MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11057
Follow us: Facebook Twitter
 



Level II Challenges (158)

Page 5 of the challenges in Level II, ordered by date posted (the most recent appear first).

Differential Cryptanalysis — Part 2

[kopal-bender-02] - 3 users already solved this challenge.
 
 
 

This challenge series introduces in detail the handling of the differential cryptanalysis (DCA). In the first two challenges you have to decrypt encrypted images and enter the code shown in the images. The second challenge requires filtering.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-01-28 15:22
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Eugene (lim0n) 2000 (178540) 2020-01-29 05:52:19
Dominik M. (Sgt. Pepper) 2000 (128575) 2020-01-29 11:13:43
Kurt Gebauer (Yokozuna) 1824 (282608) 2020-01-30 00:15:28
You must be logged in to solve the challenge


Polyphonic Substitution Cipher — Part 2

[tomokiyo-03] - 17 users already solved this challenge.
 
 
 

This is part two of the two polyphonic cipher challenges, where again two or more plaintext letters correspond to one cipher symbol. Can you solve such a cipher?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-01-14 15:20
Maximum number of attempts for this challenge: 10

All successful users of this challenge

Rank User (#17) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 2000 (282608) 2020-01-14 20:46:51
Snake (snk) 2000 (187783) 2020-01-14 21:48:19
Eugene (lim0n) 2000 (178540) 2020-01-15 11:18:08
George Lasry (george4096) 1824 (399565) 2020-01-16 00:47:13
#5 sarah b (silva) 1523 (47847) 2020-01-22 11:31:33
#6 George (Theofanidis) 1284 (122085) 2020-03-04 21:43:19
#7 madness (madness) 1281 (71292) 2020-03-07 13:38:01
#8 Thomas (Thomas4897) 1273 (36141) 2020-03-11 18:43:43
#9 Dominik M. (Sgt. Pepper) 1256 (128575) 2020-03-24 18:22:46
#10 Viktor (Veselovský) 1251 (169444) 2020-03-29 18:09:04
#11 D3d4lu5 (D3d4lu5) 1222 (363488) 2020-05-06 18:17:24
#12 Alain Collignon (vexilla72) 1177 (123666) 2020-09-14 01:19:07
#13 Martin (martinbucher) 1165 (38365) 2020-11-18 16:11:41
#14 Michael (FoM) 1161 (57794) 2020-12-12 23:30:41
#15 Em Doulgerakis (Greko) 1153 (193799) 2021-02-21 22:39:40
#16 Luigi Tomelli (archstanton) 1146 (127538) 2021-05-06 13:33:01
#17 Eric (ExAstris) 1144 (54941) 2021-05-24 00:45:44
You must be logged in to solve the challenge


Christmas Challenge 2019: Differential Cryptanalysis — Part 1

[kopal-bender-01] - 3 users already solved this challenge.
 
 
 

This challenge series introduces in detail the handling of the differential cryptanalysis (DCA). In the first two challenges you have to decrypt encrypted images and enter the code shown in the images. The first challenge needs no filtering, as only valid plaintext-ciphertext pairs are delivered.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-12-22 21:04
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Eugene (lim0n) 1660 (178540) 2019-12-26 16:31:43
Kurt Gebauer (Yokozuna) 1523 (282608) 2019-12-30 03:08:38
Dominik M. (Sgt. Pepper) 1456 (128575) 2020-01-03 18:30:14
You must be logged in to solve the challenge


Polyphonic Substitution Cipher — Part 1

[tomokiyo-02] - 20 users already solved this challenge, 1 is working on it.
 
 
 

In a polyphonic cipher, two or more plaintext letters correspond to one ciphertext symbol.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-11-21 13:18
Maximum number of attempts for this challenge: 10

All successful users of this challenge

Rank User (#20) Achieved points (Global score) y-m-d - h:m:s

sarah b (silva) 2000 (47847) 2019-11-22 10:56:16
Bart den Hartog (Bart13) 1725 (148936) 2019-11-23 15:02:52
George Lasry (george4096) 1725 (399565) 2019-11-23 17:29:00
Snake (snk) 1725 (187783) 2019-11-23 21:47:29
#5 D3d4lu5 (D3d4lu5) 1725 (363488) 2019-11-23 22:47:12
#6 Kurt Gebauer (Yokozuna) 1547 (282608) 2019-11-28 02:28:03
#7 Eugene (lim0n) 1423 (178540) 2019-12-05 17:45:31
#8 Danny Higgins (hamster147) 1349 (39638) 2019-12-18 00:49:54
#9 Random Dude (rnd) 1337 (103645) 2019-12-20 18:42:25
#10 George (Theofanidis) 1229 (122085) 2020-03-01 20:01:11
#11 madness (madness) 1226 (71292) 2020-03-07 18:57:10
#12 Thomas (Thomas4897) 1223 (36141) 2020-03-11 18:24:02
#13 Dominik M. (Sgt. Pepper) 1216 (128575) 2020-03-24 17:35:47
#14 Viktor (Veselovský) 1213 (169444) 2020-03-30 00:37:50
#15 Alain Collignon (vexilla72) 1169 (123666) 2020-09-03 11:31:59
#16 Martin (martinbucher) 1164 (38365) 2020-10-03 09:21:08
#17 Michael (FoM) 1155 (57794) 2020-12-11 15:27:14
#18 Em Doulgerakis (Greko) 1147 (193799) 2021-02-21 13:18:25
#19 Luigi Tomelli (archstanton) 1141 (127538) 2021-05-03 18:39:04
#20 Eric (ExAstris) 1140 (54941) 2021-05-23 23:37:14
You must be logged in to solve the challenge


Cipher ID — Part 1

[mistamp-01] - 15 users already solved this challenge, 6 are working on it.
 
 
 

Determine which type of classic cipher was used to generate each of 500 ciphertext messages. The ciphers used in this challenge are simple substitution, columnar transposition, Vigenère, Playfair, and Hill.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-11-19 12:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#15) Achieved points (Global score) y-m-d - h:m:s

Bart den Hartog (Bart13) 2000 (148936) 2019-11-19 13:05:00
Viktor (Veselovský) 2000 (169444) 2019-11-19 14:41:45
D3d4lu5 (D3d4lu5) 2000 (363488) 2019-11-20 00:40:59
Armin Krauss (argh) 2000 (206965) 2019-11-20 10:40:28
#5 Eugene (lim0n) 1725 (178540) 2019-11-21 17:34:47
#6 George Lasry (george4096) 1660 (399565) 2019-11-22 23:30:33
#7 Kurt Gebauer (Yokozuna) 1613 (282608) 2019-11-23 22:20:16
#8 Snake (snk) 1444 (187783) 2019-12-02 11:48:55
#9 sakis55555 sakis (sakis55555) 1252 (1352) 2020-02-02 00:25:04
#10 George (Theofanidis) 1252 (122085) 2020-02-02 08:21:12
#11 sarah b (silva) 1248 (47847) 2020-02-06 10:29:55
#12 madness (madness) 1230 (71292) 2020-02-27 23:03:53
#13 Mike (RogueRamblers) 1195 (72565) 2020-05-12 02:33:57
#14 Em Doulgerakis (Greko) 1153 (193799) 2020-12-27 11:28:04
#15 Random Dude (rnd) 1143 (103645) 2021-04-10 22:59:57
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:13 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [04:01 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 1'    +++    [01:02 - 17.06.2021] RogueRamblers solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++    [13:38 - 16.06.2021] E01814058 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [13:37 - 16.06.2021] E01814263 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++