BTI360 Logo

Solve the ORANGE Cipher!

During a routine system upgrade, BTI360 engineers unearthed a long-forgotten segment of code—now it's back, and you've been recruited to reverse-engineer it.

Background

The retired threat-detection module included only:

# Activated only during threat level ORANGE.
ORNG_CIPH3R_V2

With new activity on the horizon, the Cipher has gone live again—and you’ve been recruited to reverse-engineer its operation before time runs out!

The Evidence

The module contained several encrypted transmissions plus a reference to the orange_nibble utility.

Examples

InputOutput
"010101000101001001011001""gGLq"
"010001000100100101000100""Wnxn"
"010001010101100101000101""WgxG"
"010001000101010101000010""WGgf"

orange_nibble

Usage: orange_nibble <SEED>

Generates ORANGE nibbles.json.

In everything we do at BTI360, it's the SEED that matters most.

Enter a SEED below and we’ll run orange_nibble to produce your nibble file.

Hint: Check out bti360.com to see what matters most!

Your Mission

Decrypt the following intercepted message:

gS0oTaIktS0zXGWXWtROT+WGTxWLOSNeTaheT+WXWgLTXnRfgnPmIHEv

Your objectives:

  • Identify the pattern – How do inputs map to outputs?
  • Reconstruct the cipher – Build your own OrangeCipherV2.decode().
  • Test your solution – Use your SEED and the message above to recover the original plaintext.