● CLASSIFIED EXERCISE
CodeBash Escape Room
NINE OPERATIONS | THREE CLEARANCE LEVELS | USE YOUR TOOLS
AGENT:
Establish Your Cover Identity
Before any operation begins, you need a codename. Enter your real name below. Your codename will be generated deterministically using a multi-step cryptographic algorithm. The same name will always produce the same codename.
Your real name
Your name is not stored at this stage.
Your Classified Codename
■ How Your Codename Was Generated
Step 1: Normalisation
Strip non-alphabetic characters and convert to uppercase
Step 2: Vigenère Cipher (Key: GCHQ)
Each letter is shifted by the corresponding key letter, cycling every 4 characters
Step 3: ASCII Extraction
The first 4 encoded characters are converted to their ASCII integer values
Step 4: XOR Pairing
Pairs of ASCII values are XOR’d together, then combined into a 16-bit seed
Step 5: Polynomial Hash
The seed is fed through a polynomial hash (base 31) over the remaining encoded characters, the same algorithm used in Java’s String.hashCode()
Step 6: Index Derivation
Modulo arithmetic maps the final hash to two word lists of 64 entries each
Why does the same name always give the same codename?
Because the algorithm is deterministic: no randomness is involved. This is how hash functions work. It also means that anyone who knows the algorithm could reverse-engineer your identity from your codename alone. This is why real systems add a salt, a unique random value mixed in before hashing, so that identical inputs produce different outputs. Without a salt, a codename database like this one is vulnerable to a precomputation attack.
Because the algorithm is deterministic: no randomness is involved. This is how hash functions work. It also means that anyone who knows the algorithm could reverse-engineer your identity from your codename alone. This is why real systems add a salt, a unique random value mixed in before hashing, so that identical inputs produce different outputs. Without a salt, a codename database like this one is vulnerable to a precomputation attack.
Mission Briefing
Select an Operation, Agent
Operations are classified by difficulty. Complete Recruit-level missions before advancing. Each operation tests different areas of your computer science knowledge.
Recruit
Single-step puzzles · Hints available · Beginner to GCSE level
Operation LOCKDOWN
ENTER →
Leaderboard →
Operation SWITCHBACK
ENTER →
Leaderboard →
Operation CLEARWATER
ENTER →
Leaderboard →
Analyst
Multi-step puzzles · No hints · Tools not named · A-Level difficulty
Operation BLACKOUT
ENTER →
Leaderboard →
Operation NIGHTFALL
ENTER →
Leaderboard →
Operation IRONVEIL
ENTER →
Leaderboard →
Specialist
Chained answers · No hints · Theory of Computation · Advanced A-Level and beyond
Operation DEEPCOVER
ENTER →
Leaderboard →
Operation PHANTOM NET
ENTER →
Leaderboard →
Operation ZERO DAY
ENTER →
Leaderboard →
✓ OPERATION COMPLETE
Server Restored
All five security layers have been bypassed. The rogue process has been terminated and administrator access has been restored.
Ciphers
Number Bases
Algorithms
Logic Gates
Hash Tables
--
Time
--
Hints used
--
Wrong answers