● CLASSIFIED EXERCISE

CodeBash Escape Room

NINE OPERATIONS  |  THREE CLEARANCE LEVELS  |  USE YOUR TOOLS

AGENT:

Establish Your Cover Identity

Before any operation begins, you need a codename. Enter your real name below. Your codename will be generated deterministically using a multi-step cryptographic algorithm. The same name will always produce the same codename.

Your real name
Your name is not stored at this stage.
Your Classified Codename
■ How Your Codename Was Generated
Step 1: Normalisation
Strip non-alphabetic characters and convert to uppercase
Step 2: Vigenère Cipher (Key: GCHQ)
Each letter is shifted by the corresponding key letter, cycling every 4 characters
Step 3: ASCII Extraction
The first 4 encoded characters are converted to their ASCII integer values
Step 4: XOR Pairing
Pairs of ASCII values are XOR’d together, then combined into a 16-bit seed
Step 5: Polynomial Hash
The seed is fed through a polynomial hash (base 31) over the remaining encoded characters, the same algorithm used in Java’s String.hashCode()
Step 6: Index Derivation
Modulo arithmetic maps the final hash to two word lists of 64 entries each
Why does the same name always give the same codename?
Because the algorithm is deterministic: no randomness is involved. This is how hash functions work. It also means that anyone who knows the algorithm could reverse-engineer your identity from your codename alone. This is why real systems add a salt, a unique random value mixed in before hashing, so that identical inputs produce different outputs. Without a salt, a codename database like this one is vulnerable to a precomputation attack.
Mission Briefing
Select an Operation, Agent
Operations are classified by difficulty. Complete Recruit-level missions before advancing. Each operation tests different areas of your computer science knowledge.
Recruit Single-step puzzles · Hints available · Beginner to GCSE level
Operation LOCKDOWN
5 stages · Ciphers · Number bases · Algorithms · Logic · Hashing
ENTER →
Leaderboard →
Operation SWITCHBACK
5 stages · Queues · Hex · Selection Sort · Logic · Compression
ENTER →
Leaderboard →
Operation CLEARWATER
5 stages · ROT-13 · Binary · Loops · Boolean · Networking
ENTER →
Leaderboard →
Analyst Multi-step puzzles · No hints · Tools not named · A-Level difficulty
Operation BLACKOUT
5 stages · Binary Search · Two’s Complement · Merge Sort · Big O · Hashing
ENTER →
Leaderboard →
Operation NIGHTFALL
5 stages · Recursion · IEEE 754 · Call Trees · De Morgan’s · ASCII
ENTER →
Leaderboard →
Operation IRONVEIL
5 stages · LMC · Regex · Bubble Sort · Dijkstra’s · Compression
ENTER →
Leaderboard →
Specialist Chained answers · No hints · Theory of Computation · Advanced A-Level and beyond
Operation DEEPCOVER
5 stages · LMC · Automata · Turing Machines · Big O · Chained
ENTER →
Leaderboard →
Operation PHANTOM NET
5 stages · RSA · Modular Arithmetic · Hashing · IPv6 · Chained
ENTER →
Leaderboard →
Operation ZERO DAY
5 stages · Graph Theory · SHA-256 · Quicksort · Network Flow · Chained
ENTER →
Leaderboard →
✓ OPERATION COMPLETE

Server Restored

All five security layers have been bypassed. The rogue process has been terminated and administrator access has been restored.

Ciphers
Number Bases
Algorithms
Logic Gates
Hash Tables
--
Time
--
Hints used
--
Wrong answers