are meaningless fi…
2,500 0/24 (0.0) NOISE Tier 2
Novel multi-stage decryption pipelines
Novel multi-stage decryption pipelines — using multiple encryption steps applied one after another. 2 thousand key/parameter combinations were tested.
2,462 0/24 (0.0) NOISE N/A
Native 28×31 grid reading orders + periodic substitution on 73-char extract
Tested 10+ native grid reading orders (column-by-column L→R/R→L, serpentine columns/rows, diagonal TLBR/TRBL, spiral CW, paired mirror columns, row-re…
2,262 22/24 (0.0) NOISE: all high scores at high periods (underdetermined). Discriminating periods (≤7): max ~12/24 Tier 2
Palette Exhaustive Null Mask
Palette Exhaustive Null Mask — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real …
8 0/24 (0.0) NOISE N/A
Blitz CSP Structural
Blitz CSP Structural — using backward reasoning from known constraints to narrow possibilities.
N/A 0/24 (0.0) NOISE N/A
S 20 Constraint Propagation
S 20 Constraint Propagation — using backward reasoning from known constraints to narrow possibilities.
N/A 0/24 (0.0) NOISE N/A
Widths 5-11, 3 variants, 9 corpora
Egypt corpus x columnar transposition sweep (widths 5-11, 3 variants, 9 corpora) — using a combined approach: scramble the letter order AND replace ea…
N/A 0/24 (0.0) NOISE Tier 2
Stego Oracle
Stego Oracle — using a combined approach: scramble the letter order AND replace each letter.
N/A 0/24 (0.0) NOISE N/A
Brute-force 7 remaining null positions (consensus 17 fixed)
Brute-force 7 remaining null positions (consensus 17 fixed) — using the hypothesis that some letters in the carved text are meaningless filler (nulls)…
N/A 0/24 (0.0) NOISE N/A
Bruteforce 7remaining Task3
Bruteforce 7remaining Task3 — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real m…
N/A 0/24 (0.0) NOISE N/A
Bruteforce 7remaining Tasks12
Bruteforce 7remaining Tasks12 — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real…
N/A 0/24 (0.0) NOISE N/A
Col8 Null Mask Test
Col8 Null Mask Test — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real message.
N/A 0/24 (0.0) NOISE N/A
Extended brute force pos 34-41 with AP + restricted alphabet filters
Extended brute force pos 34-41 with AP + restricted alphabet filters — using the hypothesis that some letters in the carved text are meaningless fille…
N/A 0/24 (0.0) NOISE N/A
K4 in 4x24 grid (matching K3 chart rows), wheel rotation separates stego
K4 in 4x24 grid (matching K3 chart rows), wheel rotation separates stego — using the hypothesis that some letters in the carved text are meaningless f…
N/A 0/24 (0.0) NOISE N/A
Morse Binary Null Mask
Morse Binary Null Mask — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real messag…
N/A 0/24 (0.0) NOISE N/A
S
S — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real message.
N/A 0/24 (0.0) NOISE N/A
Exhaustive Palette Mask
Exhaustive Palette Mask — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real messa…
N/A 0/24 (0.0) NOISE N/A
Model Invariance Sweep
Model Invariance Sweep — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real messag…
N/A 0/24 (0.0) NOISE N/A
NDYAHR Corrected Neighbor Deletion + LAYER TWO Investigation
NDYAHR Corrected Neighbor Deletion + LAYER TWO Investigation — using the hypothesis that some letters in the carved text are meaningless filler (nulls…
N/A 0/24 (0.0) NOISE N/A
NDYAHR Neighbor Deletion Layer Two
NDYAHR Neighbor Deletion Layer Two — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the…
N/A 0/24 (0.0) NOISE N/A
NDYAHR letters in 28x31 grid are directional pointers to neighbors for deletion
NDYAHR letters in 28x31 grid are directional pointers to neighbors for deletion — using the hypothesis that some letters in the carved text are meanin…
N/A 0/24 (0.0) NOISE N/A
Phase 1: Local constant-difference constraint census at all 17 null positions
Phase 1: Local constant-difference constraint census at all 17 null positions — using the hypothesis that some letters in the carved text are meaningl…
N/A 0/24 (0.0) NOISE N/A
Null Mask Diversity
Null Mask Diversity — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real message.
N/A 0/24 (0.0) NOISE N/A
Null Mask Provenance
Null Mask Provenance — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real message.
N/A 0/24 (0.0) NOISE N/A
Palette Controls
Palette Controls — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real message.
N/A 0/24 (0.0) NOISE N/A
Running Key Palette Filter
Running Key Palette Filter — using the hypothesis that some letters in the carved text are meaningless filler (nulls) inserted to disguise the real me…
N/A 0/24 (0.0) NOISE N/A
Null mask crib preservation analysis (not a decryption test)
Measures whether crib positions are preserved under varying null masks — using the hypothesis that some letters in the carved text are meaningless fil…
N/A 0/24 (0.0) NOISE N/A
Compose
Compose — using multiple encryption steps applied one after another.
N/A 0/24 (0.0) NOISE N/A
Team Layered Verify
Team Layered Verify — using multiple encryption steps applied one after another.
N/A 0/24 (0.0) NOISE N/A
Team Mono Trans SA
Team Mono Trans SA — using multiple encryption steps applied one after another.
N/A 0/24 (0.0) NOISE N/A
K4 frequency distribution analysis and homophonic solver
K4 frequency distribution analysis and homophonic solver — using a method where each letter can be represented by multiple different symbols.
N/A 0/24 (0.0) NOISE N/A
Systematic search for transpositions resolving all 9 homophonic contradictions
Systematic search for transpositions resolving all 9 homophonic contradictions — using a method where each letter can be represented by multiple diffe…
N/A 0/24 (0.0) NOISE N/A
Homophonic + transposition contradiction resolution
Homophonic + transposition contradiction resolution — using a method where each letter can be represented by multiple different symbols.
N/A 0/24 (0.0) NOISE N/A
Nomenclator + superencipherment model analysis
Nomenclator + superencipherment model analysis — using a method where each letter can be represented by multiple different symbols.
N/A 0/24 (0.0) NOISE N/A