{"group":{"id":1,"name":"Community","lockable":false,"created_at":"2012-01-18T18:02:15.000Z","updated_at":"2025-12-14T01:33:56.000Z","description":"Problems submitted by members of the MATLAB Central community.","is_default":true,"created_by":161519,"badge_id":null,"featured":false,"trending":false,"solution_count_in_trending_period":0,"trending_last_calculated":"2025-12-14T00:00:00.000Z","image_id":null,"published":true,"community_created":false,"status_id":2,"is_default_group_for_player":false,"deleted_by":null,"deleted_at":null,"restored_by":null,"restored_at":null,"description_opc":null,"description_html":null,"published_at":null},"problems":[{"id":2606,"title":"Decrypt the  cypher using XOR encryption (for beginners)","description":"Inspired by Project Euler n°59\r\n\r\nEach character on a computer is assigned a unique code and the preferred standard is ASCII \r\n(American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, \r\nand lowercase k = 107.\r\nA basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given \r\nvalue, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the \r\ncipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\r\n    \r\nYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). \r\nYou must know that the original text contains common FRENCH words about MATLAB.\r\n\r\nDecrypt the message and find the sum of the ASCII values in the original text.","description_html":"\u003cp\u003eInspired by Project Euler n°59\u003c/p\u003e\u003cp\u003eEach character on a computer is assigned a unique code and the preferred standard is ASCII \r\n(American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, \r\nand lowercase k = 107.\r\nA basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given \r\nvalue, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the \r\ncipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\u003c/p\u003e\u003cp\u003eYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). \r\nYou must know that the original text contains common FRENCH words about MATLAB.\u003c/p\u003e\u003cp\u003eDecrypt the message and find the sum of the ASCII values in the original text.\u003c/p\u003e","function_template":"function y = XOR_cypher(x)\r\n  y = x;\r\nend","test_suite":"%%\r\nx=[15 3 22 14 3 0 236 98 39 49 54 98 55 44 98 46 35 44 37 35 37 39 98 38 39 98 42 35 55 54 98 44 43 52 39 35 55];\r\ny_correct=3360;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[29 40 184 57 63 122 186 122 23 27 14 22 27 24 118 122 44 53 47 41 122 42 53 47 44 63 32 122 59 52 59 54 35 41 63 40 122 62 63 41 122 62 53 52 52 179 63 41 116];\r\ny_correct=4783;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[28 33 41 53 54 43 60 35 117 121 47 48 42 44 56 53 48 42 60 35 121 60 45 121 52 54 61 176 53 48 42 60 35 121 47 54 42 121 61 54 55 55 176 60 42 121 56 47 60 58 121 20 24 13 21 24 27 119];\r\ny_correct=5667;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[11 39 50 42 39 36 124 102 42 35 102 42 39 40 33 39 33 35 102 34 51 102 37 39 42 37 51 42 102 53 37 47 35 40 50 47 55 51 35];\r\ny_correct=3666;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[27 36 62 57 58 62 36 34 107 40 35 36 56 34 57 107 6 42 63 39 42 41 107 46 63 107 59 42 56 107 27 50 63 35 36 37 107 116];\r\ny_correct=3547;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n","published":true,"deleted":false,"likes_count":2,"comments_count":0,"created_by":5390,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":66,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":32,"created_at":"2014-09-27T10:32:11.000Z","updated_at":"2026-03-19T21:22:18.000Z","published_at":"2014-09-27T10:33:19.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eInspired by Project Euler n°59\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eEach character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107. A basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). You must know that the original text contains common FRENCH words about MATLAB.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eDecrypt the message and find the sum of the ASCII values in the original text.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"},{"id":1500,"title":"Kryptos - CIA Cypher Sculpture: Vignere Decryption","description":"The \u003chttp://en.wikipedia.org/wiki/Kryptos Kryptos Sculpture\u003e contains four encypted messages.\r\n\r\nThis Challenge is to Decrypt two of the original messages from the sculpture.\r\n\r\nThe method employed is \u003chttp://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenere Decryption\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\r\n\r\nOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\r\n\r\nFor coding purposes spaces and punctuation are removed, except \"?\".\r\n\r\nDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\r\n\r\n\r\n\r\n*Input:* Decode Phrase, Vigenere alphabet word, Vigenere shift word\r\n\r\nVigenere alphabet word ='KRYPTOS';\r\n\r\nVigenere shift word ='PALIMPSEST';\r\n\r\n*Output:* BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\r\n\r\nThe decryption matrix for this case:\r\n\r\n  KRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  ABCDEFGHIJLMNQUVWXZKRYPTOS\r\n  LMNQUVWXZKRYPTOSABCDEFGHIJ\r\n  IJLMNQUVWXZKRYPTOSABCDEFGH\r\n  MNQUVWXZKRYPTOSABCDEFGHIJL\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  EFGHIJLMNQUVWXZKRYPTOSABCD\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  TOSABCDEFGHIJLMNQUVWXZKRYP\r\n\r\nFollow Up Challenges:\r\n\r\n1) \u003chttp://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption Vigenere Encryption\u003e\r\n\r\n2) Dictionary search\r\n\r\n3) KRYPTOS Part IV\r\n\r\n\u003chttp://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1 KRYPTOS Solutions\u003e","description_html":"\u003cp\u003eThe \u003ca href = \"http://en.wikipedia.org/wiki/Kryptos\"\u003eKryptos Sculpture\u003c/a\u003e contains four encypted messages.\u003c/p\u003e\u003cp\u003eThis Challenge is to Decrypt two of the original messages from the sculpture.\u003c/p\u003e\u003cp\u003eThe method employed is \u003ca href = \"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\"\u003eVigenere Decryption\u003c/a\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/p\u003e\u003cp\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/p\u003e\u003cp\u003eFor coding purposes spaces and punctuation are removed, except \"?\".\u003c/p\u003e\u003cp\u003eDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/p\u003e\u003cp\u003e\u003cb\u003eInput:\u003c/b\u003e Decode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/p\u003e\u003cp\u003eVigenere alphabet word ='KRYPTOS';\u003c/p\u003e\u003cp\u003eVigenere shift word ='PALIMPSEST';\u003c/p\u003e\u003cp\u003e\u003cb\u003eOutput:\u003c/b\u003e BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/p\u003e\u003cp\u003eThe decryption matrix for this case:\u003c/p\u003e\u003cpre class=\"language-matlab\"\u003eKRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\u003c/pre\u003e\u003cpre class=\"language-matlab\"\u003ePTOSABCDEFGHIJLMNQUVWXZKRY\r\nABCDEFGHIJLMNQUVWXZKRYPTOS\r\nLMNQUVWXZKRYPTOSABCDEFGHIJ\r\nIJLMNQUVWXZKRYPTOSABCDEFGH\r\nMNQUVWXZKRYPTOSABCDEFGHIJL\r\nPTOSABCDEFGHIJLMNQUVWXZKRY\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nEFGHIJLMNQUVWXZKRYPTOSABCD\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nTOSABCDEFGHIJLMNQUVWXZKRYP\r\n\u003c/pre\u003e\u003cp\u003eFollow Up Challenges:\u003c/p\u003e\u003cp\u003e1) \u003ca href = \"http://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption\"\u003eVigenere Encryption\u003c/a\u003e\u003c/p\u003e\u003cp\u003e2) Dictionary search\u003c/p\u003e\u003cp\u003e3) KRYPTOS Part IV\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\"\u003eKRYPTOS Solutions\u003c/a\u003e\u003c/p\u003e","function_template":"function decoded=decode_vigenere(phrase,word1,word2)\r\n decoded=phrase;\r\nend","test_suite":"phrase=upper('Between subtle shading and the absence of light lies the nuance of iqlusion.');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD';\r\nword1='KRYPTOS';\r\nword2='PALIMPSEST';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('It was totally invisible Hows that possible? They used the Earths magnetic field X The information was gathered and transmitted undergruund to an unknown location X Does Langley know about this? They should Its buried out there somewhere X Who knows the exact location? Only WW This was his last message X Thirty eight degrees fifty seven minutes six point five seconds north Seventy seven degrees eight minutes forty four seconds west ID by rows');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='VFPJUDEEHZWETZYVGWHKKQETGFQJNCEGGWHKK?DQMCPFQZDQMMIAGPFXHQRLGTIMVMZJANQLVKQEDAGDVFRPJUNGEUNAQZGZLECGYUXUEENJTBJLBQCRTBJDFHRRYIZETKZEMVDUFKSJHKFWHKUWQLSZFTIHHDDDUVH?DWKBFUFPWNTDFIYCUQZEREEVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDXFLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKFFHQNTGPUAECNUVPDJMQCLQUMUNEDFQELZZVRRGKFFVOEEXBDMVPNFQXEZLGREDNQFMPNZGLFLPMRJQYALMGNUVPDXVKPDQUMEBEDMHDAFMJGZNUPLGEWJLLAETG';\r\n\r\nword1='KRYPTOS';\r\nword2='ABSCISSA';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('The fox jumped over the moon');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='VUIPFSBYVQMMWPIMEVPZCVK';\r\nword1='KRYPTOS';\r\nword2='MATLAB';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('Between the Devil and the deep blue sea');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='SENMEDWTZNDDFIBLNNCHVTEDIBBCEZOA';\r\nword1='AWEIGH';\r\nword2='MATLAB';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))","published":true,"deleted":false,"likes_count":3,"comments_count":0,"created_by":3097,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":60,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":28,"created_at":"2013-05-11T22:20:55.000Z","updated_at":"2026-03-08T03:54:47.000Z","published_at":"2013-05-11T22:27:10.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Kryptos\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKryptos Sculpture\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e contains four encypted messages.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThis Challenge is to Decrypt two of the original messages from the sculpture.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe method employed is\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Decryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e. One clarification is that \\\"?\\\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFor coding purposes spaces and punctuation are removed, except \\\"?\\\".\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eInput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e Decode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere alphabet word ='KRYPTOS';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere shift word ='PALIMPSEST';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eOutput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe decryption matrix for this case:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"code\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e\u003c![CDATA[KRYPTOSABCDEFGHIJLMNQUVWXZ\\n\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nABCDEFGHIJLMNQUVWXZKRYPTOS\\nLMNQUVWXZKRYPTOSABCDEFGHIJ\\nIJLMNQUVWXZKRYPTOSABCDEFGH\\nMNQUVWXZKRYPTOSABCDEFGHIJL\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nEFGHIJLMNQUVWXZKRYPTOSABCD\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nTOSABCDEFGHIJLMNQUVWXZKRYP]]\u003e\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFollow Up Challenges:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e1)\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Encryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e2) Dictionary search\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e3) KRYPTOS Part IV\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKRYPTOS Solutions\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"},{"id":1499,"title":"Kryptos - CIA Cypher Sculpture: Vigenere Encryption","description":"The \u003chttp://en.wikipedia.org/wiki/Kryptos Kryptos Sculpture\u003e contains four encypted messages.\r\n\r\nThis Challenge is to Encrypt two of the original messages for the sculptor.\r\n\r\nThe method employed is \u003chttp://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenere Encryption\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\r\n\r\nOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\r\n\r\nFor coding purposes spaces and punctuation are removed, except \"?\".\r\n\r\nPhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\r\n\r\n*Input:* Encode Phrase, Vigenere alphabet word, Vigenere shift word\r\n\r\nVigenere alphabet word ='KRYPTOS';\r\n\r\nVigenere shift word ='PALIMPSEST';\r\n\r\n*Output:* EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\r\n\r\nThe encryption matrix for this case:\r\n\r\n  KRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  ABCDEFGHIJLMNQUVWXZKRYPTOS\r\n  LMNQUVWXZKRYPTOSABCDEFGHIJ\r\n  IJLMNQUVWXZKRYPTOSABCDEFGH\r\n  MNQUVWXZKRYPTOSABCDEFGHIJL\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  EFGHIJLMNQUVWXZKRYPTOSABCD\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  TOSABCDEFGHIJLMNQUVWXZKRYP\r\n\r\nFollow Up Challenges:\r\n\r\n1) \u003chttp://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption Vigenere Decryption\u003e\r\n\r\n2) Dictionary search\r\n\r\n3) KRYPTOS Part IV\r\n\r\n\u003chttp://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1 KRYPTOS Solutions\u003e\r\n\r\n  \r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n","description_html":"\u003cp\u003eThe \u003ca href = \"http://en.wikipedia.org/wiki/Kryptos\"\u003eKryptos Sculpture\u003c/a\u003e contains four encypted messages.\u003c/p\u003e\u003cp\u003eThis Challenge is to Encrypt two of the original messages for the sculptor.\u003c/p\u003e\u003cp\u003eThe method employed is \u003ca href = \"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\"\u003eVigenere Encryption\u003c/a\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/p\u003e\u003cp\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/p\u003e\u003cp\u003eFor coding purposes spaces and punctuation are removed, except \"?\".\u003c/p\u003e\u003cp\u003ePhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/p\u003e\u003cp\u003e\u003cb\u003eInput:\u003c/b\u003e Encode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/p\u003e\u003cp\u003eVigenere alphabet word ='KRYPTOS';\u003c/p\u003e\u003cp\u003eVigenere shift word ='PALIMPSEST';\u003c/p\u003e\u003cp\u003e\u003cb\u003eOutput:\u003c/b\u003e EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/p\u003e\u003cp\u003eThe encryption matrix for this case:\u003c/p\u003e\u003cpre class=\"language-matlab\"\u003eKRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\u003c/pre\u003e\u003cpre class=\"language-matlab\"\u003ePTOSABCDEFGHIJLMNQUVWXZKRY\r\nABCDEFGHIJLMNQUVWXZKRYPTOS\r\nLMNQUVWXZKRYPTOSABCDEFGHIJ\r\nIJLMNQUVWXZKRYPTOSABCDEFGH\r\nMNQUVWXZKRYPTOSABCDEFGHIJL\r\nPTOSABCDEFGHIJLMNQUVWXZKRY\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nEFGHIJLMNQUVWXZKRYPTOSABCD\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nTOSABCDEFGHIJLMNQUVWXZKRYP\r\n\u003c/pre\u003e\u003cp\u003eFollow Up Challenges:\u003c/p\u003e\u003cp\u003e1) \u003ca href = \"http://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption\"\u003eVigenere Decryption\u003c/a\u003e\u003c/p\u003e\u003cp\u003e2) Dictionary search\u003c/p\u003e\u003cp\u003e3) KRYPTOS Part IV\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\"\u003eKRYPTOS Solutions\u003c/a\u003e\u003c/p\u003e","function_template":"function encoded=encode_vigenere(phrase,word1,word2)\r\n encoded=phrase;\r\nend","test_suite":"phrase=upper('Between subtle shading and the absence of light lies the nuance of iqlusion.');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nencoded_exp='EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD';\r\nword1='KRYPTOS';\r\nword2='PALIMPSEST';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n%%\r\n\r\nphrase=upper('It was totally invisible Hows that possible? They used the Earths magnetic field X The information was gathered and transmitted undergruund to an unknown location X Does Langley know about this? They should Its buried out there somewhere X Who knows the exact location? Only WW This was his last message X Thirty eight degrees fifty seven minutes six point five seconds north Seventy seven degrees eight minutes forty four seconds west ID by rows');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\n\r\nencoded_exp='VFPJUDEEHZWETZYVGWHKKQETGFQJNCEGGWHKK?DQMCPFQZDQMMIAGPFXHQRLGTIMVMZJANQLVKQEDAGDVFRPJUNGEUNAQZGZLECGYUXUEENJTBJLBQCRTBJDFHRRYIZETKZEMVDUFKSJHKFWHKUWQLSZFTIHHDDDUVH?DWKBFUFPWNTDFIYCUQZEREEVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDXFLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKFFHQNTGPUAECNUVPDJMQCLQUMUNEDFQELZZVRRGKFFVOEEXBDMVPNFQXEZLGREDNQFMPNZGLFLPMRJQYALMGNUVPDXVKPDQUMEBEDMHDAFMJGZNUPLGEWJLLAETG';\r\n\r\nword1='KRYPTOS';\r\nword2='ABSCISSA';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n%%\r\nphrase=upper('The fox jumped over the moon');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nencoded_exp='VUIPFSBYVQMMWPIMEVPZCVK';\r\nword1='KRYPTOS';\r\nword2='MATLAB';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n\r\n%%\r\nphrase=upper('Between the Devil and the deep blue sea');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\n\r\nword1='AWEIGH';\r\nword2='MATLAB';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\nencoded_exp='SENMEDWTZNDDFIBLNNCHVTEDIBBCEZOA';\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n\r\n\r\n\r\n\r\n","published":true,"deleted":false,"likes_count":5,"comments_count":3,"created_by":3097,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":61,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":28,"created_at":"2013-05-11T20:36:34.000Z","updated_at":"2026-03-07T04:46:20.000Z","published_at":"2013-05-11T21:19:07.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Kryptos\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKryptos Sculpture\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e contains four encypted messages.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThis Challenge is to Encrypt two of the original messages for the sculptor.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe method employed is\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Encryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e. One clarification is that \\\"?\\\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFor coding purposes spaces and punctuation are removed, except \\\"?\\\".\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003ePhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eInput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e Encode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere alphabet word ='KRYPTOS';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere shift word ='PALIMPSEST';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eOutput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe encryption matrix for this case:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"code\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e\u003c![CDATA[KRYPTOSABCDEFGHIJLMNQUVWXZ\\n\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nABCDEFGHIJLMNQUVWXZKRYPTOS\\nLMNQUVWXZKRYPTOSABCDEFGHIJ\\nIJLMNQUVWXZKRYPTOSABCDEFGH\\nMNQUVWXZKRYPTOSABCDEFGHIJL\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nEFGHIJLMNQUVWXZKRYPTOSABCD\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nTOSABCDEFGHIJLMNQUVWXZKRYP]]\u003e\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFollow Up Challenges:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e1)\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Decryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e2) Dictionary search\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e3) KRYPTOS Part IV\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKRYPTOS Solutions\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"}],"problem_search":{"errors":[],"problems":[{"id":2606,"title":"Decrypt the  cypher using XOR encryption (for beginners)","description":"Inspired by Project Euler n°59\r\n\r\nEach character on a computer is assigned a unique code and the preferred standard is ASCII \r\n(American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, \r\nand lowercase k = 107.\r\nA basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given \r\nvalue, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the \r\ncipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\r\n    \r\nYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). \r\nYou must know that the original text contains common FRENCH words about MATLAB.\r\n\r\nDecrypt the message and find the sum of the ASCII values in the original text.","description_html":"\u003cp\u003eInspired by Project Euler n°59\u003c/p\u003e\u003cp\u003eEach character on a computer is assigned a unique code and the preferred standard is ASCII \r\n(American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, \r\nand lowercase k = 107.\r\nA basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given \r\nvalue, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the \r\ncipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\u003c/p\u003e\u003cp\u003eYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). \r\nYou must know that the original text contains common FRENCH words about MATLAB.\u003c/p\u003e\u003cp\u003eDecrypt the message and find the sum of the ASCII values in the original text.\u003c/p\u003e","function_template":"function y = XOR_cypher(x)\r\n  y = x;\r\nend","test_suite":"%%\r\nx=[15 3 22 14 3 0 236 98 39 49 54 98 55 44 98 46 35 44 37 35 37 39 98 38 39 98 42 35 55 54 98 44 43 52 39 35 55];\r\ny_correct=3360;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[29 40 184 57 63 122 186 122 23 27 14 22 27 24 118 122 44 53 47 41 122 42 53 47 44 63 32 122 59 52 59 54 35 41 63 40 122 62 63 41 122 62 53 52 52 179 63 41 116];\r\ny_correct=4783;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[28 33 41 53 54 43 60 35 117 121 47 48 42 44 56 53 48 42 60 35 121 60 45 121 52 54 61 176 53 48 42 60 35 121 47 54 42 121 61 54 55 55 176 60 42 121 56 47 60 58 121 20 24 13 21 24 27 119];\r\ny_correct=5667;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[11 39 50 42 39 36 124 102 42 35 102 42 39 40 33 39 33 35 102 34 51 102 37 39 42 37 51 42 102 53 37 47 35 40 50 47 55 51 35];\r\ny_correct=3666;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n%%\r\nx=[27 36 62 57 58 62 36 34 107 40 35 36 56 34 57 107 6 42 63 39 42 41 107 46 63 107 59 42 56 107 27 50 63 35 36 37 107 116];\r\ny_correct=3547;\r\nassert(isequal(XOR_cypher(x),y_correct))\r\n","published":true,"deleted":false,"likes_count":2,"comments_count":0,"created_by":5390,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":66,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":32,"created_at":"2014-09-27T10:32:11.000Z","updated_at":"2026-03-19T21:22:18.000Z","published_at":"2014-09-27T10:33:19.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eInspired by Project Euler n°59\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eEach character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107. A basic encryption method is to take a text file or a sentence, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eYour task has been made easy, as the encryption key consists only of a upper case character (different in every tests). You must know that the original text contains common FRENCH words about MATLAB.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003cw:jc w:val=\\\"left\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eDecrypt the message and find the sum of the ASCII values in the original text.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"},{"id":1500,"title":"Kryptos - CIA Cypher Sculpture: Vignere Decryption","description":"The \u003chttp://en.wikipedia.org/wiki/Kryptos Kryptos Sculpture\u003e contains four encypted messages.\r\n\r\nThis Challenge is to Decrypt two of the original messages from the sculpture.\r\n\r\nThe method employed is \u003chttp://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenere Decryption\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\r\n\r\nOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\r\n\r\nFor coding purposes spaces and punctuation are removed, except \"?\".\r\n\r\nDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\r\n\r\n\r\n\r\n*Input:* Decode Phrase, Vigenere alphabet word, Vigenere shift word\r\n\r\nVigenere alphabet word ='KRYPTOS';\r\n\r\nVigenere shift word ='PALIMPSEST';\r\n\r\n*Output:* BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\r\n\r\nThe decryption matrix for this case:\r\n\r\n  KRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  ABCDEFGHIJLMNQUVWXZKRYPTOS\r\n  LMNQUVWXZKRYPTOSABCDEFGHIJ\r\n  IJLMNQUVWXZKRYPTOSABCDEFGH\r\n  MNQUVWXZKRYPTOSABCDEFGHIJL\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  EFGHIJLMNQUVWXZKRYPTOSABCD\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  TOSABCDEFGHIJLMNQUVWXZKRYP\r\n\r\nFollow Up Challenges:\r\n\r\n1) \u003chttp://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption Vigenere Encryption\u003e\r\n\r\n2) Dictionary search\r\n\r\n3) KRYPTOS Part IV\r\n\r\n\u003chttp://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1 KRYPTOS Solutions\u003e","description_html":"\u003cp\u003eThe \u003ca href = \"http://en.wikipedia.org/wiki/Kryptos\"\u003eKryptos Sculpture\u003c/a\u003e contains four encypted messages.\u003c/p\u003e\u003cp\u003eThis Challenge is to Decrypt two of the original messages from the sculpture.\u003c/p\u003e\u003cp\u003eThe method employed is \u003ca href = \"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\"\u003eVigenere Decryption\u003c/a\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/p\u003e\u003cp\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/p\u003e\u003cp\u003eFor coding purposes spaces and punctuation are removed, except \"?\".\u003c/p\u003e\u003cp\u003eDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/p\u003e\u003cp\u003e\u003cb\u003eInput:\u003c/b\u003e Decode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/p\u003e\u003cp\u003eVigenere alphabet word ='KRYPTOS';\u003c/p\u003e\u003cp\u003eVigenere shift word ='PALIMPSEST';\u003c/p\u003e\u003cp\u003e\u003cb\u003eOutput:\u003c/b\u003e BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/p\u003e\u003cp\u003eThe decryption matrix for this case:\u003c/p\u003e\u003cpre class=\"language-matlab\"\u003eKRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\u003c/pre\u003e\u003cpre class=\"language-matlab\"\u003ePTOSABCDEFGHIJLMNQUVWXZKRY\r\nABCDEFGHIJLMNQUVWXZKRYPTOS\r\nLMNQUVWXZKRYPTOSABCDEFGHIJ\r\nIJLMNQUVWXZKRYPTOSABCDEFGH\r\nMNQUVWXZKRYPTOSABCDEFGHIJL\r\nPTOSABCDEFGHIJLMNQUVWXZKRY\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nEFGHIJLMNQUVWXZKRYPTOSABCD\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nTOSABCDEFGHIJLMNQUVWXZKRYP\r\n\u003c/pre\u003e\u003cp\u003eFollow Up Challenges:\u003c/p\u003e\u003cp\u003e1) \u003ca href = \"http://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption\"\u003eVigenere Encryption\u003c/a\u003e\u003c/p\u003e\u003cp\u003e2) Dictionary search\u003c/p\u003e\u003cp\u003e3) KRYPTOS Part IV\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\"\u003eKRYPTOS Solutions\u003c/a\u003e\u003c/p\u003e","function_template":"function decoded=decode_vigenere(phrase,word1,word2)\r\n decoded=phrase;\r\nend","test_suite":"phrase=upper('Between subtle shading and the absence of light lies the nuance of iqlusion.');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD';\r\nword1='KRYPTOS';\r\nword2='PALIMPSEST';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('It was totally invisible Hows that possible? They used the Earths magnetic field X The information was gathered and transmitted undergruund to an unknown location X Does Langley know about this? They should Its buried out there somewhere X Who knows the exact location? Only WW This was his last message X Thirty eight degrees fifty seven minutes six point five seconds north Seventy seven degrees eight minutes forty four seconds west ID by rows');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='VFPJUDEEHZWETZYVGWHKKQETGFQJNCEGGWHKK?DQMCPFQZDQMMIAGPFXHQRLGTIMVMZJANQLVKQEDAGDVFRPJUNGEUNAQZGZLECGYUXUEENJTBJLBQCRTBJDFHRRYIZETKZEMVDUFKSJHKFWHKUWQLSZFTIHHDDDUVH?DWKBFUFPWNTDFIYCUQZEREEVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDXFLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKFFHQNTGPUAECNUVPDJMQCLQUMUNEDFQELZZVRRGKFFVOEEXBDMVPNFQXEZLGREDNQFMPNZGLFLPMRJQYALMGNUVPDXVKPDQUMEBEDMHDAFMJGZNUPLGEWJLLAETG';\r\n\r\nword1='KRYPTOS';\r\nword2='ABSCISSA';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('The fox jumped over the moon');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='VUIPFSBYVQMMWPIMEVPZCVK';\r\nword1='KRYPTOS';\r\nword2='MATLAB';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))\r\n\r\n%%\r\nphrase=upper('Between the Devil and the deep blue sea');\r\ndecoded_exp=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nphrase_encoded='SENMEDWTZNDDFIBLNNCHVTEDIBBCEZOA';\r\nword1='AWEIGH';\r\nword2='MATLAB';\r\ndecoded= decode_vigenere(phrase_encoded,word1,word2);\r\n\r\nassert(strcmp(decoded_exp,decoded))","published":true,"deleted":false,"likes_count":3,"comments_count":0,"created_by":3097,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":60,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":28,"created_at":"2013-05-11T22:20:55.000Z","updated_at":"2026-03-08T03:54:47.000Z","published_at":"2013-05-11T22:27:10.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Kryptos\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKryptos Sculpture\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e contains four encypted messages.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThis Challenge is to Decrypt two of the original messages from the sculpture.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe method employed is\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Decryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e. One clarification is that \\\"?\\\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFor coding purposes spaces and punctuation are removed, except \\\"?\\\".\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eDecode Phrase: EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eInput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e Decode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere alphabet word ='KRYPTOS';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere shift word ='PALIMPSEST';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eOutput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe decryption matrix for this case:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"code\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e\u003c![CDATA[KRYPTOSABCDEFGHIJLMNQUVWXZ\\n\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nABCDEFGHIJLMNQUVWXZKRYPTOS\\nLMNQUVWXZKRYPTOSABCDEFGHIJ\\nIJLMNQUVWXZKRYPTOSABCDEFGH\\nMNQUVWXZKRYPTOSABCDEFGHIJL\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nEFGHIJLMNQUVWXZKRYPTOSABCD\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nTOSABCDEFGHIJLMNQUVWXZKRYP]]\u003e\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFollow Up Challenges:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e1)\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://www.mathworks.com/matlabcentral/cody/problems/1499-kryptos-cia-cypher-sculpture-vigenere-encryption\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Encryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e2) Dictionary search\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e3) KRYPTOS Part IV\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKRYPTOS Solutions\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"},{"id":1499,"title":"Kryptos - CIA Cypher Sculpture: Vigenere Encryption","description":"The \u003chttp://en.wikipedia.org/wiki/Kryptos Kryptos Sculpture\u003e contains four encypted messages.\r\n\r\nThis Challenge is to Encrypt two of the original messages for the sculptor.\r\n\r\nThe method employed is \u003chttp://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenere Encryption\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\r\n\r\nOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\r\n\r\nFor coding purposes spaces and punctuation are removed, except \"?\".\r\n\r\nPhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\r\n\r\n*Input:* Encode Phrase, Vigenere alphabet word, Vigenere shift word\r\n\r\nVigenere alphabet word ='KRYPTOS';\r\n\r\nVigenere shift word ='PALIMPSEST';\r\n\r\n*Output:* EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\r\n\r\nThe encryption matrix for this case:\r\n\r\n  KRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  ABCDEFGHIJLMNQUVWXZKRYPTOS\r\n  LMNQUVWXZKRYPTOSABCDEFGHIJ\r\n  IJLMNQUVWXZKRYPTOSABCDEFGH\r\n  MNQUVWXZKRYPTOSABCDEFGHIJL\r\n  PTOSABCDEFGHIJLMNQUVWXZKRY\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  EFGHIJLMNQUVWXZKRYPTOSABCD\r\n  SABCDEFGHIJLMNQUVWXZKRYPTO\r\n  TOSABCDEFGHIJLMNQUVWXZKRYP\r\n\r\nFollow Up Challenges:\r\n\r\n1) \u003chttp://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption Vigenere Decryption\u003e\r\n\r\n2) Dictionary search\r\n\r\n3) KRYPTOS Part IV\r\n\r\n\u003chttp://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1 KRYPTOS Solutions\u003e\r\n\r\n  \r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n","description_html":"\u003cp\u003eThe \u003ca href = \"http://en.wikipedia.org/wiki/Kryptos\"\u003eKryptos Sculpture\u003c/a\u003e contains four encypted messages.\u003c/p\u003e\u003cp\u003eThis Challenge is to Encrypt two of the original messages for the sculptor.\u003c/p\u003e\u003cp\u003eThe method employed is \u003ca href = \"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\"\u003eVigenere Encryption\u003c/a\u003e. One clarification is that \"?\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/p\u003e\u003cp\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/p\u003e\u003cp\u003eFor coding purposes spaces and punctuation are removed, except \"?\".\u003c/p\u003e\u003cp\u003ePhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/p\u003e\u003cp\u003e\u003cb\u003eInput:\u003c/b\u003e Encode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/p\u003e\u003cp\u003eVigenere alphabet word ='KRYPTOS';\u003c/p\u003e\u003cp\u003eVigenere shift word ='PALIMPSEST';\u003c/p\u003e\u003cp\u003e\u003cb\u003eOutput:\u003c/b\u003e EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/p\u003e\u003cp\u003eThe encryption matrix for this case:\u003c/p\u003e\u003cpre class=\"language-matlab\"\u003eKRYPTOSABCDEFGHIJLMNQUVWXZ\r\n\u003c/pre\u003e\u003cpre class=\"language-matlab\"\u003ePTOSABCDEFGHIJLMNQUVWXZKRY\r\nABCDEFGHIJLMNQUVWXZKRYPTOS\r\nLMNQUVWXZKRYPTOSABCDEFGHIJ\r\nIJLMNQUVWXZKRYPTOSABCDEFGH\r\nMNQUVWXZKRYPTOSABCDEFGHIJL\r\nPTOSABCDEFGHIJLMNQUVWXZKRY\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nEFGHIJLMNQUVWXZKRYPTOSABCD\r\nSABCDEFGHIJLMNQUVWXZKRYPTO\r\nTOSABCDEFGHIJLMNQUVWXZKRYP\r\n\u003c/pre\u003e\u003cp\u003eFollow Up Challenges:\u003c/p\u003e\u003cp\u003e1) \u003ca href = \"http://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption\"\u003eVigenere Decryption\u003c/a\u003e\u003c/p\u003e\u003cp\u003e2) Dictionary search\u003c/p\u003e\u003cp\u003e3) KRYPTOS Part IV\u003c/p\u003e\u003cp\u003e\u003ca href = \"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\"\u003eKRYPTOS Solutions\u003c/a\u003e\u003c/p\u003e","function_template":"function encoded=encode_vigenere(phrase,word1,word2)\r\n encoded=phrase;\r\nend","test_suite":"phrase=upper('Between subtle shading and the absence of light lies the nuance of iqlusion.');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nencoded_exp='EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD';\r\nword1='KRYPTOS';\r\nword2='PALIMPSEST';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n%%\r\n\r\nphrase=upper('It was totally invisible Hows that possible? They used the Earths magnetic field X The information was gathered and transmitted undergruund to an unknown location X Does Langley know about this? They should Its buried out there somewhere X Who knows the exact location? Only WW This was his last message X Thirty eight degrees fifty seven minutes six point five seconds north Seventy seven degrees eight minutes forty four seconds west ID by rows');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\n\r\nencoded_exp='VFPJUDEEHZWETZYVGWHKKQETGFQJNCEGGWHKK?DQMCPFQZDQMMIAGPFXHQRLGTIMVMZJANQLVKQEDAGDVFRPJUNGEUNAQZGZLECGYUXUEENJTBJLBQCRTBJDFHRRYIZETKZEMVDUFKSJHKFWHKUWQLSZFTIHHDDDUVH?DWKBFUFPWNTDFIYCUQZEREEVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDXFLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKFFHQNTGPUAECNUVPDJMQCLQUMUNEDFQELZZVRRGKFFVOEEXBDMVPNFQXEZLGREDNQFMPNZGLFLPMRJQYALMGNUVPDXVKPDQUMEBEDMHDAFMJGZNUPLGEWJLLAETG';\r\n\r\nword1='KRYPTOS';\r\nword2='ABSCISSA';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n%%\r\nphrase=upper('The fox jumped over the moon');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\nencoded_exp='VUIPFSBYVQMMWPIMEVPZCVK';\r\nword1='KRYPTOS';\r\nword2='MATLAB';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n\r\n%%\r\nphrase=upper('Between the Devil and the deep blue sea');\r\nphrase_encode=phrase(regexp(phrase,'[A-Z?]'));\r\n\r\n\r\nword1='AWEIGH';\r\nword2='MATLAB';\r\nencoded= encode_vigenere(phrase_encode,word1,word2);\r\nencoded_exp='SENMEDWTZNDDFIBLNNCHVTEDIBBCEZOA';\r\n\r\nassert(strcmp(encoded_exp,encoded))\r\n\r\n\r\n\r\n\r\n","published":true,"deleted":false,"likes_count":5,"comments_count":3,"created_by":3097,"edited_by":null,"edited_at":null,"deleted_by":null,"deleted_at":null,"solvers_count":61,"test_suite_updated_at":null,"rescore_all_solutions":false,"group_id":28,"created_at":"2013-05-11T20:36:34.000Z","updated_at":"2026-03-07T04:46:20.000Z","published_at":"2013-05-11T21:19:07.000Z","restored_at":null,"restored_by":null,"spam":false,"simulink":false,"admin_reviewed":false,"description_opc":"{\"relationships\":[{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/document\",\"targetMode\":\"\",\"relationshipId\":\"rId1\",\"target\":\"/matlab/document.xml\"},{\"relationshipType\":\"http://schemas.mathworks.com/matlab/code/2013/relationships/output\",\"targetMode\":\"\",\"relationshipId\":\"rId2\",\"target\":\"/matlab/output.xml\"}],\"parts\":[{\"partUri\":\"/matlab/document.xml\",\"relationship\":[],\"contentType\":\"application/vnd.mathworks.matlab.code.document+xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\"?\u003e\\n\u003cw:document xmlns:w=\\\"http://schemas.openxmlformats.org/wordprocessingml/2006/main\\\"\u003e\u003cw:body\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Kryptos\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKryptos Sculpture\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e contains four encypted messages.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThis Challenge is to Encrypt two of the original messages for the sculptor.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe method employed is\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Encryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003cw:r\u003e\u003cw:t\u003e. One clarification is that \\\"?\\\" are removed from the coding sequence and then re-inserted in the final encoded message.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eOriginal phrase: Between subtle shading and the absence of light lies the nuance of iqlusion.\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFor coding purposes spaces and punctuation are removed, except \\\"?\\\".\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003ePhrase to encode: BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eInput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e Encode Phrase, Vigenere alphabet word, Vigenere shift word\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere alphabet word ='KRYPTOS';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere shift word ='PALIMPSEST';\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:rPr\u003e\u003cw:b/\u003e\u003c/w:rPr\u003e\u003cw:t\u003eOutput:\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eThe encryption matrix for this case:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"code\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e\u003c![CDATA[KRYPTOSABCDEFGHIJLMNQUVWXZ\\n\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nABCDEFGHIJLMNQUVWXZKRYPTOS\\nLMNQUVWXZKRYPTOSABCDEFGHIJ\\nIJLMNQUVWXZKRYPTOSABCDEFGH\\nMNQUVWXZKRYPTOSABCDEFGHIJL\\nPTOSABCDEFGHIJLMNQUVWXZKRY\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nEFGHIJLMNQUVWXZKRYPTOSABCD\\nSABCDEFGHIJLMNQUVWXZKRYPTO\\nTOSABCDEFGHIJLMNQUVWXZKRYP]]\u003e\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003eFollow Up Challenges:\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e1)\u003c/w:t\u003e\u003c/w:r\u003e\u003cw:r\u003e\u003cw:t\u003e \u003c/w:t\u003e\u003c/w:r\u003e\u003cw:hyperlink w:docLocation=\\\"http://www.mathworks.com/matlabcentral/cody/problems/1500-kryptos-cia-cypher-sculpture-vignere-decryption\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eVigenere Decryption\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e2) Dictionary search\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:r\u003e\u003cw:t\u003e3) KRYPTOS Part IV\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:p\u003e\u003cw:p\u003e\u003cw:pPr\u003e\u003cw:pStyle w:val=\\\"text\\\"/\u003e\u003c/w:pPr\u003e\u003cw:hyperlink w:docLocation=\\\"http://math.ucsd.edu/~crypto/Projects/KarlWang/index2.html#1\\\"\u003e\u003cw:r\u003e\u003cw:t\u003eKRYPTOS Solutions\u003c/w:t\u003e\u003c/w:r\u003e\u003c/w:hyperlink\u003e\u003c/w:p\u003e\u003c/w:body\u003e\u003c/w:document\u003e\"},{\"partUri\":\"/matlab/output.xml\",\"contentType\":\"text/xml\",\"content\":\"\u003c?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"no\\\" ?\u003e\u003cembeddedOutputs\u003e\u003cmetaData\u003e\u003cevaluationState\u003emanual\u003c/evaluationState\u003e\u003clayoutState\u003ecode\u003c/layoutState\u003e\u003coutputStatus\u003eready\u003c/outputStatus\u003e\u003c/metaData\u003e\u003coutputArray type=\\\"array\\\"/\u003e\u003cregionArray type=\\\"array\\\"/\u003e\u003c/embeddedOutputs\u003e\"}]}"}],"term":"tag:\"cypher\"","current_player_id":null,"fields":[{"name":"page","type":"integer","callback":null,"default":1,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"per_page","type":"integer","callback":null,"default":50,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"sort","type":"string","callback":null,"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":null,"prepend":true},{"name":"body","type":"text","callback":null,"default":"*:*","directive":null,"facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":false},{"name":"group","type":"string","callback":null,"default":null,"directive":"group","facet":true,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"difficulty_rating_bin","type":"string","callback":null,"default":null,"directive":"difficulty_rating_bin","facet":true,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"id","type":"integer","callback":null,"default":null,"directive":"id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"tag","type":"string","callback":null,"default":null,"directive":"tag","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"product","type":"string","callback":null,"default":null,"directive":"product","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"created_at","type":"timeframe","callback":{},"default":null,"directive":"created_at","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"profile_id","type":"integer","callback":null,"default":null,"directive":"author_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"created_by","type":"string","callback":null,"default":null,"directive":"author","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"player_id","type":"integer","callback":null,"default":null,"directive":"solver_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"player","type":"string","callback":null,"default":null,"directive":"solver","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"solvers_count","type":"integer","callback":null,"default":null,"directive":"solvers_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"comments_count","type":"integer","callback":null,"default":null,"directive":"comments_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"likes_count","type":"integer","callback":null,"default":null,"directive":"likes_count","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"leader_id","type":"integer","callback":null,"default":null,"directive":"leader_id","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true},{"name":"leading_solution","type":"integer","callback":null,"default":null,"directive":"leading_solution","facet":null,"facet_method":"and","operator":null,"param":"term","static":null,"prepend":true}],"filters":[{"name":"asset_type","type":"string","callback":null,"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":null,"static":"\"cody:problem\"","prepend":true},{"name":"profile_id","type":"integer","callback":{},"default":null,"directive":null,"facet":null,"facet_method":"and","operator":null,"param":"author_id","static":null,"prepend":true}],"query":{"params":{"per_page":50,"term":"tag:\"cypher\"","current_player":null,"sort":"map(difficulty_value,0,0,999) asc"},"parser":"MathWorks::Search::Solr::QueryParser","directives":{"term":{"directives":{"tag":[["tag:\"cypher\"","","\"","cypher","\""]]}}},"facets":{"#\u003cMathWorks::Search::Field:0x00007f74db5b3900\u003e":null,"#\u003cMathWorks::Search::Field:0x00007f74db5b3860\u003e":null},"filters":{"#\u003cMathWorks::Search::Field:0x00007f74db5b26e0\u003e":"\"cody:problem\""},"fields":{"#\u003cMathWorks::Search::Field:0x00007f74db5b3b80\u003e":1,"#\u003cMathWorks::Search::Field:0x00007f74db5b3ae0\u003e":50,"#\u003cMathWorks::Search::Field:0x00007f74db5b3a40\u003e":"map(difficulty_value,0,0,999) asc","#\u003cMathWorks::Search::Field:0x00007f74db5b39a0\u003e":"tag:\"cypher\""},"user_query":{"#\u003cMathWorks::Search::Field:0x00007f74db5b39a0\u003e":"tag:\"cypher\""},"queried_facets":{}},"query_backend":{"connection":{"configuration":{"index_url":"http://index-op-v2/solr/","query_url":"http://search-op-v2/solr/","direct_access_index_urls":["http://index-op-v2/solr/"],"direct_access_query_urls":["http://search-op-v2/solr/"],"timeout":10,"vhost":"search","exchange":"search.topic","heartbeat":30,"pre_index_mode":false,"host":"rabbitmq-eks","port":5672,"username":"search","password":"J3bGPZzQ7asjJcCk","virtual_host":"search","indexer":"amqp","http_logging":"true","core":"cody"},"query_connection":{"uri":"http://search-op-v2/solr/cody/","proxy":null,"connection":{"parallel_manager":null,"headers":{"User-Agent":"Faraday v1.0.1"},"params":{},"options":{"params_encoder":"Faraday::FlatParamsEncoder","proxy":null,"bind":null,"timeout":null,"open_timeout":null,"read_timeout":null,"write_timeout":null,"boundary":null,"oauth":null,"context":null,"on_data":null},"ssl":{"verify":true,"ca_file":null,"ca_path":null,"verify_mode":null,"cert_store":null,"client_cert":null,"client_key":null,"certificate":null,"private_key":null,"verify_depth":null,"version":null,"min_version":null,"max_version":null},"default_parallel_manager":null,"builder":{"adapter":{"name":"Faraday::Adapter::NetHttp","args":[],"block":null},"handlers":[{"name":"Faraday::Response::RaiseError","args":[],"block":null}],"app":{"app":{"ssl_cert_store":{"verify_callback":null,"error":null,"error_string":null,"chain":null,"time":null},"app":{},"connection_options":{},"config_block":null}}},"url_prefix":"http://search-op-v2/solr/cody/","manual_proxy":false,"proxy":null},"update_format":"RSolr::JSON::Generator","update_path":"update","options":{"url":"http://search-op-v2/solr/cody"}}},"query":{"params":{"per_page":50,"term":"tag:\"cypher\"","current_player":null,"sort":"map(difficulty_value,0,0,999) asc"},"parser":"MathWorks::Search::Solr::QueryParser","directives":{"term":{"directives":{"tag":[["tag:\"cypher\"","","\"","cypher","\""]]}}},"facets":{"#\u003cMathWorks::Search::Field:0x00007f74db5b3900\u003e":null,"#\u003cMathWorks::Search::Field:0x00007f74db5b3860\u003e":null},"filters":{"#\u003cMathWorks::Search::Field:0x00007f74db5b26e0\u003e":"\"cody:problem\""},"fields":{"#\u003cMathWorks::Search::Field:0x00007f74db5b3b80\u003e":1,"#\u003cMathWorks::Search::Field:0x00007f74db5b3ae0\u003e":50,"#\u003cMathWorks::Search::Field:0x00007f74db5b3a40\u003e":"map(difficulty_value,0,0,999) asc","#\u003cMathWorks::Search::Field:0x00007f74db5b39a0\u003e":"tag:\"cypher\""},"user_query":{"#\u003cMathWorks::Search::Field:0x00007f74db5b39a0\u003e":"tag:\"cypher\""},"queried_facets":{}},"options":{"fields":["id","difficulty_rating"]},"join":" "},"results":[{"id":2606,"difficulty_rating":"medium"},{"id":1500,"difficulty_rating":"medium"},{"id":1499,"difficulty_rating":"medium-hard"}]}}