Fading Coder

One Final Commit for the Last Sprint

Cryptographic Solutions for the 2026 PolarCTF Spring Competition

Challenge 2-1: Million Bounty Problem Description: An encrypted file contains experimental data. The encryption process involves two steps: Caesar cipher with an unknown shift (1–10, applied only to letters). Rail fence cipher with an unknown key (2–4), using a W-shaped (zigzag) reading pattern and...