MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11195
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 



Level II Challenges (160)

Page 4 of the challenges in Level II, ordered by date posted (the most recent appear first).

The SZ42 Challenge — Part 1

[kopal-14] - 11 users already solved this challenge, 1 is working on it.
 
 
 

The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the first challenge in a series of 13 Level-2 challenges with the SZ42. Here, you are provided with 8 in-depth ciphertexts. Can you recover the plaintexts?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-07-22 23:20
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#11) Achieved points (Global score) y-m-d - h:m:s

Eugene (lim0n) 2000 (195334) 2020-07-23 16:28:56
Armin Krauss (argh) 2000 (206965) 2020-07-23 19:34:09
Dominik M. (Sgt. Pepper) 1613 (128575) 2020-07-27 14:04:16
Nicolas (nicosPavlov) 1576 (257791) 2020-07-28 11:57:43
#5 George Lasry (george4096) 1547 (422251) 2020-07-29 10:48:53
#6 Kurt Gebauer (Yokozuna) 1523 (282608) 2020-07-30 17:36:35
#7 H. Lautenschlager (helmi) 1373 (57600) 2020-08-13 20:47:47
#8 Scombes (jerva) 1270 (266541) 2020-09-20 10:56:05
#9 Random Dude (rnd) 1175 (103645) 2021-04-03 03:07:34
#10 zuben c3 (zuben-c3) 1158 (44417) 2021-07-13 16:40:12
#11 George (Theofanidis) 1152 (132517) 2021-09-05 17:54:08
You must be logged in to solve the challenge


Lightweight Introduction to Lattices — Part 3

[dimitrov-esslinger-03] - 25 users already solved this challenge.
 
 
 

This is part 3 of the challenge series about lattice-based cryptography schemes. This challenge introduces an encryption scheme which uses systems of linear equations. Can you decrypt a message without knowing the key?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-07-16 12:58
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#25) Achieved points (Global score) y-m-d - h:m:s

Dominik M. (Sgt. Pepper) 2000 (128575) 2020-07-16 13:39:08
S (Zyphe) 2000 (13361) 2020-07-16 14:13:42
Kurt Gebauer (Yokozuna) 2000 (282608) 2020-07-16 14:34:01
H. Lautenschlager (helmi) 2000 (57600) 2020-07-16 14:42:10
#5 Snake (snk) 2000 (187783) 2020-07-16 15:07:38
#6 Viktor (Veselovský) 2000 (169444) 2020-07-16 22:00:42
#7 Eugene (lim0n) 2000 (195334) 2020-07-16 22:58:02
#8 Armin Krauss (argh) 2000 (206965) 2020-07-17 12:56:08
#9 Alain Collignon (vexilla72) 1824 (123666) 2020-07-17 18:39:14
#10 George (Theofanidis) 1824 (132517) 2020-07-17 19:54:10
#11 Silvia Kortmann (mikinsget) 1824 (24027) 2020-07-18 10:43:30
#12 Em Doulgerakis (Greko) 1725 (193799) 2020-07-19 11:13:43
#13 Nofre Tete (noffi) 1613 (26507) 2020-07-20 20:20:30
#14 DS (DS8279) 1576 (34191) 2020-07-22 12:14:13
#15 Derek Hatton (alfred_noble) 1406 (33998) 2020-08-01 17:46:10
#16 Marco Cinelli (Snap) 1324 (37769) 2020-08-18 16:34:40
#17 Tristan1473 (Tristan1473) 1315 (20432) 2020-08-22 12:53:25
#18 Polaris (Polaris) 1305 (32963) 2020-08-26 01:34:05
#19 Michael (FoM) 1201 (57794) 2020-12-21 03:51:15
#20 D3d4lu5 (D3d4lu5) 1198 (363488) 2020-12-29 19:46:17
#21 Gerd Wilts (gerdw) 1186 (50634) 2021-02-07 23:05:32
#22 Luigi Tomelli (archstanton) 1167 (127538) 2021-05-10 10:22:05
#23 Eric (ExAstris) 1166 (56037) 2021-05-17 03:53:50
#24 madness (madness) 1162 (71592) 2021-06-13 02:07:01
#25 Antares (Antares) 1157 (32880) 2021-07-18 04:26:33
You must be logged in to solve the challenge


Polyhomophonic Substitution — Part 3

[madness-03] - 14 users already solved this challenge.
 
 
 

This part of the challenge series introduces polyhomophonic substitution. In a polyhomophonic substitution cipher, each ciphertext symbol can represent one of several plaintext symbols, and each plaintext letter can be encrypted as one of several ciphertext letters. The key is a mapping from the set of plaintext symbols to the set of ciphertext symbols.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-06 20:44
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#14) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 2000 (206965) 2020-04-06 22:29:12
Snake (snk) 2000 (187783) 2020-04-07 08:54:32
Thomas (Thomas4897) 2000 (36141) 2020-04-07 14:25:54
Dominik M. (Sgt. Pepper) 2000 (128575) 2020-04-07 14:59:45
#5 Kurt Gebauer (Yokozuna) 2000 (282608) 2020-04-07 15:25:09
#6 Viktor (Veselovský) 2000 (169444) 2020-04-07 15:49:37
#7 J-L Morel (Rossignol) 1433 (42130) 2020-04-20 11:01:25
#8 D3d4lu5 (D3d4lu5) 1337 (363488) 2020-05-06 18:16:08
#9 George Lasry (george4096) 1310 (422251) 2020-05-14 23:52:33
#10 Norbert Biermann (Norbert) 1284 (47790) 2020-05-27 15:29:25
#11 Alain Collignon (vexilla72) 1199 (123666) 2020-09-16 08:49:49
#12 Michael (FoM) 1174 (57794) 2020-12-18 02:33:31
#13 Luigi Tomelli (archstanton) 1154 (127538) 2021-05-01 18:20:58
#14 Eric (ExAstris) 1151 (56037) 2021-05-29 19:54:05
You must be logged in to solve the challenge


Polyhomophonic Substitution — Part 2

[madness-02] - 19 users already solved this challenge.
 
 
 

This part of the challenge series is a warm-up with polyphonic substitution. In a polyphonic substitution cipher, more than one plaintext letter are encrypted to the same ciphertext symbol. The key is a mapping from the set of plaintext symbols to the set of ciphertext symbols.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-28 15:09
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#19) Achieved points (Global score) y-m-d - h:m:s

Snake (snk) 2000 (187783) 2020-03-28 17:30:14
Armin Krauss (argh) 2000 (206965) 2020-03-28 22:07:46
Kurt Gebauer (Yokozuna) 2000 (282608) 2020-03-28 22:26:59
Alain Collignon (vexilla72) 2000 (123666) 2020-03-28 23:11:11
#5 Dominik M. (Sgt. Pepper) 2000 (128575) 2020-03-29 03:46:39
#6 J-L Morel (Rossignol) 2000 (42130) 2020-03-29 12:00:46
#7 Viktor (Veselovský) 2000 (169444) 2020-03-29 12:49:46
#8 Eugene (lim0n) 2000 (195334) 2020-03-29 14:49:22
#9 Thomas (Thomas4897) 1824 (36141) 2020-03-29 17:36:58
#10 sarah b (silva) 1824 (52424) 2020-03-29 21:05:46
#11 D3d4lu5 (D3d4lu5) 1307 (363488) 2020-05-06 18:15:02
#12 George Lasry (george4096) 1290 (422251) 2020-05-14 23:02:08
#13 Norbert Biermann (Norbert) 1270 (47790) 2020-05-26 19:48:41
#14 Nicolas (nicosPavlov) 1199 (257791) 2020-09-09 05:32:11
#15 Michael (FoM) 1173 (57794) 2020-12-14 13:48:24
#16 Em Doulgerakis (Greko) 1162 (193799) 2021-02-22 18:58:44
#17 Luigi Tomelli (archstanton) 1153 (127538) 2021-05-01 17:29:03
#18 Martin (martinbucher) 1152 (38365) 2021-05-15 17:14:36
#19 Eric (ExAstris) 1151 (56037) 2021-05-25 05:04:23
You must be logged in to solve the challenge


The SIGABA Challenge — Part 2

[lasry-27] - 8 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in part 1 of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get less information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-05 19:44
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#8) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 2000 (266541) 2020-03-05 23:35:49
Kurt Gebauer (Yokozuna) 1576 (282608) 2020-03-11 11:19:06
Dominik M. (Sgt. Pepper) 1406 (128575) 2020-03-21 19:54:11
Snake (snk) 1406 (187783) 2020-03-21 21:49:15
#5 D3d4lu5 (D3d4lu5) 1378 (363488) 2020-03-26 17:57:45
#6 Nicolas (nicosPavlov) 1199 (257791) 2020-08-16 05:07:29
#7 Eugene (lim0n) 1190 (195334) 2020-09-10 22:24:09
#8 Em Doulgerakis (Greko) 1152 (193799) 2021-04-17 16:43:37
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [16:58 - 27.09.2021] Surtees solved the Level I challenge 'Number Sequence — Part 2'    +++    [14:53 - 27.09.2021] jenniferdecastro solved the Level I challenge 'A hidden word'    +++    [14:28 - 27.09.2021] Mercer solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [09:52 - 26.09.2021] CRYbaby solved the Level I challenge 'How do you become a big cryptographer?'    +++    [17:29 - 25.09.2021] gemmath solved the Level I challenge 'Letter to the Templars — Part 1'    +++