
Hi Community members,
A solution to last week’s challenge can be found here.
This challenge was submitted by Guilherme Dias [@3I_ATLAS ]. Thank you, Guilherme, for your submission!
Your mission is to locate and extract an agent whose cover has been compromised. Before going dark, she encrypted a message containing the location and time of a planned rendezvous for safe extraction. To decode her message, you will need to recreate the encryption method she used.
Following standard Agency protocol, the agent performed a one-to-one character replacement using ASCII codes 32 through 125 as the original characters and ASCII codes 162 through 255 as the replacement characters. As her handler, you’re also aware she had a fondness for Kaprekar’s constant, 6174, which may have influenced her encryption logic.
Your tasks:
- Recreate her random character-swapping table used for encrypting and decrypting messages through one-to-one character substitution.
- Generate a one-to-one character replacement table by using the Random Sample tool with a fixed seed, selecting 7 random records at a time from the list of coded characters.
- Use the previously created character conversion table to decrypt your agent’s secret message and determine the rendezvous location and time.
Once you have completed your challenge, include your solution file and a screenshot of your workflow as attachments to your comment.
Good luck!
The Academy Team