Codebreak
Level 1: Caesar
Historical context
58 BC to 52 BC, Caesar advances with mixed fortunes in transalpine Gaul. It's here, against the Helvetics, that we first glimpse at Caesar's true military genius.
Vercingetorix, the Gaul King, is waiting for him at the fortress city of Alesia, while the Helvetics attack the Roman Emperor en-route to supplies.
Caesar is caught off guard. He manages to gain the top of a hill and prepares his forces to defend: the ensuing battle is not prospected in his favour. At the top he places his meager supplies defended by two legions. Halfway up he places four veteran legions and all the auxiliary troops at his disposal. The hill is covered with soldiers: it must have been an impressive sight for an enemy not used to fighting against the myth of Rome. Caesar hopes this will suffice to deter the Helvetic attack. At the front, to sustain the brunt of the attack, is only his cavalry.
The Helvetic army is not tricked by Caesar's maneuvers and attacks as a compact phalanx. The Roman cavalry can do little against the Helvetic horde and is crushed, but Caesar has an idea and orders the javelins to be hurled at the enemy. These bury themselves in the shields rendering them useless. The enemy is thus forced to fight without protection and the Roman legions have an easy time hacking into the Helvetic phalanx.
Unknown to everybody, a Roman messanger, heading for Caesar's command is captured by the enemy while delivering him a message. The message is encrypted: will you be able to decrypt it and turn the tide of the battle?
Vercingetorix, the Gaul King, is waiting for him at the fortress city of Alesia, while the Helvetics attack the Roman Emperor en-route to supplies.
Caesar is caught off guard. He manages to gain the top of a hill and prepares his forces to defend: the ensuing battle is not prospected in his favour. At the top he places his meager supplies defended by two legions. Halfway up he places four veteran legions and all the auxiliary troops at his disposal. The hill is covered with soldiers: it must have been an impressive sight for an enemy not used to fighting against the myth of Rome. Caesar hopes this will suffice to deter the Helvetic attack. At the front, to sustain the brunt of the attack, is only his cavalry.
The Helvetic army is not tricked by Caesar's maneuvers and attacks as a compact phalanx. The Roman cavalry can do little against the Helvetic horde and is crushed, but Caesar has an idea and orders the javelins to be hurled at the enemy. These bury themselves in the shields rendering them useless. The enemy is thus forced to fight without protection and the Roman legions have an easy time hacking into the Helvetic phalanx.
Unknown to everybody, a Roman messanger, heading for Caesar's command is captured by the enemy while delivering him a message. The message is encrypted: will you be able to decrypt it and turn the tide of the battle?
Code to decypher:
avwjjg xqtwbqvo zmozqvl lcab zbm awkkmz zpmaca uczziqv
Additional information
One of the first cryptographic systems recorded was introduced by the great Roman general Julius Caesar during his military campaigns. The general needed a secure way of communicating with his troops without running the risk of his orders being read in case these were intercepted by the enemy.
The method he employed was very simple, but it proved successfull against his enemies. The code bearing his name, consisted in a translation of the alphabet where each letter was substituted with another k places further along the alphabet.
For example, in case the keylength was 3 (k = 3 ...the key which is supposed to have been truly used by Caesar) we would have:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Coding the following message we would thus obtain:
Attack at dawn
Dwwdfn dw gdzq
Nowadays, this code, with only 26 possible keys (25 if we exclude the last trivial key) would be decrypted by anybody with minimal curiosity.
The method he employed was very simple, but it proved successfull against his enemies. The code bearing his name, consisted in a translation of the alphabet where each letter was substituted with another k places further along the alphabet.
For example, in case the keylength was 3 (k = 3 ...the key which is supposed to have been truly used by Caesar) we would have:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Coding the following message we would thus obtain:
Attack at dawn
Dwwdfn dw gdzq
Nowadays, this code, with only 26 possible keys (25 if we exclude the last trivial key) would be decrypted by anybody with minimal curiosity.
ATTENTION: Codebreak will automatically save your progress such that you will be able to continue the game as long as you are always playing from the same PC. If you want to play it from different PCs, you will need to be registered. If you are already registered, please login form the box on the top right.
You are currently the only crypto-analyst working on this level!
Charts