Home > Mobile Game Tutorial > Mobile Game Guide > Criminal Master Detective's Code Answers, Codes, and Analysis

Criminal Master Detective's Code Answers, Codes, and Analysis

王林
Release: 2024-07-12 05:24:26
Original
630 people have browsed it

The journey to reveal the secret code of the Criminal Master The detective code of the Criminal Master has always left players racking their brains. Cracking these codes is crucial and could help investigators uncover the truth. PHP editor Zimo brings you a detailed guide that provides complete answers to passwords, explanations, and the mystery behind them.

Criminal Master Detectives Code Answers, Codes, and Analysis

Crime Master Detective Code Answers

9527

Crime Master Detective Code Answers:

At 20:00 on the evening of August 18, 2020, the police updated the case and successfully solved the hard disk password, making significant progress in the case. The police would like to express their sincere thanks to the detectives involved in the investigation. First, address the contents of the "Decryption Related" folder one by one.

In the "Untitled.txt" file, the repeated numbers can be inferred to be related to the 9-key English keyboard, where the number n represents the nth letter at the key position, and the number 1 directly descends, which is decrypted as: 1ATBASHCIPHER, corresponding to —— The first steps in deciphering the Atebash cipher.

In the "ACASI.dcox" file, the usual Microsoft Word file suffix is ​​.docx ", so there is reason to guess that its file name is encrypted by a fence (the encryption method of the fence password is to divide the text into several groups according to a certain number of words, and connect the first words of each group to obtain the ciphertext 1. Then, concatenate the second word of each group to get ciphertext 2... Finally, concatenate ciphertext 1 and ciphertext 2... into a whole. It is understood that the files in the file are compiled into ASC code, which is based on the Latin alphabet. Computer encoding system, each character corresponds to a number (as shown in Figure 1), the number in the document is decrypted into 2. _Gao Notice_5WEI. Based on the Gallic War (Gaul, the war launched by Caesar, the governor to conquer Gaul, which was a turning point in Caesar's life) and the number of digits, the second step is to decrypt - the Caesar cipher.

In the "KB.txt" file, the "reference book revised 11 times" corresponds to the 11th edition of "Xinhua Dictionary" published by the Commercial Press (the 12th edition of "Xinhua Dictionary" was published on August 10, but according to the police Notes and deceased "revised 11th" information should be consulted in the 11th edition), the following ciphertext letters do not exceed "QWERTYUIOP". That is, the first line of the mobile phone and computer keyboard, refer to the file name "KB" (keyboard), infer that the letters correspond to the above numbers (as shown in Figure 2), and then get a set of numbers "XXX-X", the previous numbers correspond to the The number of pages in the 11th edition of "Xinhua Dictionary", the following numbers correspond to the specific number of words on the page. The decryption is: 98-9, 433-8, 40, 516-3, 215-7, Ji, 361-4, 568-3, they are combined into the third step of "吉", corresponding to the third step of decryption, - Wei

Now that you understand the three steps of decryption, you can start decrypting the ciphertext:

In the first step, the Etbash cipher is used for decryption. The encryption method is that the letters A-Z are the N letters of the positive number, replaced by the Nth letter starting from the bottom, that is, A corresponds to Z and B corresponds to Y, and so on (see Figure 3). Therefore, "KWTNBZLBW" is decrypted to get: PDGMAYD. In the second step, use the Caesar cipher to decrypt, perform substitution encryption on the 26 letters, and move "PDGMYAOYD" back to 4 digits for decryption: LZCIUWKUZ.

In the final step, the Vigenère cipher is used for decryption. The Vigenère cipher is an encryption method based on the Caesar cipher. It sorts all 25 shifts of the Caesar cipher into a table (as shown in Figure 4) and forms 26 rows and 26 columns of letters together with the original letter sequence. surface. Additionally, the Vigenère cipher must have a key that consists of letters, at least one of which can equal up to the number of letters of the plaintext. When encrypting, the nth bit of the plaintext is used as the ordinate, and the nth bit of the key is used as the abscissa, corresponding to the nth ciphertext; when decrypting, the reverse operation is performed. The encryption key is "CRIMASTER" (from "When you are confused, remember you still have CRIMASTER" in the message), and is decrypted by the above method to get: 9527.

The password is 9527.

Although the password solution was completed, the case was not successfully solved. Currently, the police plan to publish relevant case and suspect information on the Crimaster platform within a few days, and look forward to detectives helping the police arrest the murderer.

Figure 1 ASCⅡ code comparison table

Criminal Master Detectives Code Answers, Codes, and Analysis

Figure 2 Comparison of keyboard and numbers

Criminal Master Detectives Code Answers, Codes, and Analysis

Figure 3 Eterbash password comparison table

Criminal Master Detectives Code Answers, Codes, and Analysis

Figure 4 Vigenère Cipher Comparison Table

Criminal Master Detectives Code Answers, Codes, and Analysis

The above is the detailed content of Criminal Master Detective's Code Answers, Codes, and Analysis. For more information, please follow other related articles on the PHP Chinese website!

source:clinicmed.net
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template