MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11057
Follow us: Facebook Twitter
 



Level II Challenges (158)

Page 13 of the challenges in Level II, ordered by date posted (the most recent appear first).

Advent-Challenge — Part 2

[rotthaler-04] - 45 users already solved this challenge, 2 are working on it.
 
 
 

Mike would like to belong to the cryptographers. Can you help him to find out their meeting point at the Christmas market?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-12-16 19:20
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#45) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 2000 (282608) 2017-12-17 00:20:59
Dominik M. (Sgt. Pepper) 2000 (128575) 2017-12-17 06:30:45
Alain Collignon (vexilla72) 2000 (123666) 2017-12-17 11:20:39
Viktor (Veselovský) 2000 (169444) 2017-12-17 12:30:11
#5 Snake (snk) 2000 (187783) 2017-12-17 13:08:04
#6 HolgerK (HolgerK) 1824 (25776) 2017-12-17 21:40:33
#7 Armin Krauss (argh) 1824 (206965) 2017-12-17 23:35:23
#8 H. Lautenschlager (helmi) 1824 (56470) 2017-12-18 16:07:50
#9 Em Doulgerakis (Greko) 1824 (193799) 2017-12-18 16:55:03
#10 Rainer Zufall (kiekuk) 1725 (56786) 2017-12-19 18:36:20
#11 Mir Dim (mir0soft) 1660 (79760) 2017-12-20 14:38:38
#12 J-L Morel (Rossignol) 1660 (42130) 2017-12-20 15:48:19
#13 Kasia (kasia-tutej) 1613 (53366) 2017-12-21 14:27:23
#14 Martin (martinbucher) 1613 (38365) 2017-12-21 16:34:55
#15 D3d4lu5 (D3d4lu5) 1576 (363488) 2017-12-22 14:54:56
#16 chris_3stones (3stones) 1469 (38845) 2017-12-26 20:14:01
#17 George (Theofanidis) 1469 (122085) 2017-12-26 20:17:25
#18 T (Wagner) 1433 (16988) 2017-12-30 08:51:23
#19 Nicolas (nicosPavlov) 1414 (257791) 2018-01-01 12:24:40
#20 E.T (Ertheb) 1406 (81809) 2018-01-02 18:16:51
#21 j.h. (haegarq) 1357 (15352) 2018-01-10 11:36:25
#22 Tristan1473 (Tristan1473) 1260 (20432) 2018-02-22 09:28:54
#23 Thomas Gonda (TomG) 1236 (36291) 2018-03-19 14:50:31
#24 Szabó Zoltán (szabo.z87) 1222 (55604) 2018-04-09 12:22:19
#25 Silvia Kortmann (mikinsget) 1203 (20341) 2018-05-17 01:25:36
#26 Hans Joachim Girulat (joregi) 1177 (36278) 2018-08-16 23:28:02
#27 Random Dude (rnd) 1168 (103645) 2018-10-04 15:41:41
#28 Hans Peter (hanspeter) 1162 (52356) 2018-11-08 18:57:23
#29 Luigi Tomelli (archstanton) 1157 (127538) 2018-12-17 18:06:55
#30 zuben c3 (zuben-c3) 1155 (27154) 2019-01-02 12:17:53
#31 Eugene (lim0n) 1144 (178540) 2019-04-20 21:06:17
#32 Bart den Hartog (Bart13) 1138 (148936) 2019-07-17 02:45:34
#33 David (dvd) 1128 (3813) 2020-01-05 22:00:38
#34 Lane Williams (planetlane) 1120 (34637) 2020-07-14 18:41:23
#35 Artur Puzio (cytadela8) 1118 (14801) 2020-09-21 11:03:52
#36 Polaris (Polaris) 1117 (32963) 2020-10-04 01:30:14
#37 Derek Hatton (alfred_noble) 1117 (33998) 2020-10-25 01:43:08
#38 Nicky (Wokini) 1116 (18494) 2020-11-11 09:31:15
#39 Flo (sealth) 1116 (25734) 2020-11-15 13:41:42
#40 Michael (FoM) 1116 (57794) 2020-12-06 00:28:43
#41 Claude Vaillancourt (Cl3v3r) 1115 (44129) 2020-12-22 19:24:09
#42 Jean-Francois (Muskrat) 1115 (19013) 2021-01-04 15:29:40
#43 Hank (hanky) 1114 (24373) 2021-02-03 15:20:05
#44 madness (madness) 1113 (71292) 2021-02-26 00:19:33
#45 Marco Cinelli (Snap) 1111 (37769) 2021-05-04 10:03:45
You must be logged in to solve the challenge


Hilly — Part 2

[almardeny-02] - 1 user already solved this challenge, 1 is working on it.
 
 
 

Hilly is an improved version of Hill cipher. This challenge consists of the decryption of a ciphertext by means of a partly-known key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-10-17 17:12
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Em Doulgerakis (Greko) 1156 (193799) 2018-10-29 21:19:05
You must be logged in to solve the challenge


Weakened ElsieFour — Part 3

[rotthaler-02] - 3 users already solved this challenge.
 
 
 

The challenges for the weakened ElsieFour serve as an exercise and use an intentionally weakened version of LC4. ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 3 is a partly-known-plaintext challenge which provides 2 messages that were encrypted with the same key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-10-03 06:39
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Nicolas (nicosPavlov) 1226 (257791) 2018-01-18 01:49:20
Michael Möller (michaelm) 1186 (253196) 2018-04-24 07:26:39
D3d4lu5 (D3d4lu5) 1113 (363488) 2020-12-29 19:34:27
You must be logged in to solve the challenge


Kaskade-S/T — Part 6 (RansomKaskade Part 1)

[mirkobe-01] - 6 users already solved this challenge.
 
 
 

From a honeypot you get a set of encrypted files and the according plaintext files. Could you discover the used key, to help victims of the ransom ware?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-07-02 12:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#6) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 1444 (206965) 2017-07-14 14:00:35
Michael Möller (michaelm) 1344 (253196) 2017-07-29 12:39:20
Kurt Gebauer (Yokozuna) 1186 (282608) 2018-01-22 18:16:47
George Lasry (george4096) 1156 (399565) 2018-07-08 22:27:49
#5 Alain Collignon (vexilla72) 1142 (123666) 2018-12-02 20:00:09
#6 D3d4lu5 (D3d4lu5) 1131 (363488) 2019-05-19 12:39:50
You must be logged in to solve the challenge


Holographic Encryption — Part 2

[pavillon-02] - 3 users already solved this challenge.
 
 
 

Holographic encryption can be performed by employing encryption masks which alter the field before propagation. This makes the image
unrecognizable when recorded. You are given three holograms that represent the cipher image and three plain images and their holograms which were encrypted with the same encryption masks.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-04-07 22:29
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 1613 (169444) 2017-04-12 18:46:17
Armin Krauss (argh) 1444 (206965) 2017-04-20 17:54:38
Eugene (lim0n) 1120 (178540) 2019-11-16 13:49:41
You must be logged in to solve the challenge
Pages [32] << < 56789101112131415161718192021 > >> Show All  
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:13 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [04:01 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 1'    +++    [01:02 - 17.06.2021] RogueRamblers solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++    [13:38 - 16.06.2021] E01814058 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [13:37 - 16.06.2021] E01814263 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++