Skip to content

Krypto Fioniae 5 Playfair Mystery Cache

This cache has been archived.

thiesp: Cachen archiveres, da den er forsvundet.

Tak for alle besøgene!

More
Hidden : 8/7/2009
Difficulty:
3 out of 5
Terrain:
1 out of 5

Size: Size:   micro (micro)

Join now to view geocache location details. It's free!

Watch

How Geocaching Works

Please note Use of geocaching.com services is subject to the terms and conditions in our disclaimer.

Geocache Description:

This cache is not on the posted coordinates and a part of a series of crypto caches.
Koordinaterne ovenfor er valgt "tilfældige" og det er nødvendigt at forstå engelsk for at løse cachen.

This cache is not on the posted coordinates. In this series of caches placed in the summer of 2009, you will encounter a variety of cryptographic methods, which have been in extended use throughout history. You have to solve (but not necessary find) the five caches Krypto Fioniae 1-5, in order to find the cache Krypto Fionae FINAL, and apart from this there is an extra cache for those, who wants an extra challenge.


Image: public domain from Wikimedia Commons


For this cache, we will look at the Playfair ciphre, designed by Charles Wheatstone and promoted by Lord Playfair in the 1850'ies. For this cipher, a key not containing any letter twice and without the letter J is written in the first line (or lines) of a 5 times 5 square. After that, the remainder of the square is filled by the letters of the alphabet, not in the key (apart from J, which is identified with I) in alphabetical order. Now for encryption, the message is split into pairs of letters (e.g. FIND THE CACHES becomes FI ND TH EC AC HE SX, where X is used as filling element). If while doing this there would be made af pair of to equal letters (e.g. WW) there is placed an X between them (e.g. HELLO becomes HE LX LO not HE LL OX). Now for each pair, the two letters are found in the sqare. If they are in different rows and columns, they are replaced by the two other corner letters in the square they descripe, starting with the letter, which is in the same row as the first letter of the pair. If the two letters are in the same rom (respective collumn) they are replaced by the letters immediately to the right (respective below) of them (in the correct order), if one of them is the rightmost (respective lowest) it is replaced by the leftmost (respective upper). This gives a new seqence of letterpairs, which is the encrypted message. For decryption the same method is applied backwards.

IAGCQ BQXBI GPTUK ODCKY RLQRR
SOHPD CUBIE YOHIA HBROU DUTDW
YGFPD ETIRU XGINL DKRGR QUROA
THCDT MHQBS YQRDT ROTUC BIMMX
ROBNB QRQQR DTQYM ZKODQ CWRLO
TMWMB UZCGM RQYNU ZLDCH AYTRO
DBUZG YBIKG LDQKG VGBCI DUKAI
KIRRO NYKMN ICSKB XGHCE YOUTC
KNNUD RUGDU ECUAD I

Additional Hints (Decrypt)

zntargvp

Decryption Key

A|B|C|D|E|F|G|H|I|J|K|L|M
-------------------------
N|O|P|Q|R|S|T|U|V|W|X|Y|Z

(letter above equals below, and vice versa)