Solution to The Crypt

Andrew Thomas and Oliver Kosut

The five lines of text are five cryptograms, each with a different key. The plaintext for each is the same pangram, but in each case all occurrences of a different set of letters have been deleted. The cryptograms can be solved by using the overlap between the information in the five lines, reconstructing the pangram:
PELVIC NAME FOR A CITY QUICKLY RAZED BY THE GREEKS WITH AJAX
The first answer is therefore ILIUM (a name for Troy which is also one of the bones of the pelvis)

The second answer arises from considering the keys to the five cryptograms (as is suggested by the fact that the clue phrase is a pangram). Each key is a mapping from the alphabet to itself, and is very conspicuously missing some letters (in both directions, of course). Look up the alphabetized list of missing ciphertext letters "backwards" through the mapping—that is, treat it as if it was a plaintext word whose ciphertext you wished to know. Do the reverse process on the missing plaintext letters. In each case, the translation produces one or two words, and all the ciphertext ones form a clue phrase, and the plaintext ones from a different cluephrase. This operation is easiest to see by writing the forward and reverse keys side-by-side, then reading across (in the other key) where there are gaps in one key, as follows:

 Xp Ne Ul Ki Jc Vn Ha Im Ne Sf Ro Ha Jc Ki Et Oy Tq Au Ki Jc Ck Ul Oy Ha Yz Ne Db Oy Et Ne Bg Ne Ne Ck Ls Ww Ki Et Ha Ha Gx Au Bg Ck Db Et F* Gx Ha Im Jc Ki Ls M* Ne Oy P* Q* Ro Sf Tq Ul Vn Ww Xp Yz Z* aH bD cJ d* eN fS gB h* iK j* kC lU mI nV oR pX qT r* sL tE uA v* wW xG yO zY
 Hp Ze Vv Ni Oc Ea Ze Mr Ea Oc Ni Ft Sy Wq Tu Ni Oc Gk Sy Mr Ea Ze Jd Ib Sy Ft Lh Ze Qg Mr Ze Ze Gk Xs Cw Ni Ft Lh Ea Rj Ea Dx A* B* Cw Dx Ea Ft Gk Hp Ib Jd K* Lh Mr Ni Oc P* Qg Rj Sy Tu U* Vv Wq Xs Y* Ze aE bI cO dJ eZ f* gQ hL iN jR kG l* m* n* o* pH qW rM sX tF uT vV wC xD yS z*
 Jp Ve Sl Gi Bc Ea Hm Ve Cf To Wr Ea Bc Gi Pt My Fq Iu Gi Bc Rk Sl My Wr Ea Ve Ad My Pt Nh Ve Wr Ve Ve Rk Zs Gi Pt Nh Ea Ea Lx Ad Bc Cf D* Ea Fq Gi Hm Iu Jp K* Lx My Nh O* Pt Q* Rk Sl To U* Ve Wr X* Y* Zs aE b* cB dA eV fC g* hN iG j* kR lS mH n* oT pJ qF rW sZ tP uI v* w* xL yM z*
 Ap Xe Ii Dn Ca Rm Xe Sf Ko Zr Ca Ii Lt Ny Tq Bu Ii Ny Zr Ca Xe Eb Ny Lt Vh Xe Hg Zr Xe Xe Ps Yw Ii Lt Vh Ca Oj Ca Ap Bu Ca Dn Eb F* G* Hg Ii J* Ko Lt M* Ny Oj Ps Q* Rm Sf Tq U* Vh W* Xe Yw Zr aC bE c* d* eX fS gH hV iI jO k* l* mR nD oK pA qT rZ sP tL uB v* wY x* yN z*
 Ap Ge Dl Ev Oc Kn Wa Ym Ge Mf To Ur Wa Oc Iy Oc Bk Dl Iy Ur Wa Nz Ge Xd Iy Ch Ge Ur Ge Ge Bk Rs Qw Ch Wa Lj Wa Ap Bk Ch Dl Ev F* Ge H* Iy J* Kn Lj Mf Nz Oc P* Qw Rs S* To Ur V* Wa Xd Ym Z* aW b* cO dX eG fM g* hC i* jL kB lD mY nK oT pA q* rU sR t* u* vE wQ x* yI zN

The clue phrases produced thereby are:
SIXTY EIGHTS ARTFILM SHORTBY MCLAREN
and
BACON THRICE CIPHERS ANOTHER KEYWORD
The first phrase is a clue for the second answer: PAS DE DEUX.

The second phrase provides instructions for finding the third answer. Specifically, there is another message hidden using Bacon's Cipher in the original ciphertext. This is easiest to see by looking at the HTML source, wherein the A/B distinction is also clearly laid out. Decoding the message produces
which of course doesn't look like English, because it's still ciphered two more times.

BACON ciphers the next step in a different way: it is a Vigenère cipher in which BACON is the keyword. This is perhaps fairly evident from the highly structured repeating nature of the ciphertext, which almost says BACON several times, because the plaintext itself is very simple:
baaba aabbb aabaa abbab aaabb abbab baaaa abbab
(Of course one can also see this as BACONBACONBACON... Caesar-shifted by 0 or 1 appropriately, which is the same thing.)
Either way, the last piece of data can be interpreted using Bacon's Cipher again to give the final answer: THEODORO