Rating:

Given file encoded.txt:
0e0e0e0e0e0e0e0e0e0e0p0a0e0a0e0e0e0a0e0e0e0e0e0e0e0a0e0e0e0e1e1e0e0e1e0e0c0c0c0c1i
0s0a0a0a0a0i0i0i0i0i0j1e0e0e0e0e0e0e0e0e0e0e0e0e0j0c0i0i0i0i0i0i0i0i0i1i0i0i0i0i0i0i0i0i0j0a0e0e
0j0i0i0i0i0i0i0i0j0e0e0e0e0e0e0e0e0e0e0e1e1e0e1j1c0j1a1i0i1i1i0i0i1i1i1i1i0i1i0i0i1j0i0i1j0c0e1j0
a0i0i0i0i0i0i0j0c0i0j0a0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0e0j0c0i0j0a0i0i0i0i0i0i0i0i0i0i0i0
i0i0i0i0i0i0i0i1j0e0e0e0e1j0c0i1i0i0j1j0a0e1e0e0e1e0e0e1e0e0j1e0e0e1e0e0e1e0e0e1e0e0e1e0e0
e1e0e0j11000000000000000000000000000000001000010010010010010010010010010010011000
00000000000000000000000000000000000000000000100001001001001001001001001001001001
00100100100100100100100100100100110001100100100110001000100100100100100100100100
10010010010011000110000000001000100000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000100011001
00100100100100100100100100100100100100100100100100100110000000010000100100100100
11000000000000000000000001000010010010011000100010010010010010010010010011000110
01001100010001001001001001001001001001001001001001001001100

As the in description fuck word is given. I tried different types of ciphers starting or ending
with fuck like Brainfuck, 2Dfuck, Boolfuck, Bitwise Fuckery, emotifuck, Random brainfuck
but none of worked.
Then I tried binary fuck which led me to the half of the flag.

![image](https://user-images.githubusercontent.com/76834257/229887505-c20cf0c2-e725-4e6b-813e-69ae10cb8730.png)

I was surfing website and suddenly I remembered I have seen this type of cipher as in ALP
Huck so I tried decrypting half part of the cipher and I got this:

![image](https://user-images.githubusercontent.com/76834257/229887697-7bde8f9b-70d1-4770-bb39-3189e33ed023.png)

Tool used: tio.run

```Flag: VishwaCTF{35073r1c_l4ngu4ge5_4r3_c00l}```

Original writeup (https://github.com/CBC-MIT/CTF-Writeups/tree/main/VishwaCTF2k23/Crossing%20the%20Red%20Sea).