Blog Description



This blog is a personal examination of the "Pizza Code Mystery" ARG created by Christopher Horn for the Black Mesa video game.
I will attempt to update this blog on a regular basis, for as long as the ARG is in existence and folks are willing to attempt to solve it.
This will not be a complete overview of the clues and such associated with the ARG--you can find a complete, up-to-date version of that material here.


Monday, December 24, 2012

Happy Holidays!

Happy Holidays, everyone!

Hope you all enjoy your time off from work, school, and your busy lives in general.  They say this is one of the most stressful times of the year for some folks, and I just hope you all take some much needed downtime and relaaaaaaaax.

And may it truly be a Happy New Year!

Thursday, December 20, 2012

The Story Thus Far . . . .

I think, as Stormseeker has indicated, that it is vital we compose a storyline of what has occurred thus far.  That said, I will be doing so in this post.  I will then be including a consistent link to this post on the link bar to the right, and will also update the Wiki to showcase this storyline.  If I have missed any vital parts, do not hesitate to let me know.  I want to make this as complete as possible to best accommodate the ARG.

The story:

When we first discovered the codes, we noted that there were four codes to be found.  These codes were set up by Dr. Horn, which led us to realize it was Stormseeker (Chris Horn) setting up the majority of this.  The primary code D, the one that led to the last digits needed for the "thepizzaisalie" site, was directed to a Dr. Bottomley, who has since been identified as one of Storm's friends.

There were also a couple of IRC clues given prior to the solving of the other web-based clues.  These were:

  1. The IRC clue "editing" the Konami Code cipher (Code A), although it has been hinted that the original form "bon ami" was intentional, for it means "good friend".  This chat clue also states, "Don't let him find us--Dr. Welsh", suggesting that Dr. Welsh was a key player in the ARG, as well.  We found out later, via Welsh's profile site, that this is the case.
  2. The second IRC clue that first mentions coordinates:
N38°57'8.05" W77°8'44.82".
Solution two ignore loc data N32°52'50.77" W106°20'49.40" not buried at 
initial loc, fly here.
Travel 14.16 miles east we transferred the niobium there.
Await further instructions.

And broken into pieces:

38° 57' 8.05 N 77° 8' 44.82" W The Kryptos Statue in CIA Headquarters, Washington 32° 52' 50.77 N 106° 20' 49.40" W White Sands Missile Range, New Mexico
-15' 49.35" W 14.16 miles East of the first location leads to a Domino's Pizza in Washington
-14' 39.84" W 14.16 miles East of the second locationleads to a fairly deserted looking area close to Hollomans Air Force Base mentioned in IRC clue 3 .

    3.   The second location clue: 

INCOMING TRANSMISSION - LOC 2 LAYER 2 SUBSTRATA 3 X01/X02 HALOS PROJECT INITIATED
41Nb recovered. HAFB Compromised.
Transfer to site complete, project HALOS underway. Further INFO [Classified].
CODE BASE 64 compromised, switch to old code talker.
They are watching, assume leaker on site.
WSMR No longer viable location, move to main site, check external sources.

Now, we have no idea who these messages are being sent to, but we can speculate that they originate with Dr. Horn because they mention the missing / hidden X01 and X02 rooms.  They also mention the HALOS project which has become synonymous with Dr. Horn's later clues.

After discovering the website and solving the binary puzzle, we then began getting web-based puzzles.  These began with this puzzle, that turned out to be Base 64 with a Navajo message inside of it, which then needed a Playfair cipher to finish it off:

Proxyhost@-84-9-123-164.dslgb.com//closed.proxy.accepted//?OTR,1,3,?OTR:[I---MI-G TR
--SMI---ON - UN---WN S##RCE]
Access detected to personal site.
Security compromised.
HALOS project under threat. Site offline as response. Switching to new protocols.
[********] ~[OTR//2.0]

 Solved portion: 
primesitecompromisedreturnbmrfloginhalos
 
After solving this, we received another clue in chat, also in Base64 that used a one-time pad encryption. Brute-forcing it using key words eventually led to it being solved:

[[Proxyhost@-84-9-123-155.dslgb.com//closed.proxy.accepted//?OTR,1,3,?OTR:
[INCOMING TRANSMISSION UNKNOWN SOURCE]LEAK SOURCE DETECTED. TRIANGULATING...MIX CASCADE
HOP DETECTED...ATTEMPTING TIMING ATTACK...[TERMINATED] CANNOT CONNECT TO  HOST...
ATTEMPTING CONNECT TO USER H... SENDING DATA. SECURITY LEVEL 7 ALPHA.  [OTR//3.0]

Solved portion:

"This is a message left for Dr. Horn. Just to remind you in case of 
emergencies that the password to the HALOS files is BENALOHPAILLIER. I 
have programmed HALOS to send in level seven cases. You should bring 
pizzas." 
 
We now see that we have a login for the HALOS project, as well as a password.  Furthermore, there is someone else sending these messages because they are being sent to Dr. Horn.  Could it be Welsh?  Bottomley?  Or a new entity altogether?

Lastly, we received a new file on the "thepizzaisalie" site--this HALOS.txt file is the one we're stuck on now, and the message is thus:

[[Proxyhost@-84-9-123-345.dslgb.com//closed.proxy.accepted//?OTR,3,4,?OTR:[INCOMING TRANSMISSION CLASSIFIED SOURCE]SUBJECT ANALYSIS - TENACIOUS. SITE OFFLINE.........{Primary Servers Overloaded}... USER ACTIVATION REQUIRED... PASSCODE INPUT FOR SITE ACTIVATION REQUIRED...SET FOR FINAL TEST PATTERN....ANALYSIS COMPLETE>>> [CLASSIFIED INFORMATION LEVEL 8][OTR//4.0]

B32B003A 35BADD66 577C24C1 4FC91906 4346D131 A7C54BB8 2FFE03E0 22615777
247923DC 21F62CD4 182E91C3 B267B545 ABCAEDAF 0261510D 4EEA1E87 CD33C7C7
7131309C C4280EB4 243D1154 F044F9CF 6296D9BF F7397E43 90987FE6 3203DA0D
E40278B3 A54F5DDC 6975FA04 F749849E 1A62595A 9F630B07 95913DE0 153E3AAC
388C45FB 9D850CFE 913541D6 C08398F2 C88332A8 2FDF0028 1D62FCDC 4FE7E46A
E90C51C5 C806B411 64E33AB9 2C96862E 068B0C16 C09990B8 381A00DA 7915B67F
E4A20F59 9B0F1B6D 481913C7 B9538CEE 639144F4 1561BA92 E4FE751D 1E242CD8
8F51D695 51988713 6A7C15AA BD7B4004 49220141 30A91F17 0F66CCB3 C139463A
7E909A37 AA863FB2 7805FC97 31C09C8C 79067E79 930A4065 46B24C9A 629B26C2
CE2A4BE4 8F589A37 5FEB731F C4AB225C 11848CF8 9E291FB2 7133970C 06361847
4A892801 EDD68F54 698C5E5B 506746F6 765A6F7F 1225DEA4 DA1140FE B60F6507
45241C69 3695883D CB21E6FB FEFBB85A 29919480 36A52B5D

[/][End Transmission]|¬[ABORTIVE.] ~~ [Transmission Ends]]

We may be stuck here, but I think we have all the information we need.  We have a login and a password, and I don't think the password is a direct key to the actual cipher, but should simply be used to access the HALOS site, whatever that may be.  We seem to have overlooked the other clues, and I think we need to put them together to make this next big leap and pass through the gate to the next portion.  With this in mind, maybe we need to look at other possible sites / links that have previously been added or left undiscovered.

Tuesday, December 18, 2012

My Absence and The Latest Clues

Ladies and gentlemen, I apologize for my month-long extended absence.  Around 7pm today I finished my last final of the semester, and this last three weeks has been a doozy (to say the least).  First and foremost, I want to apologize for letting this blog die a bit in that time.  I never intended to take this long to get back in the game, but every time I sat down to update something else popped up.  Thankfully, I've got a full two and a half weeks to relax . . .

And crack some pizza codes.

So where are we now?  I've taken some time reviewing the forums, particularly the wiki page update.

First of all . . . I like it.  It means that this clue is supposed to be difficult, and I think we've come to our next "gate". 

The letters italicized in the original terminal message spell out:  "seek out code he is watching"

It's written like that on purpose; it's not seek out the code, he is watching, but rather seek out Code_ who is a user on the IRC chat.  Code_ is also 0418_08151814 on the forums.  Perhaps he is an extension of the ARG, perhaps not.  But I think it's clear that this is what the message intends for us to think.  Whether it's a red herring or not is left to be determined.

Noting this, I think we all need to pay special attention to what he mentions.  Furthermore, I think you've all thrown in some very, very interesting things on the forum, and I get that feeling that we are on the correct path.  This last code surely has to do with the Niobium, as seen by the inclusion on the wiki page.  

I have an opinion about who is watching--I think the AI is some extension of Stormseeker himself.  Whether that extension is a program he created, or a scapegoat for fulfilling his own desires at getting back at Dr. Stone and Dr. Welsh, I think there is a third party here "watching" us.

As for the code itself, it may be a very complicated cipher, but it might also be a hint at something else.  We've gotten through some difficult ciphers (the one-time pad comes to mind), and this might be a change-up just to throw us off the path.  Perhaps there is some sort of substitution intended with the Niobium mention.  

I will see what I can do with the new information, and will update if I find anything.  I'm glad to see that you folks have kept this very much alive while I've been in school, and I look forward to seeing what's to come.  Oh, and before I forget--expect a new poll and rate-it question soon!

Monday, November 19, 2012

Next Steps For Hexadecimal Code

Well, sorry for the long delay, folks.  I was hoping we'd make some headway within a couple of weeks and I could update the blog, but as of yet . . . nothing.  Our new code (check the post prior to this one for a full look at that) is a hexidecimal code, and the primary challenge is finding out how it is meant to be applied and then doing so.  It's not as straightforward as the SECOM cipher for the simple reason that there are multiple ways it can be implemented, the least of which is a direct cascading cipher or similar method.  Seeing how we've been focusing primarily on standard ciphers throughout this ARG, it's a safe bet that we will continue in a similar fashion.  However, the way the first portion of this code was cracked leads me to believe it is another language related to programming rather than a direct cipher.

For now, I will continue to keep a lookout for new ideas, and want to remind you all to keep active as best you can.  I understand there is a lot to be done over the holidays, so no rush or anything.  I do, however, want to stress how important it is to keep this ARG alive, and remember that we've come to a brick wall before.  And, after that was finally scaled, we knocked down multiple ciphers in rapid-fire succession.  That said, don't give up!

To those of you celebrating Thanksgiving, happy wishes to all of you and yours!

Wednesday, November 7, 2012

Where We Stand Now

It's been a crazy past few days--lots going on in regards to the ARG.  First and foremost, I want to thank all of you who have put forth the effort and decoded these ciphers at a rapid-fire pace.  Since the one-time pad cipher, we've received another major code.  Referenced in the one-time cipher as the HALOS file, the HALOS.txt file was discovered on Stormseeker's website [NOTE:  To access this link, you will need to input "drhorn" as the username and "1001085139140914" as the password].

As of now, the HALOS.txt file has been decrypted . . . mostly.  The decrypted .txt file reads:

[[Proxyhost@-84-9-123-345.dslgb.com//closed.proxy.accepted//?OTR,3,4,?OTR:[INCOMING TRANSMISSION CLASSIFIED SOURCE]SUBJECT ANALYSIS - TENACIOUS. SITE OFFLINE.........{Primary Servers Overloaded}... USER ACTIVATION REQUIRED... PASSCODE INPUT FOR SITE ACTIVATION REQUIRED...SET FOR FINAL TEST PATTERN....ANALYSIS COMPLETE>>> [CLASSIFIED INFORMATION LEVEL 8][OTR//4.0]b32b003a35badd66577c24c14fc919064346d131a7c54bb82ffe03e022615777247
923dc21f62cd4182e91c3b267b545abcaedaf0261510d4eea1e87cd33c7c77131309cc4280eb42
43d1154f044f9cf6296d9bff7397e4390987fe63203da0de40278b3a54f5ddc6975fa04f749849e1
a62595a9f630b0795913de0153e3aac388c45fb9d850cfe913541d6c08398f2c88332a82fdf0028
1d62fcdc4fe7e46ae90c51c5c806b41164e33ab92c96862e068b0c16c09990b8381a00da7915b6
7fe4a20f599b0f1b6d481913c7b9538cee639144f41561ba92e4fe751d1e242cd88f51d69551988
7136a7c15aabd7b40044922014130a91f170f66ccb3c139463a7e909a37aa863fb27805fc9731c
09c8c79067e79930a406546b24c9a629b26c2ce2a4be48f589a375feb731fc4ab225c11848cf89e
291fb27133970c063618474a892801edd68f54698c5e5b506746f6765a6f7f1225dea4da1140feb
60f650745241c693695883dcb21e6fbfefbb85a2991948036a52b5d[/][End Transmission]|¬[ABORTIVE.] ~~ [Transmission Ends]]

The part of most interest is the part I've highlighted.  This is obviously hexadecimal, but how is it converted?  My theory is that it is some sort of image--a very, very basic image, of course, but an image nonetheless.  There is also some speculation that it is related to off-the record encoding, although all of the messages to this point have referenced OTR.

So, that is where we stand.

As for the blog, I'm going to put up a poll related to the entirety rather than each individual piece (at least for now), and will be removing the Cipher Formats page.  I'm doing the latter because we've gotten past the roadblock that was the SECOM cipher, and as of now we haven't seen any reversed or columnated text.  That said, it's rather pointless.  Should the need arise, however, I will of course implement the page again, or something similar.

I will also be implementing a rating widget that will allow each of you to rate your experience with the ARG.  Although it doesn't directly impact the ARG in any way, I am curious to see how each of you feels about the progress, difficulty, etc.  

Tuesday, November 6, 2012

IRC Code Solved

Just a few hours after my last post, the IRC code was solved.  Turns out it WAS a one-time pad, and the input the cipher was based on is a quote by Giordano Bruno:

"It is proof of a base and low mind for one to wish to think with the masses or majority, merely because the majority is the majority. Truth does not change because it is, or is not, believed by a majority of the people."

And the message, decoded by pointless:

This is a message left for Dr. Horn. Just to remind you in case of emergencies that the password to the HALOS files is BENALOHPAILLIER. I have programmed HALOS to send in level seven cases. You should bring pizzas.

Therefore, we have the password and a potential username.  Now all that's left to do is discover how to get into the BMRF site or find another related site . . . .

Analysis of IRC Code / Small Update

I've updated the Cipher Formats page to include the new IRC code and have added a new poll to the right-hand side toolbar.

In regard to the code, I've done an analysis in my cryptology tool--the top ten choices are as follows, listed in order from most similar to least similar:


Running Key...........0
Digrafid................1
Vig Slidefair...........2
Nicodemus.............3
Trifid...................3
Gronsfeld..............3
Vigenere...............4
Quagmire2.............4
Quagmire3.............4
Portax..................4




Of course, it's entirely possible that this analysis is inaccurate if the code is actually composed of two ciphers rather than just one.

The Next Roadblock

Since solving the Code D SECOM cipher, I've noticed two things.  First and foremost, the explosion of people posting on the forums and once again becoming active in the ARG.  For me, that is a great thing to see, and is as encouraging as it is helpful.  The second thing I've noticed is the growing complexity of the puzzles.  Granted, the time taken to complete them is nothing compared to the time it took to complete the SECOM cipher, but I feel like that was due to the anonymity of that cipher and the reality that not that many folks were working on it.  Looking at the two others that have been solved, the triangle converted to binary is actually a pretty clever ruse.  Personally, I printed the damn thing out and spent an hour at work trying to figure out how to fold it to create a message.  We can thank bobsayshilol from the forums for suggesting a binary conversion, and pointless for extending the use of binary and coming up with a solution.  Therefore, despite how quickly it was solved, that was a pretty complex puzzle that definitely required thinking outside the proverbial box.

The second puzzle, the IRC chat, was Navajo Code, and it wasn't particularly challenging.  However, now that we've come to the third "new" puzzle, the second IRC chat code, I'm noting a trend.  The message, after Base 64 decoding, is as follows:


INCOMING TRANSMISSION UNKNOWN SOURCE] LEAK SOURCE DETECTED.  TRIANGULATING . . . MIX CASCADE HOP DETECTED . . . ATTEMPTING TIMING ATTACK . . . [TERMINATED]  CANNOT CONNECT TO HOST . . . ATTEMPTING CONNECT TO USER H . . . SENDING DATA.  SECURITY LEVEL 7 ALPHA.

BAQKX  JOAJG  XAHED  IFGIZ  FZDPB  USXLG  GXHFA  UAUWM  HBQAM  WAXVY  LQQRY  WRUWV  ETQOK  BACBE  JWHMS  HVONZ  IAHPA  SOWCM  LGATX  UEXOQ  DRQEJ  BVLBO  DJIHE  CZTHM  ZKHIE  NOMLS  AXVVW  ETWIS  ETIGM  RXEVF  QYAUB  VFCEB  PWBUK  EMNOL W

 The first thing I noticed in this message was the mention of "mix cascade" which, to me, signifies that this cipher may be a variant of a cascade cipher.  If that's the case, we may be in for the long haul on this one.  Depending on the ciphers used, that could require a lot of time and determination.

Considering this realization, I will be updating the Cipher Formats page to reflect this new cipher--it will be listed in regular format, without the spaces, and backward.  In this case, and after how the Code D cipher was cracked, I don't feel the columnated format will be much  use.  Furthermore, depending on how much time this cipher takes to solve, I intend to include descriptions of the ciphers that it could end up utilizing.

Till then, hope you all have fun attempting the new cipher, and I'm glad to see past (and new) faces attempting to solve the ARG.

Saturday, November 3, 2012

The Enigma Cipher (Code D) Solution

At last, the Enigma Cipher has been solved, and it has turned out to be Code D.  So what are the steps I took to solve it?  Well, not very many, actually.  It turns out that it was a SECOM cipher, which I pretty much figured out from collaborating with Code_ from the IRC channel.  He also pointed me to a very valuable site that had a lot of working decoders and other resources:  Dropbox resources

After downloading the SECOM cipher, the use of which had pretty much been extra verified by Storm's response to the "wibble" inquiry, it was a matter of plugging in possible 20-character key phrases.  Took a look at the whiteboards, searching for inputs, and it just happened that "Laser Optronic Linear Inducer Cannon" (LOL Cannon) worked.

The resulting message:

"IT HAS COME TO MY ATTENTION THAT RESEARCH INTO POTENTIAL ALTERNATIVE BRIDGING METHODS MAY BE SUPPORTED BY THE INCLUSION AND APPLICATION OF THE LASER OPTRONIC LINEAR INDUCER ARRAY TO ACT AS AN AXIS MODULATOR FOR REGULATION AND FOCUSING AN UNKNOWN ENERGY FORM WAS DETECTED WHILST INVESTIGATING THIS HYPOTHESIS PLEASE USE CODE D 0914 TO COMPLETE THE SEQUENCE ON MY SITE"

The beginning is very similar to the first internet clue we got from the Konami code input on Storm's website.

After determining the four codes, I went back to the "thestormseeker.com/thepizzaisalie" page and input "drhorn" as the username and the four codes in order "1001085139140914" as the password, and lo' and behold it got me into the webpage.  It shows the parent directory, which is Storm's profile facade page, but it also links to two other files:

http://thestormseeker.com/thepizzaisalie/1001085139140914.html
http://thestormseeker.com/thepizzaisalie/grilledpizza.jpg

All said and done, I think it's safe to say that we can move on from the QE chapter and begin to focus our efforts on this new clue and how it relates to the greater story of the ARG.

I want to congratulate all of those who have worked so hard on this ARG thus far, and want to encourage everyone to continue doing so.  We hit a brick wall for a while, but through dedication and digging the end result is success; and that, truly, is what it's all about.  Each and every thought someone presented on the forums, wiki, or blog has led to this, and everyone should be proud.

The mushy stuff over with, let's press on to the next challenge!  And yeah . . . it looks like a doozy . . . .

Wednesday, October 31, 2012

PPC-xx Hand Ciphers

As I continue to try and determine a straddling checkerboard that could work with the first transposition numbers, I've done a little research on other ciphers similar to the SECOM cipher.  It turns out there is another type of cipher, simply called the paper-and-pencil cipher - xx (PPC-xx), that uses four varying keys in order to produce the straddling checkerboard and resulting transpositions.  A variant of the SECOM cipher, there are only a couple that seem viable, but at least it is a new direction.  The SECOM cipher is rather simple as it is, but these are potentially even simpler.  Check out Dirk's weblog for more information on the cipher.

And further information on PPC-xx can be found here.

For now, I am both biding my time in the vain hope that Storm will let loose a little more information about the cipher and attempting to complete a checkerboard that works.  Also, I would like to encourage you all to submit anything you are working on to the blog, so that I can continue to compile as much data as possible and work toward a solution.  Even if it's just some scribblings on a napkin, you simply never know what little piece of information or fresh line of thinking will open the door to a solution.  So, again, I would love to receive your submissions, and I will of course give credit where it is due on the Contributions page.

Saturday, October 27, 2012

SECOM Cipher Attempt

As I mentioned on the forums, the SECOM is very similar to the VIC cipher and also uses an extended straddling checkerboard (which ties in with the Code C message).  Anyway, what follows is an attempt to determine the two transpositions utilizing the key phrase "Superbus Via Inscientiae":

  • I took the first twenty characters of the phrase and split them into two groups of ten:
 S U P E R B U S V I          A I N S C I E N T I

  • I then assigned numbers to each letter corresponding to alphabetical order, with 0 being last:
 S U P E R B U S V I          A I N S C I E N T I
   6 8 4 2 5 1 9 7 0 3           1 4 7 9 2 5 3 8 0 6
  • I then added the number of the second group to the numbers of the first group.  When you do this step, it's important NOT to carry the tens column--in other words, if you get 5 + 8 = 13, you drop the ten and use only the 3:
 6842519703
+ 1479253806  
------------------
  7211762509 
  • I then create a block composed of 50 NEW numbers by using chain addition.  In other words, I take the 7 + 2 = 9 and write the 9 below the 7.  Then I take 2 + 1 = 3 and write the 3 below the 2 . . . so on and so forth.  Once again, the tens column is not carried:
7211762509
----------------
9328387598
2501152470
7512676177
2638336849
8911694237

  • Then, take these last 10 digits and assign numbers to them much like you did with the letters above; except of course, that you will be going in order of the numbers rather than the alphabetical order of the letters:

    8911694237
    ---------------
    8912605347
    • This final 10-digit number should be the header for our straddling checkerboard.

      What I'm including next is a couple of charts depicting the first and second transpositions I derived from the separate halves of the key phrase and the cipher text we've been provided.  As long as the key phrase is "Superbus Via Inscientiae", then these transpositions will work, and all that's left to do is find a valid straddling checkerboard to apply to them.  For an explanation of how I got these transpositions, visit this site.

      In the long run, the only chart that really matters is the first transposition, because if the key phrase is right, then this is considered the "original" cipher text encoded directly from the straddling checkerboard.

      Both transpositions, in the order that I completed them (reverse order due to decoding process):

      Second Transposition

      3 0 9 2 5 3 1 5 8 8 3 3 3 4 9
      1 7 8 9 1 3 8 5 9 9 4 8 1 9 0
      4 5 9 9 1 3 4 1 5 1 9 4 5 7 9
      1 5 4 2 8 8 7 1 3 9 6 4 2 9 0
      6 0 3 3 1 1 9 9 0 8 1 1 9 7 2
      5 9 8 8 9 9 9 8 1 9 0 1 6 7 1
      1 9 6 9 9 8 8 3 9 8 1 8 3 8 1
      4 4 4 8 3 8 9 2 3 8 9 1 7 4 8
      9 4 9 7 1 7 9 1 1 7 3 8 7 1 9
      1 7 3 3 5 7 4 8 4 8 6 3 6 1 7
      6 7 3 5 9 1 7 9 9 2 8 9 2 1 3
      1 1 2 7 9 1 8 9 7 9 3 1 1 3 1
      9 7 3 1 7 1 4 1 3 9 9 1 2 9 9
      7 1 0 3 0 1 3 1 1 0 3 1 9 3 8
      9 1 4 8 9 8 9 9 3 5 9 1 5 9 0
      9 5 2 5 2 2 1 2 0 9 9 9 3 5 4
      8 2 0 3 3 2 3 7 0 0 8 5 3 1 9
      4 2 9 7 1 6 2 1 1 9 5 6 3 9 7
      3 8 3 1 5 1 7 9 4 4 5 2 9 3 1
      0 9 6 5 1 1 7 4 9 1 9 7 9 4 7
      8 9 4 3 2 9 6 8 4 8 0 4 4 9 8
      9 1 3 9 2 3 7 4 4 4 5 8 4 4 1
      1 9 8 5 9 9 9 5 8 9 9 9 5 9 9
      1 1 8 8 8 0 4 1 4 9 1 9 3 9 9
      9 3 9 1 3 9 0 6 1 2 2 4 4 3 1
      3 1 9 1 4 5 7 0 3 8 2 9 9 5 9
      3 3 2 9 3 2 0 1 9 9 8 3 7 5 9
      1 9 5 9 9 3 3 5 9 3 9 0 3 9 8
      3 9 0 2 4 1 1 8 9 1 3 1 4 3 5
      9 3 1 8 1 3 8 3 1 3 8 9 1 5 9
      3 1 2 0 0 1 0 5 9 2 4 9 6 1 3
      7 8 9 5 9 7 4 1 5 7 4 8 8 7 1
      4 7 3 0 3 8 3 3 3 8 9 4 0 7 4
      8 8 1 3 1 8 1 8 1 1 9 8 9 1 9
      4 7 4 9 4 0 9 1 9 0 8 0 5 0 1
      9 3 3 0 6 8 1 7 0 4 8 5 9 9 9
      1 3 9 4 1 X X X X X X X X X X


      First Transposition

      9 9 3 4 0 3 1 3 3 8
      1 1 0 7 3 8 7 1 1 9
      3 4 9 4 3 1 9 3 5 9
      9 9 2 9 1 8 9 8 1 3
      0 1 5 4 1 9 2 9 7 5
      6 9 3 0 5 1 8 1 9 9
      3 3 1 9 9 7 9 3 4 1
      1 9 5 1 8 4 1 1 4 5
      9 9 8 9 8 8 1 2 5 9
      1 1 8 0 9 3 2 0 2 9
      4 2 3 8 9 8 7 0 9 5
      5 2 3 9 9 7 9 1 3 2
      7 4 1 3 1 1 1 0 1 5
      0 4 7 3 9 9 8 5 5 2
      3 3 8 0 6 3 9 9 1 2
      3 1 9 6 9 6 7 2 1 1
      3 8 1 8 9 1 9 4 7 2
      2 2 3 1 8 7 3 9 4 0
      9 9 8 7 8 2 1 6 9 9
      3 9 5 0 3 1 1 1 1 9
      2 5 9 4 4 3 9 7 9 9
      0 9 9 8 4 3 7 8 7 3
      1 8 4 5 4 1 3 9 9 5
      9 3 8 1 8 9 1 5 4 4
      9 7 1 3 3 0 7 9 7 4
      1 5 4 9 8 8 1 7 2 3
      9 9 5 4 9 2 4 4 9 8
      5 0 9 1 2 0 1 1 6 0
      9 3 9 3 3 3 3 5 8 9
      9 9 1 4 9 3 9 7 4 6
      3 8 3 9 4 2 9 4 8 8
      3 4 4 9 9 3 1 8 0 9
      5 3 1 0 7 7 2 8 4 4
      9 5 5 9 1 0 9 7 4 3
      3 5 1 9 7 0 7 1 9 9
      9 9 9 9 9 8 1 4 8 1
      3 3 4 0 1 5 0 7 3 3
      9 8 5 8 1 3 3 3 7 9
      0 9 7 1 7 1 0 0 4 2
      2 4 1 1 1 9 1 3 4 1
      4 0 5 9 7 2 3 8 4 9
      1 7 4 7 3 9 1 3 5 8
      1 4 2 2 3 7 1 3 8 5
      8 9 8 8 5 1 0 3 4 9
      9 8 8 1 7 6 3 8 4 9
      1 9 7 9 4 2 1 8 1 1
      3 1 1 0 8 1 9 1 9 1
      1 9 3 1 4 1 3 3 5 8
      9 0 9 6 8 9 8 1 8 8
      3 5 6 7 6 5 9 8 9 8
      1 0 4 1 6 6 1 1 9 0
      8 1 2 9 7 3 4 8 9 4
      1 9 9 8 3 9 8 1 5 9
      3 9 0 1 5 7 9 1 9 3
      8 9 6 8 9 X X X X X

      Once again, this text would be the "original" encoded text as long as the key phrase is right.  Although these may not be the correct transpositions due to the key phrase being wrong, hopefully it gives you all an idea of how we can reverse engineer the cipher to get at what we need.