Codebusters 🔐

Mathematics Written Event Division B/C

Overview

Codebusters is a competitive event focusing on cryptography and code-breaking. Participants demonstrate their skills in encoding and decoding information using various cipher techniques, from historical classical ciphers to more modern cryptographic methods. The event tests speed, accuracy, and knowledge of cryptographic systems.

Quick Facts

  • Type: Written Event
  • Format: Team-based cryptography test
  • Team Size: 3 students
  • Duration: 50 minutes
  • Materials Allowed: Each team member may bring one 8.5" × 11" sheet of paper with information on both sides, and each team member must bring a non-graphing calculator and writing utensils

Rules & Format

Event Format

Codebusters typically consists of several cryptographic challenges:

  1. Encoding Tasks: Convert plaintext messages into ciphertext using specified techniques
  2. Decoding Tasks: Convert ciphertext messages into plaintext using specified techniques
  3. Cryptanalysis: Decode messages without being told what cipher was used
  4. Aristocrat and Patristocrat: Special types of substitution ciphers with specific solving techniques
  5. Speed Round: Timed decryption of a message for bonus points

Materials Allowed

According to the Science Olympiad rules, participants may bring:

  • One 8.5" × 11" sheet of paper with information on both sides per team member
  • Non-graphing calculators (one per team member)
  • Writing utensils
Note: All other resources must be provided by event supervisors. Always check the current year's official rules for any updates or changes.

Content Guide

Codebusters covers a wide range of cryptographic techniques and analysis methods. Here's a breakdown of the major content areas:

Classical Ciphers

  • Caesar Cipher
  • Atbash Cipher
  • Affine Cipher
  • Vigenère Cipher
  • Hill Cipher

Monoalphabetic Substitution

  • Aristocrat ciphers
  • Patristocrat ciphers
  • Cryptogram solving techniques
  • Frequency analysis

Transposition Ciphers

  • Rail fence/Zig-zag cipher
  • Columnar transposition
  • Route ciphers
  • Scytale

Modern Techniques

  • Baconian cipher
  • RSA basics
  • Polybius square
  • ASCII encoding

Classical Ciphers

Caesar Cipher

The Caesar cipher is a substitution cipher where each letter in the plaintext is shifted a certain number of places down the alphabet:

C = (P + K) mod 26

Where:

  • C = Ciphertext letter (0-25)
  • P = Plaintext letter (0-25)
  • K = Key (shift value)

Atbash Cipher

The Atbash cipher is a substitution cipher that maps each letter to its reverse in the alphabet:

C = 25 - P

Where:

  • A becomes Z, B becomes Y, etc.
  • No key is needed

Affine Cipher

The Affine cipher uses mathematical functions for encryption:

C = (aP + b) mod 26

Where:

  • a and b are the keys
  • a must be coprime with 26
  • Decryption: P = a-1(C - b) mod 26

Vigenère Cipher

The Vigenère cipher uses a keyword to determine multiple shift values:

Ci = (Pi + Ki mod m) mod 26

Where:

  • K is the keyword converted to numbers (A=0, B=1, etc.)
  • m is the length of the keyword
  • i is the position in the message

Hill Cipher

The Hill cipher uses matrix multiplication for encryption:

C = KP mod 26

Where:

  • K is the key matrix
  • P is the plaintext vector
  • C is the ciphertext vector

Modern Techniques

Polybius Square

5×5 or 6×6 grid

A technique that encodes each letter as two numbers, based on its position in a grid.

Key Concepts:

  • Coordinate system for letters
  • Often used with I/J combined
  • Can incorporate keyword arrangements
  • Base for other ciphers like ADFGVX

Baconian Cipher

Binary encoding

Each letter is represented by a sequence of two symbols (often 'A' and 'B').

Key Concepts:

  • 5-bit binary encoding
  • Steganographic applications
  • I/J and U/V are often merged
  • Can be hidden in text styling

Route Ciphers

Path-based reading

Messages are written in a specific pattern and read out in another pattern.

Key Concepts:

  • Spiral patterns
  • Diagonal reading
  • Custom paths
  • Can include null characters

ASCII Encoding

Decimal/binary codes

Messages encoded using the American Standard Code for Information Interchange.

Key Concepts:

  • Decimal values (32-126)
  • Binary representation
  • Hexadecimal notation
  • Common computer encoding

RSA Basics

Public key encryption

A public-key cryptosystem for secure data transmission.

Key Concepts:

  • Prime factorization
  • Modular exponentiation
  • Public and private keys
  • Simple implementations

Tap Code

5×5 grid of taps

A code used by prisoners to communicate by tapping on walls or pipes.

Key Concepts:

  • Row and column taps
  • Polybius square adaptation
  • C/K combined
  • Historical significance

Frequency Analysis

Letter Frequency in English

Understanding the frequency distribution of letters in English text is crucial for breaking substitution ciphers:

  • Most Common Letters: E (12.7%), T (9.1%), A (8.2%), O (7.5%), I (7.0%)
  • Least Common Letters: Z (0.1%), Q (0.1%), X (0.2%), J (0.2%), K (0.8%)

Common Digraphs and Trigraphs

Frequent letter pairs and triplets can provide valuable clues:

  • Common Digraphs: TH, HE, IN, ER, AN, RE, ED, ON, ES, ST, EN, AT, TO
  • Common Trigraphs: THE, AND, THA, ENT, ION, TIO, FOR, NDE, HAS, NCE, EDT, TIS

Solving Aristocrats

Aristocrats are monoalphabetic substitution ciphers with word divisions preserved:

  • Identify Short Words: Focus on one, two, and three-letter words (A, I, AN, THE, AND)
  • Pattern Recognition: Look for repeated letter patterns
  • Double Letters: Common doubles include SS, EE, TT, FF, LL, MM, OO
  • Word Endings: Common endings include -ING, -ED, -LY, -TION

Solving Patristocrats

Patristocrats are monoalphabetic substitution ciphers without word divisions:

  • Pure Frequency Analysis: Compare letter frequencies with English language norms
  • Digraph/Trigraph Analysis: Identify common pairs and triplets
  • Word Division Reconstruction: After some substitutions, try to identify word boundaries
Pro Tip: Create a letter mapping table to track your substitutions and test different possibilities systematically.

Practice Tips

Preparation Strategies

Resource Sheet Development

  • Include frequency tables
  • List cipher formulas and keys
  • Create a decoding cheat sheet
  • Add common words and patterns

Speed Techniques

  • Practice with timers
  • Develop encoding shortcuts
  • Create decryption workflows
  • Master calculator operations

Team Coordination

  • Assign specialist roles
  • Develop communication protocols
  • Practice collaborative solving
  • Cross-check solutions

Mental Preparation

  • Daily practice with puzzles
  • Study historical context
  • Develop pattern recognition
  • Improve working memory

Practice Resources

Online Tools

  • Cryptography simulators
  • Interactive puzzles
  • Frequency analyzers
  • Past competition problems

Books and References

  • Cryptography textbooks
  • Puzzle collections
  • Historical cipher stories
  • Code-breaking manuals

Practice Activities

  • Create ciphers for teammates
  • Decode literary passages
  • Time trial challenges
  • Mock competitions

Technical Skills

  • Calculator programming
  • Mathematical shortcuts
  • Letter frequency memorization
  • Common word identification