Passcode Keyword Finder

Today we’re launching a new tool to help find keywords in passcodes.

https://regex.ingress.codes

It works the same way like the other one on the Internet but it’s actually updated!

How to use the finder

Transposition

Sometimes you just want to know what keywords are possible to help spot a pattern in a code. For example:

te68o5erezim2tk8uf

The regular expression to find a possible keyword would be:

^[te68o5erezim2tk8uf]{8}$

The ^ and $ denote the beginning and end of a string, essentially a whole word.

The [te68o5erezim2tk8uf] denotes to look for a character within the [].

The {8} tells it to look for 8 of those characters, since the prefix/suffix are 5 characters each, there are 8 remaining for the keyword.

Trying this example out reveals the keyword to be timezero, and we can now look for the full passcode:

te
68
o5
er
ez
im
2t
k8
uf

timezero can be seen highlighted and we see a pattern for the passcode: ufk82timezero568te.

Substitution

If a code presents itself with a clean distribution and a correlation between letters/numbers, you can sometimes use the tool to find a keyword.

a8bdacc6ccbbbaabbabcabb6b0b1ccccccaab0 would be split into pairs:

a8 bd ac c6 cc bb ba ab ba bc ab b6 b0 b1 cc cc cc aa b0

The pairs starting with c are in the same position as where numbers go, and you can now safely assume everything in the middle is a keyword.

bb ba ab ba bc ab b6 b0 b1

Looking for repeated sets, we see that ba and ab are repeated in the keyword. Creating a regular expression for it:

^.(.)(.)\1.\2...$

The . not enclosed in () denote any character we don’t generally care about.

The (.) are captured to be reused in another part of the expression with \1, \2, etc., in the order in which they were captured.

With our example, we see the only result being detection. If we compare the (uppercase) hexadecimal values of detection to the code:

bb ba ab ba bc ab b6 b0 b1

44 45 54 45 43 54 49 4f 4e

We can now deduce the code was ciphered with a hexadecimal-atbash.

57 42 53 39 33 44 45 54 45 43 54 49 4f 4e 33 33 33 55 4f

WBS93DETECTION333UO

New WotD code pattern

We have detected a new passcode format for the WotD puzzles posted daily by JoJo Stratton.
This new format appeared on the 1000th WotD puzzle posted since taking over from PAC and his Investigation Board

The new passcode format is:

x#x#keywordx#xx

x being any letter from a-z
# being any number between 0-9
keyword being any previously used WotD or part thereof. So far only those that JoJo herself has posted.

As you might notice, the numbers are no longer limited to just 2-9 and the possibilities of keywords has been greatly increased, from roughly 460 to over 1000 and increasing daily.
You can find a full list of all the WotD’s posted by JoJo since she took over from PAC, here: JoJo WotD List

We are waiting for the current theme to come to an end to see if the keywords remain linked to WotD or revert back to the previously known Keyword list.
It is now confirmed that the WotD keyword does come from either previously used WotD or from the context of the WotD, so the list above will be immensely important for future solves.

Useful tools and weblinks for decoding

Continuing with our tutorial series, let us take a look at some tools of the trade.
If you are jumping in midway, take a look at the previous tutorials below.


As each decoder works through the vastness of different types of codes that we come across, he or she tends to use some links very frequently and some only for special cases.
Many times we get the questions of “What tool did you use for that?” or “How did you see how to follow those steps?”

In this post we hope to accumulate the big variety of online and offline resources that we use.
(more…)