Solve the ORANGE Cipher!
During a routine system upgrade, BTI360 engineers unearthed a long-forgotten segment of code—now it's back, and you've been recruited to reverse-engineer it.
Background
The retired threat-detection module included only:
# Activated only during threat level ORANGE. ORNG_CIPH3R_V2
With new activity on the horizon, the Cipher has gone live again—and you’ve been recruited to reverse-engineer its operation before time runs out!
The Evidence
The module contained several encrypted transmissions plus a reference to the orange_nibble
utility.
Examples
Input | Output |
---|---|
"010101000101001001011001" | "gGLq" |
"010001000100100101000100" | "Wnxn" |
"010001010101100101000101" | "WgxG" |
"010001000101010101000010" | "WGgf" |
orange_nibble
Usage: orange_nibble <SEED> Generates ORANGE nibbles.json. In everything we do at BTI360, it's the SEED that matters most.
Enter a SEED below and we’ll run orange_nibble
to produce your nibble file.
Hint: Check out bti360.com to see what matters most!
Your Mission
Decrypt the following intercepted message:
gS0oTaIktS0zXGWXWtROT+WGTxWLOSNeTaheT+WXWgLTXnRfgnPmIHEv
Your objectives:
- Identify the pattern – How do inputs map to outputs?
- Reconstruct the cipher – Build your own
OrangeCipherV2.decode()
. - Test your solution – Use your SEED and the message above to recover the original plaintext.