MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11057
Follow us: Facebook Twitter
 



Level II Challenges (158)

Page 17 of the challenges in Level II, ordered by date posted (the most recent appear first).

Spirale — Part 1

[allard-01] - 5 users already solved this challenge, 2 are working on it.
 
 
 

Spirale is a OTP cipher designed to be simple to implement by hand. It is resilient to errors as they have only a local effect without obscuring all the ciphertext.
Part 1 is a partly-known plaintext challenge with a 314-letter ciphertext. The first 75 letters of the plaintext are known.
Part 2 of this series uses the same four keys as this one.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-08-23 19:04
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

S Combes (jerva) 1378 (242717) 2015-09-12 21:12:42
J-L Morel (Rossignol) 1143 (42130) 2017-01-19 15:14:20
George Lasry (george4096) 1129 (399565) 2017-08-21 20:56:27
Kurt Gebauer (Yokozuna) 1103 (282608) 2020-01-28 12:24:14
#5 D3d4lu5 (D3d4lu5) 1098 (363488) 2021-01-19 19:42:42
You must be logged in to solve the challenge


Flawed Usage of a OTP Cipher by the BND

[drobick-04] - 14 users already solved this challenge.
 
 
 

During the cold war the foreign intelligence agency of Germany established so-called stay-behind units. Their radio messages were encrypted by a OTP method, but the keys were used multiple times.
This challenge is about the effect of this multiple usage on the security of the method. You are given 5 messages, all encrypted with the same key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-08-23 19:00
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#14) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 1725 (206965) 2015-08-26 17:13:36
Kurt Gebauer (Yokozuna) 1576 (282608) 2015-08-28 22:20:36
Alain (Integral) 1456 (207924) 2015-09-04 16:37:12
Bart den Hartog (Bart13) 1398 (148936) 2015-09-10 14:30:56
#5 Julia Bernotat (El Greco ) 1337 (81129) 2015-09-21 21:32:23
#6 Robert (rm) 1292 (56475) 2015-10-08 21:06:29
#7 Matthias Kotzerke (Esdeath) 1182 (4004) 2016-03-30 19:45:17
#8 Em Doulgerakis (Greko) 1172 (193799) 2016-05-16 09:35:38
#9 Alain Collignon (vexilla72) 1152 (123666) 2016-10-10 18:28:06
#10 D3d4lu5 (D3d4lu5) 1130 (363488) 2017-08-08 22:49:04
#11 Nicolas (nicosPavlov) 1120 (257791) 2018-04-01 11:44:13
#12 Dominik M. (Sgt. Pepper) 1117 (128575) 2018-06-21 23:00:27
#13 Eugene (lim0n) 1106 (178540) 2019-09-28 17:08:21
#14 Polaris (Polaris) 1100 (32963) 2020-08-16 17:37:58
You must be logged in to solve the challenge


Double-Column Transposition/Granit — Part 3

[drobick-03] - 0 users already solved this challenge.
 
 
 

This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. This part has a ciphertext-only challenge and the ciphertext has 80 characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-07-01 18:23
Maximum number of attempts for this challenge: 10

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Double-Column Transposition/Granit — Part 2

[drobick-02] - 0 users already solved this challenge.
 
 
 

This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. This part has a ciphertext-only challenge and the ciphertext has 110 characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-07-01 18:21
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Double-Column Transposition/Granit — Part 1

[drobick-01] - 0 users already solved this challenge, 2 are working on it.
 
 
 

This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. In this part a codebook is used additionally, and the given ciphertext has 70 characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-07-01 18:20
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:13 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [04:01 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 1'    +++    [01:02 - 17.06.2021] RogueRamblers solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++    [13:38 - 16.06.2021] E01814058 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [13:37 - 16.06.2021] E01814263 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++