K4 · live cryptanalysis
plan · attack queue and completed work
12 families · 12 milestonesPhase milestones
Completed phase transitions and infra. UTC. For findings against the cipher itself, see /progress.
- phase 2
Phase 2B.1.A closed; Phase 2B.1.B started — broader Weltzeituhr sweep
Distribution observer made visible what the per-run counters had hidden: 1.26B attempts on 2B.1.A were ~13.1M repeats of the same 96 candidates; max IoC p95 across all 96 regions = 0.0479 (in noisy upper tail of random-uniform null). Falsified under (first_letter, 1988_best_guess). Phase 2B.1.B opens with 5 derivation rules × 5 city-list variants × 24 offsets × 2 directions × 2 alphabets = 2,400 unique decryptions per pass — 25× larger search space. The original (first_letter, 1988_best_guess) cell still runs as one of the 25 cells, so its falsification reproduces.
- phase 2
Distribution observer deployed
Runner now observes the IoC of every reject (not just 1-in-10K) and accumulates a per-region histogram in RAM. Flushes aggregates every 5 min to phase_distributions. Sweep itself unchanged — observer is purely additive and self-disables on exception.
- phase 2
Phase 2B.1.A sweep started — Weltzeituhr first-letter / 1988_best_guess
Runner switched from Phase 2A.1 (width-7 columnar) to Phase 2B.1.A (Weltzeituhr first-letter keystream under provisional 1988 city list). 96 unique decryptions per pass; runner loops indefinitely. First pass: 0/96 crib-passing. Phase 2A.1 logged ~108M attempts under its sweep, no candidate passed.
- phase 2
Cloud activation — live-state DB realtime
Schema migrated. Runner heartbeats flowing into Postgres every ~5s. Website streaming over websocket. Daily backups + Point-in-Time Recovery enabled.
- phase 2
Period-7 attribution test
K4 lag-7 z=+3.05 vs uniform but only +1.3σ vs same-length English. Lag-7 signal is plaintext-side, not encryption-side. Phase 2A.1 demoted from #1 to #5.
- phase 2
Phase 2A.1 sweep started
Width-7 columnar transposition + KRYPTOS-keyed Vigenère, ~17,000 attempts/sec on the ARM compute host.
- phase 1
Synthesis — 12-family attack queue
Hint × statistical-signal intersections. Phase 2 priority queue compiled. Width-7 columnar (Phase 2A.1) ranked first.
- phase 1
Famous false positives catalogued
Klepp 2025 and Sleight-of-Mind 2025 documented as structural-failure case studies.
- phase 1
Phase 1 — Sanborn hint constraint docs
4 hint families documented with primary citations: Berlin Clock, Antipodes, sculpture geography, masking technique.
- phase 0
Statistical baseline
Reproducible baseline at N=10,000. K4 vs random-uniform null: IoC, χ², quadgram score, autocorrelation lags 1–25.
- phase 0
External repos vendored
7 git submodules: 5 trusted (Bean, Oranchak, K4nundrum, Proffitt, Kellogg) + 2 case studies of failed claims.
- phase 0
Phase 0 — bootstrap
Cipher core, crib validator, K1/K2/K3 sanity tests (all pass), 389K-entry quadgram corpus loaded.
Attack queue
12 families. Current rank shown large; faded ↑/↓ shows the original synthesis rank when it changed.
- 1↑ from #32B.1
Weltzeituhr (Alexanderplatz) keystream — broader sweep (Phase 2B.1.B)
runningSanborn confirmed in November 2025 that the Berlin Clock referenced in K4 is the Weltzeituhr at Alexanderplatz, not the Mengenlehreuhr. First-priority sculpture-based attack. Initial narrow sweep (Phase 2B.1.A: first-letter rule × 1988_best_guess city list, 96 unique decryptions per pass) closed 2026-05-02 with no candidate after the distribution observer confirmed the parameter space was exhausted. Currently running Phase 2B.1.B — broader sweep across 5 derivation rules × 5 city-list variants = 2,400 unique decryptions per pass. The exact 1988 engravings remain Source TBD; the city-list variants are documented best-guesses pending primary-source verification.
re-rank · Promoted from #3 to #1 after the period-7 attribution test invalidated Phase 2A.1's headline motivation. Stays at #1 through the 2B.1.A → 2B.1.B sub-phase pivot.
prior work · NONE — novel since the Nov 2025 statement. Phase 2B.1.A (2026-04-30 → 2026-05-02): 1.26 B attempts logged across 13.1 M repeats of 96 candidates; 0 crib-passing; max IoC p95 across all 96 regions = 0.0479 (in the noisy upper tail of random-uniform null). Falsified under that single parameterization. Phase 2B.1.B opens with 25× the parameter space and a per-region distribution observer to make coverage explicit.
- 2↑ from #5MORSE
Morse-panel content as keystream
queuedSanborn 2025-11: "The codes of Kryptos from the morse code at the beginning through K5 are about delivering a message." First Sanborn-validated statement that the Morse panel content is cipher input, not decoration.
re-rank · Promoted from #5 to #2. Same reason as Weltzeituhr — Phase 2A.1's motivation weakened, novel Sanborn-validated directions get the slot.
prior work · NONE — first project to attempt this per Sanborn's Nov 2025 statement.
- 3↓ from #22A.2
K3-style 8-then-24 transposition + Vigenère
queuedK3 is a known transposition cipher (Stein 1999). Sanborn-confirmed transposition is in the project. K4 may be K3 with additional stages.
prior work · Stein 1999 documented K3's mechanism. No public exhaustive K4 sweep in this exact composite form.
- 42B.2
Mengenlehreuhr lamp-state keystream
queuedCommunity-favorite reading of the 2014 hint. Small keyspace (1,440 states/day × small date window) makes a clean exhaustive sweep cheap to run.
prior work · Hoerenberg attempted; not exhaustively documented in public literature.
- 5↓ from #12A.1
Width-7 columnar transposition + Vigenère
queuedphases ·2A.1Originally top-priority based on the H3 × S1 intersection (Scheidt masking × lag-7 anomaly + 1992 NSA "interval 7 roughness" report, Bean 2018). Ran on the compute host at ~17K attempts/sec from 2026-04-30T02:21Z until the Weltzeituhr handoff at ~05:30Z. ~108M attempts logged; no candidate passed the crib gate.
re-rank · Demoted from #1 to #5 after the period-7 attribution test (2026-04-30): K4's lag-7 z=+3.05 is +3σ vs uniform random but only +1.3σ vs same-length English samples. The lag-7 signal is plaintext-side, not encryption-side.
prior work · Bean 2021 Histocrypt covered Gromark base-10 length-5 (not this family). doranchak ran community Vigenère sweeps but width-7 was not exhaustively documented. This project's first pass: 0/108M crib-passing.
- 62H
XOR-layered approaches
queuedGerman Guesser 2022 reportedly "started to look right" (Source TBD primary). High-IoC XOR layers are consistent with K4's IoC profile.
prior work · German Guesser specifics not public. Bonifacino 2025 SSRN running-key paper pending review.
- 72C
Hill cipher variants — sizes ≥ 4×4 only
queuedBauer 2016 Cryptologia ruled out 2×2 and 3×3 with the BERLIN/CLOCK constraint, and Bean 2018 closed all six 3×3 alignments. 4×4 and larger remain untested.
prior work · Bauer 2016 Cryptologia (negative for 2×2, 3×3). Edkins 2004 (negative for 2×2). Do not re-run smaller sizes.
- 82D
Gromark with non-standard primers or KRYPTOS-keyed plain alphabet
queuedBean 2021 Histocrypt established a negative result for base-10 length-5 primer with standard alphabets. Non-standard primers and KRYPTOS-keyed plain alphabets remain untested.
prior work · Bean 2021 Histocrypt (negative for standard parameters). Do not re-run those.
- 92A.3
Composite: position-dependent algorithm change
queuedThe "K4 changes algorithm at position 21 or 34" hypothesis. Lower priority unless stronger evidence emerges — high-degree-of-freedom search.
prior work · None systematic.
- 102F
K2-keyed K4
deprioritizedSanborn 2019 (per Hoerenberg summary, primary TBD): "the 4th message is solvable without knowing the contents of the other messages." Directly inconsistent with K2-as-key.
prior work · Various community attempts. Consistent failures.
- 112G
Antipodes-derived
blocked on inputWhether Antipodes ' K4 region differs character-by-character from Kryptos' K4 is unverified by this project. Verify first via primary photograph before any attack.
prior work · Various community attempts to use Cyrillic Projector text as key. Failures.
- 122I
Synthesis-novel: physical-key + classical-cipher composition
queuedSanborn 2025: "Who says it is even a math solution?" explicitly permits non-mathematical key sources. Pure mathematical families are the less favored direction post-November 2025.
prior work · Open category — not a single existing program of work.
ETA
Honest accounting.
Throughput: ~17,000 decryption attempts per second on a single ARM compute host (2 cores). Live count on the home page.
Project ETA: not computable. Project success depends on which family contains the cipher. The Bayesian prior for any single family is low; the queue covers 12 families to make multiple bets without overcommitting compute to any one.
Reference class: K4 has been publicly attacked for 35 years. This project is 2 days old.
What can be predicted is per-family sweep duration once a family is parameterised. The active sweep (Phase 2A.1, width-7 columnar) has tried ~108M attempts so far against an effectively-unbounded keyspace — the sweep terminates only by exhaustion bounds set per attempt batch, not by full keyspace coverage. The next-priority family (Weltzeituhr keystream) has a small bounded keyspace and would sweep in minutes — but is blocked on a primary-source TBD (1988-era engraving of the clock face).