1 |
Number Sequence |
I |
3691 |
100 |
2 |
Original Caesar Cipher |
I |
2513 |
100 |
3 |
Number Sequence — Part 2 |
I |
1775 |
100 |
4 |
Caesar Encryption |
I |
1226 |
100 |
5 |
Beaver Code |
I |
993 |
100 |
6 |
Letter to the Templars — Part 1 |
I |
863 |
100 |
7 |
Number Sequence — Part 3 |
I |
825 |
100 |
8 |
Letter to the Templars — Part 2 |
I |
689 |
100 |
9 |
Number Sequence — Part 4 |
I |
680 |
100 |
10 |
A hidden word |
I |
676 |
100 |
11 |
Letter to the Templars — Part 3 |
II |
577 |
1091 |
12 |
Affine Codes / Modulo Arithmetic with N / Extended Euclid |
I |
482 |
100 |
13 |
Monoalphabetic Substitution |
I |
475 |
100 |
14 |
Cracking SHA1-Hashed Passwords |
II |
431 |
1086 |
15 |
Factorization Cipher — Part 1 |
I |
429 |
100 |
16 |
Grille Cipher |
I |
402 |
100 |
17 |
A modified homophonic cipher with reduced alphabets — Part 1 |
I |
354 |
100 |
18 |
Advent-Challenge — Part 1 |
I |
308 |
100 |
19 |
A modified homophonic cipher with reduced alphabets — Part 2 |
I |
304 |
100 |
20 |
Number Sequence — Part 8 |
I |
280 |
100 |
21 |
One-Time Pad with Flaws |
I |
270 |
100 |
22 |
Snow White and the seven dwarfs |
I |
253 |
100 |
23 |
Alice's Birthday Party (Part 1) |
II |
252 |
1085 |
24 |
Alice's Birthday Party (Part 2) |
II |
243 |
1085 |
25 |
From Russia with Love |
I |
235 |
100 |
26 |
How do you become a big cryptographer? |
I |
194 |
100 |
27 |
Broadcasting and low exponent — RSA-Attack |
II |
193 |
1087 |
28 |
Modified Caesar Cipher |
I |
192 |
100 |
29 |
Reserve Hand Procedure — Part 1 |
I |
174 |
100 |
30 |
M-138 — Part 1 |
I |
169 |
100 |
31 |
Not-so-Secret Message from Malawi — Part I (RSA) |
II |
166 |
1085 |
32 |
Brute-Force-Attack on Triple-DES with Reduced Key Space |
II |
161 |
1085 |
33 |
Letter from the Alleged Countess Julie von Ortenburg |
I |
157 |
100 |
34 |
Classical Ciphers^3 |
I |
157 |
100 |
35 |
Enigma Messages with Repeated Letters — Part 1 |
I |
155 |
100 |
36 |
Nils away on travel |
I |
143 |
100 |
37 |
Hybrid Encryption I |
II |
141 |
1085 |
38 |
Pigpen with a twist — Part 1 |
I |
139 |
100 |
39 |
RSA: Two different keys — same ciphertext |
II |
139 |
1087 |
40 |
The Book Code: A Challenge for Bookworms |
I |
130 |
100 |
41 |
¿No Hablas Español? No problemo! |
I |
127 |
100 |
42 |
Factorization Cipher — Part 2 |
II |
126 |
1088 |
43 |
Molehunt (Part 1/3) |
I |
125 |
100 |
44 |
Molehunt (Part 2/3) |
I |
123 |
100 |
45 |
Enigma Part 1 |
II |
117 |
1085 |
46 |
A Secret Message from Castle Mansfeld |
I |
113 |
100 |
47 |
Trifid Cipher |
I |
108 |
100 |
48 |
A really long number sequence |
II |
108 |
1087 |
49 |
Number Sequence — Part 6 |
I |
106 |
100 |
50 |
M-138 — Part 2 |
II |
104 |
1100 |
51 |
ADFGVX — Part 2 |
I |
104 |
100 |
52 |
Image Noise |
I |
101 |
100 |
53 |
Kaskade-S/T — Part 1 |
I |
98 |
100 |
54 |
Autokey Cipher |
I |
98 |
100 |
55 |
ADFGVX — Part 1 |
I |
95 |
100 |
56 |
Playfair Encryption |
I |
95 |
100 |
57 |
Enigma Combinatorics |
I |
92 |
100 |
58 |
Playfair with hints about the grid |
I |
91 |
100 |
59 |
Double Columnar Transposition |
I |
90 |
100 |
60 |
Heartbleed — Part 1 |
I |
89 |
100 |
61 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 |
I |
86 |
100 |
62 |
ECDH-Key Exchange for Beginners |
I |
84 |
100 |
63 |
Cryptanalysis Hacking Puzzles — Part 2 |
I |
82 |
100 |
64 |
A hidden word — Part 2 |
I |
82 |
100 |
65 |
Factorization Cipher — Part 3 |
II |
80 |
1088 |
66 |
ORYX Stream Cipher Part I |
II |
77 |
1085 |
67 |
Enigma Part 2 |
II |
77 |
1085 |
68 |
Number Sequence — Part 10 |
I |
76 |
100 |
69 |
Zodiac Cipher |
I |
76 |
100 |
70 |
The Last Note |
I |
76 |
100 |
71 |
Number Sequence — Part 5 |
I |
74 |
100 |
72 |
Number Sequence — Part 9 |
I |
74 |
100 |
73 |
Partial Key Exposure with RSA — Part 1 |
II |
72 |
1089 |
74 |
Hill Cipher with Sudoku Key |
I |
71 |
100 |
75 |
Enigma Messages with Repeated Letters — Part 3 |
I |
70 |
100 |
76 |
Molehunt (Part 3/3) |
II |
70 |
1085 |
77 |
Enigma Messages with Repeated Letters — Part 2 |
I |
69 |
100 |
78 |
Enigma Messages |
I |
68 |
100 |
79 |
Enigma Messages with Repeated Letters — Part 5 |
I |
67 |
100 |
80 |
Multilingual Monoalphabetic Substitution |
I |
65 |
100 |
81 |
Smartcard RSA |
II |
64 |
1085 |
82 |
BCR code (Book-Caesar-RSA) |
II |
64 |
1090 |
83 |
Number Sequence — Part 7 |
I |
63 |
100 |
84 |
Cascading Encryption — Part 1/3 |
I |
63 |
100 |
85 |
Enigma Messages with Repeated Letters — Part 4 |
I |
61 |
100 |
86 |
Turing Bombe Enigma I |
I |
61 |
100 |
87 |
Heartbleed — Part 2 |
I |
60 |
100 |
88 |
AES key — encoded in the machine readable zone of a European ePassport |
II |
60 |
1088 |
89 |
Unusual encryption using a diophantine equation |
II |
57 |
1087 |
90 |
Recycled One-Time Pad |
I |
57 |
100 |
91 |
An Invisible Message |
I |
54 |
100 |
92 |
Monoalphabetic substitution with camouflage — Part 1 |
I |
54 |
100 |
93 |
Kaskade-S/T — Part 2 |
II |
48 |
1086 |
94 |
M-138 — Part 3 |
II |
47 |
1100 |
95 |
The Einstein Enigma |
II |
47 |
1132 |
96 |
ORYX Stream Cipher Part II |
II |
45 |
1085 |
97 |
New Year's Greetings — Part 1 |
I |
44 |
100 |
98 |
Monoalphabetic substitution with camouflage — Part 2 |
II |
44 |
1088 |
99 |
Unconcealed RSA messages |
II |
44 |
1088 |
100 |
News from Castle Mansfeld |
I |
43 |
100 |
101 |
Monoalphabetic substitution with camouflage — Part 4 |
I |
42 |
100 |
102 |
Keyshanc — Part 1 |
II |
42 |
1089 |
103 |
RSA Factoring Challenge: RSA-704 |
II |
41 |
0 |
104 |
Lunchtime Attack on the Fully Homomorphic Encryption Scheme |
II |
41 |
1085 |
105 |
New Year's Greetings — Part 2 |
I |
41 |
100 |
106 |
Strange Message from Thessaloniki |
I |
41 |
100 |
107 |
Monoalphabetic substitution with camouflage — Part 3 |
II |
40 |
1088 |
108 |
Modular Sequences |
I |
39 |
100 |
109 |
Weakened Granit — Part 1 |
I |
39 |
100 |
110 |
An 'unhearable' message |
I |
38 |
100 |
111 |
Music Code — Part 1 |
I |
38 |
100 |
112 |
New Year's Greetings — Part 3 |
I |
38 |
100 |
113 |
Music Code — Part 2 |
II |
38 |
1086 |
114 |
Pigpen with a twist — Part 2 |
II |
37 |
1087 |
115 |
Ku Klux Klan |
X |
36 |
var |
116 |
New Year's Greetings — Part 4 |
I |
36 |
100 |
117 |
CMEA 1 |
II |
36 |
1085 |
118 |
Double Column Transposition — Part 4 |
II |
36 |
1097 |
119 |
Double Column Transposition — Part 2 |
II |
35 |
1097 |
120 |
Summer Job |
II |
35 |
1140 |
121 |
RSA Factoring Challenge: RSA-210 |
II |
35 |
0 |
122 |
Not-so-Secret Message from Malawi — Part II (ECC) |
II |
34 |
1085 |
123 |
Pigpen with a twist — Part 3 |
II |
33 |
1087 |
124 |
Keyshanc — Part 2 |
II |
33 |
1089 |
125 |
Advent-Challenge — Part 2 |
II |
32 |
1129 |
126 |
Double Column Transposition — Part 3 |
II |
31 |
1097 |
127 |
ORYX Stream Cipher — Part 3 (revised) |
II |
30 |
1093 |
128 |
Heartbleed — Part 3 |
II |
30 |
1099 |
129 |
Advent Challenge — Part 4 |
II |
29 |
1130 |
130 |
Kaskade-S/T — Part 3 |
II |
29 |
1086 |
131 |
Trendy Messenger |
II |
28 |
1140 |
132 |
Advent Challenge — Part 3 |
II |
28 |
1130 |
133 |
Fastest in the West |
II |
26 |
1140 |
134 |
Monoalphabetic Substitution with Camouflage — Part 5 |
II |
25 |
1089 |
135 |
CMEA 2 |
III |
24 |
13130 |
136 |
Spanish Strip Cipher — Part 1 |
II |
24 |
1096 |
137 |
Lattice Part 1 |
II |
24 |
1086 |
138 |
Double Column Transposition — Part 1 |
II |
23 |
1097 |
139 |
Homophonic Encryption — Part 1 |
II |
22 |
1183 |
140 |
Cryptanalysis Hacking Puzzles — Part 1 |
I |
21 |
100 |
141 |
Typex — Part 1 |
II |
21 |
1092 |
142 |
RSA with Special d |
III |
21 |
13124 |
143 |
RSA Factoring Challenge: RSA-220 |
II |
20 |
0 |
144 |
Spanish Strip Cipher — Part 2 |
II |
20 |
1096 |
145 |
Homophonic Encryption — Part 2 |
II |
19 |
1184 |
146 |
Monoalphabetic Substitution with Nostradamus Flavor |
II |
19 |
1167 |
147 |
Typex — Part 2 |
II |
18 |
1092 |
148 |
Handycipher made in love — Part 1 |
II |
18 |
1167 |
149 |
Homophonic Encryption — Part 3 |
II |
18 |
1184 |
150 |
RSA Factoring Challenge: RSA-230 |
II |
17 |
0 |
151 |
M-138 — Part 4 |
II |
16 |
1100 |
152 |
Breaking a Filter Generator |
II |
16 |
1149 |
153 |
Concealed Messages — Vigenère's Night Sky |
X |
16 |
var |
154 |
Weakened Handycipher — Part 1 |
II |
15 |
1103 |
155 |
Purple 1 |
II |
15 |
1085 |
156 |
Homophonic Encryption — Part 4 |
II |
15 |
1184 |
157 |
AES ECB Wrong Encoding |
II |
15 |
1129 |
158 |
Weakened Handycipher — Part 3 |
II |
14 |
1103 |
159 |
ASAC — A Strong(er) ADFGVX Cipher — Part 1 |
II |
14 |
1111 |
160 |
A Cloaked Substitution Cipher — Part 1 |
II |
14 |
1224 |
161 |
New Year's Greetings — Part 5 |
II |
14 |
1109 |
162 |
Flawed Usage of a OTP Cipher by the BND |
II |
13 |
1104 |
163 |
Handycipher made in love — Part 2 |
II |
13 |
1187 |
164 |
A Cloaked Substitution Cipher — Part 2 |
II |
13 |
1227 |
165 |
Weakened Handycipher — Part 2 |
II |
13 |
1103 |
166 |
Sigaba Part 1 |
II |
12 |
1085 |
167 |
Cascading Encryption — Part 2/3 |
II |
11 |
1092 |
168 |
ORYX Stream Cipher — Part 4a |
II |
11 |
1097 |
169 |
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 |
II |
11 |
1086 |
170 |
Cascading Encryption — Part 3/3 |
II |
11 |
1092 |
171 |
Kaskade-S/T — Part 5 |
II |
10 |
1086 |
172 |
Akelarre Part 1 |
II |
9 |
1085 |
173 |
Hilly — Part 1 |
II |
8 |
1117 |
174 |
Cipher ID — Part 1 |
II |
8 |
1385 |
175 |
Polyphonic Substitution Cipher — Part 1 |
II |
7 |
1398 |
176 |
Handycipher — Part 2 |
II |
7 |
1101 |
177 |
Double Column Transposition — Part 5 |
II |
7 |
1098 |
178 |
The T52 Sturgeon Challenge — Part 1 |
II |
6 |
1205 |
179 |
Handycipher — Part 3 |
III |
6 |
13406 |
180 |
Kaskade-S/T — Part 6 (RansomKaskade Part 1) |
II |
6 |
1122 |
181 |
Handycipher — Part 5 |
III |
5 |
13558 |
182 |
Handycipher — Part 6 |
III |
5 |
13558 |
183 |
Handycipher — Part 1 |
II |
5 |
1101 |
184 |
Weakened Handycipher — Part 4 |
II |
5 |
1111 |
185 |
"The Road" — Part 1 |
II |
5 |
1157 |
186 |
Weakened Handycipher — Part 5 |
II |
5 |
1111 |
187 |
Holographic Encryption — Part 1 |
II |
5 |
1119 |
188 |
The T52 Sturgeon Challenge — Part 2 |
II |
5 |
1209 |
189 |
Weakened Handycipher — Part 6 |
II |
5 |
1111 |
190 |
Notes of an Italian Soldier |
X |
4 |
var |
191 |
Handycipher — Part 4 |
III |
4 |
13558 |
192 |
The T52 Sturgeon Challenge — Part 3 |
II |
4 |
1209 |
193 |
Holographic Encryption — Part 2 |
II |
3 |
1119 |
194 |
The Vatican Challenge — Part 1 |
X |
3 |
var |
195 |
Spirale — Part 1 |
II |
3 |
1104 |
196 |
The Vatican Challenge — Part 2 |
X |
3 |
var |
197 |
Spirale — Part 3 |
II |
3 |
1104 |
198 |
Handycipher — Part 9 |
III |
3 |
13646 |
199 |
Extended Handycipher — Part 5 |
III |
3 |
13558 |
200 |
Sigaba Part 2 |
III |
3 |
13124 |
201 |
Handycipher — Part 8 |
III |
3 |
13646 |
202 |
Extended Handycipher — Part 4 |
III |
3 |
13558 |
203 |
Spirale — Part 2 |
II |
3 |
1104 |
204 |
Extended Handycipher — Part 2 |
II |
3 |
1102 |
205 |
Extended Handycipher — Part 1 |
II |
3 |
1102 |
206 |
Extended Handycipher — Part 3 |
II |
3 |
1102 |
207 |
The T52 Sturgeon Challenge — Part 4 |
II |
3 |
1209 |
208 |
ORYX Stream Cipher — Part 4b |
III |
2 |
13329 |
209 |
The T52 Sturgeon Challenge — Part 12 |
II |
2 |
1218 |
210 |
The T52 Sturgeon Challenge — Part 5 |
II |
2 |
1218 |
211 |
The T52 Sturgeon Challenge — Part 11 |
II |
2 |
1218 |
212 |
Handycipher — Part 7 |
III |
2 |
13646 |
213 |
Extended Handycipher — Part 6 |
III |
2 |
13558 |
214 |
Unknown Author |
X |
2 |
var |
215 |
The T52 Sturgeon Challenge — Part 8 |
II |
2 |
1218 |
216 |
The T52 Sturgeon Challenge — Part 6 |
II |
2 |
1218 |
217 |
RSA Factoring Challenge: RSA-240 |
III |
2 |
0 |
218 |
The T52 Sturgeon Challenge — Part 7 |
II |
2 |
1218 |
219 |
Weakened ElsieFour — Part 1 |
II |
2 |
1137 |
220 |
ElsieFour — Part 1 |
III |
2 |
13787 |
221 |
Catherine of Aragon's Letter to King Ferdinand, her Father (1509) |
X |
2 |
var |
222 |
Weakened ElsieFour — Part 3 |
II |
2 |
1126 |
223 |
Double Column Transposition |
X |
2 |
var |
224 |
Beale Ciphers |
X |
1 |
var |
225 |
ASAC — A Strong(er) ADFGVX Cipher — Part 2 |
II |
1 |
1111 |
226 |
The T52 Sturgeon Challenge — Part 10 |
II |
1 |
1218 |
227 |
Hilly — Part 2 |
II |
1 |
1127 |
228 |
The T52 Sturgeon Challenge — Part 9 |
II |
1 |
1218 |
229 |
Monoalphabetic Substitution with Camouflage — Part 6 |
II |
1 |
1090 |
230 |
Substitution Cipher with Non-Prefix Codes |
III |
1 |
13155 |
231 |
The Vatican Challenge — Part 4 |
X |
1 |
var |
232 |
Handycipher — Part 10 |
II |
1 |
1198 |
233 |
"The Road" — Part 2 |
II |
0 |
1157 |
234 |
RSA Factoring Challenge: RSA-470 |
III |
0 |
13188 |
235 |
The Heavy T52 Sturgeon Challenge — Part 3 |
III |
0 |
15779 |
236 |
The Heavy T52 Sturgeon Challenge — Part 2 |
III |
0 |
15496 |
237 |
"The Road" — Part 3 |
II |
0 |
1157 |
238 |
RSA Factoring Challenge: RSA-2048 |
III |
0 |
13188 |
239 |
Kryptos |
X |
0 |
var |
240 |
World Record Challenge: Break 65 Bits of AES |
III |
0 |
13124 |
241 |
The Heavy T52 Sturgeon Challenge — Part 1 |
III |
0 |
15382 |
242 |
RSA Factoring Challenge: RSA-490 |
III |
0 |
13188 |
243 |
Weakened ElsieFour — Part 2 |
II |
0 |
1137 |
244 |
The Vatican Challenge — Part 5 |
X |
0 |
var |
245 |
RSA Factoring Challenge: RSA-480 |
III |
0 |
13188 |
246 |
The Vatican Challenge — Part 3 |
X |
0 |
var |
247 |
RSA Factoring Challenge: RSA-617 |
III |
0 |
13188 |
248 |
Dorabella |
X |
0 |
var |
249 |
D'Agapeyeff |
X |
0 |
var |
250 |
RSA Factoring Challenge: RSA-500 |
III |
0 |
13188 |
251 |
RSA Factoring Challenge: RSA-460 |
III |
0 |
13188 |
252 |
RSA Factoring Challenge: RSA-1024 |
III |
0 |
13188 |
253 |
RSA Factoring Challenge: RSA-310 |
III |
0 |
13188 |
254 |
RSA Factoring Challenge: RSA-320 |
III |
0 |
13188 |
255 |
RSA Factoring Challenge: RSA-330 |
III |
0 |
13188 |
256 |
RSA Factoring Challenge: RSA-309 |
III |
0 |
13188 |
257 |
RSA Factoring Challenge: RSA-300 |
III |
0 |
13188 |
258 |
RSA Factoring Challenge: RSA-270 |
III |
0 |
13188 |
259 |
RSA Factoring Challenge: RSA-896 |
III |
0 |
13188 |
260 |
RSA Factoring Challenge: RSA-280 |
III |
0 |
13188 |
261 |
RSA Factoring Challenge: RSA-290 |
III |
0 |
13188 |
262 |
ORYX Stream Cipher — Part 4c |
III |
0 |
13329 |
263 |
RSA Factoring Challenge: RSA-340 |
III |
0 |
13188 |
264 |
Double Column Transposition Reloaded — Part 3 |
III |
0 |
13304 |
265 |
Double Column Transposition Reloaded — Part 2 |
III |
0 |
13304 |
266 |
Double Column Transposition Reloaded — Part 1 |
III |
0 |
13304 |
267 |
RSA Factoring Challenge: RSA-390 |
III |
0 |
13188 |
268 |
RSA Factoring Challenge: RSA-380 |
III |
0 |
13188 |
269 |
RSA Factoring Challenge: RSA-370 |
III |
0 |
13188 |
270 |
Spanish Strip Cipher — Part 3 |
X |
0 |
var |
271 |
RSA Factoring Challenge: RSA-410 |
III |
0 |
13188 |
272 |
RSA Factoring Challenge: RSA-350 |
III |
0 |
13188 |
273 |
RSA Factoring Challenge: RSA-360 |
III |
0 |
13188 |
274 |
RSA Factoring Challenge: RSA-420 |
III |
0 |
13188 |
275 |
RSA Factoring Challenge: RSA-260 |
III |
0 |
13188 |
276 |
Kaskade-S/T — Part 4 |
II |
0 |
1086 |
277 |
Digital Signatures: DSA with Medium Fields |
III |
0 |
13166 |
278 |
The third ENIGMA M4 message |
X |
0 |
var |
279 |
ORYX Stream Cipher — Part 4d |
III |
0 |
13271 |
280 |
RSA Factoring Challenge: RSA-400 |
III |
0 |
13188 |
281 |
ASAC — A Strong(er) ADFGVX Cipher — Part 3 |
II |
0 |
1111 |
282 |
Recovering the Private Key in the Fully Homomorphic Encryption Scheme |
III |
0 |
13135 |
283 |
Twelve-Year-Old Murder Case |
X |
0 |
var |
284 |
ASAC — A Strong(er) ADFGVX Cipher — Part 5 |
II |
0 |
1111 |
285 |
ASAC — A Strong(er) ADFGVX Cipher — Part 4 |
II |
0 |
1111 |
286 |
Weakened Granit — Part 3 |
II |
0 |
1105 |
287 |
Weakened Granit — Part 2 |
II |
0 |
1105 |
288 |
Double-Column Transposition/Granit — Part 1 |
II |
0 |
1103 |
289 |
RSA Factoring Challenge: RSA-440 |
III |
0 |
13188 |
290 |
RSA Factoring Challenge: RSA-430 |
III |
0 |
13188 |
291 |
RSA Factoring Challenge: RSA-250 |
III |
0 |
13188 |
292 |
Double-Column Transposition/Granit — Part 2 |
II |
0 |
1103 |
293 |
Double-Column Transposition/Granit — Part 3 |
II |
0 |
1103 |
294 |
RSA Factoring Challenge: RSA-450 |
III |
0 |
13188 |
295 |
RSA Factoring Challenge: RSA-232 |
III |
0 |
13188 |
296 |
Spirale — Part 4 |
III |
0 |
13454 |
297 |
RSA Factoring Challenge: RSA-1536 |
III |
0 |
13188 |