Level II Challenges (153)
Page 5 of the challenges in Level II, ordered by date posted (the most recent appear first).
|
|
|
|
Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 2, the plaintext is first divided into two parts, then each part will be encrypted separately. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author:
This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-08-25 19:26 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#14) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
D3d4lu5 (D3d4lu5)
|
2000 (359988) |
2019-08-26 00:10:35 |
|
Viktor (Veselovský)
|
2000 (169244) |
2019-08-26 01:43:23 |
|
Snake (snk)
|
2000 (187650) |
2019-08-26 01:58:38 |
|
Eugene (lim0n)
|
2000 (169787) |
2019-08-26 12:30:26 |
#5 |
Kurt Gebauer (Yokozuna)
|
2000 (274906) |
2019-08-26 15:17:12 |
#6 |
George (Theofanidis)
|
1576 (119711) |
2019-08-31 00:32:21 |
#7 |
Alain Collignon (vexilla72)
|
1523 (122384) |
2019-09-02 11:16:49 |
#8 |
sarah b (silva)
|
1523 (45566) |
2019-09-02 13:12:48 |
#9 |
Armin Krauss (argh)
|
1523 (206664) |
2019-09-02 18:56:22 |
#10 |
Bart den Hartog (Bart13)
|
1502 (148936) |
2019-09-03 08:22:15 |
#11 |
George Lasry (george4096)
|
1385 (369910) |
2019-09-14 13:17:41 |
#12 |
Random Dude (rnd)
|
1290 (98856) |
2019-10-12 06:28:34 |
#13 |
Em Doulgerakis (Greko)
|
1252 (137134) |
2019-11-08 13:51:58 |
#14 |
madness (madness)
|
1192 (50496) |
2020-02-25 00:03:25 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 1, the cipher uses a key which devides the ciphertext alphabet into signal characters and noise characters. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-08-21 12:05 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#15) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Snake (snk)
|
2000 (187650) |
2019-08-21 19:03:44 |
|
D3d4lu5 (D3d4lu5)
|
2000 (359988) |
2019-08-21 19:03:46 |
|
Michael Möller (michaelm)
|
2000 (253046) |
2019-08-21 23:36:41 |
|
Eugene (lim0n)
|
1824 (169787) |
2019-08-22 12:59:50 |
#5 |
Kurt Gebauer (Yokozuna)
|
1824 (274906) |
2019-08-23 09:06:13 |
#6 |
Bart den Hartog (Bart13)
|
1725 (148936) |
2019-08-24 00:59:12 |
#7 |
Viktor (Veselovský)
|
1660 (169244) |
2019-08-24 17:35:25 |
#8 |
George (Theofanidis)
|
1660 (119711) |
2019-08-24 19:27:39 |
#9 |
Armin Krauss (argh)
|
1576 (206664) |
2019-08-26 16:24:17 |
#10 |
sarah b (silva)
|
1523 (45566) |
2019-08-28 12:59:17 |
#11 |
Alain Collignon (vexilla72)
|
1444 (122384) |
2019-09-02 15:05:22 |
#12 |
George Lasry (george4096)
|
1357 (369910) |
2019-09-14 16:21:30 |
#13 |
Random Dude (rnd)
|
1286 (98856) |
2019-10-10 02:25:14 |
#14 |
Em Doulgerakis (Greko)
|
1262 (137134) |
2019-10-25 20:45:39 |
#15 |
madness (madness)
|
1193 (50496) |
2020-02-19 04:28:42 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52ca ciphertext. The key is partially known. You are also provided with a crib. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-08-10 17:32 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#6) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
D3d4lu5 (D3d4lu5)
|
1660 (359988) |
2019-08-14 16:54:59 |
|
Kurt Gebauer (Yokozuna)
|
1523 (274906) |
2019-08-18 15:58:58 |
|
Michael Möller (michaelm)
|
1196 (253046) |
2020-01-27 22:15:31 |
|
Snake (snk)
|
1181 (187650) |
2020-03-23 23:23:18 |
#5 |
Nicolas (nicosPavlov)
|
1159 (257791) |
2020-07-28 16:06:37 |
#6 |
S Combes (jerva)
|
1143 (204567) |
2020-12-30 23:21:59 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52c ciphertext. The key is partially known. You are also provided with a crib. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-08-10 17:32 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#6) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
D3d4lu5 (D3d4lu5)
|
1660 (359988) |
2019-08-14 17:05:47 |
|
Kurt Gebauer (Yokozuna)
|
1523 (274906) |
2019-08-18 15:58:07 |
|
Michael Möller (michaelm)
|
1197 (253046) |
2020-01-26 10:12:37 |
|
Snake (snk)
|
1181 (187650) |
2020-03-22 20:17:10 |
#5 |
Nicolas (nicosPavlov)
|
1159 (257791) |
2020-07-29 03:02:52 |
#6 |
S Combes (jerva)
|
1143 (204567) |
2020-12-30 16:24:32 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52ca. You are also provided with cribs for each message. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-08-10 17:32 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#5) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Kurt Gebauer (Yokozuna)
|
1485 (274906) |
2019-08-20 03:56:48 |
|
Michael Möller (michaelm)
|
1198 (253046) |
2020-01-23 21:42:35 |
|
Snake (snk)
|
1181 (187650) |
2020-03-23 16:25:18 |
|
Nicolas (nicosPavlov)
|
1159 (257791) |
2020-07-24 11:17:51 |
#5 |
S Combes (jerva)
|
1143 (204567) |
2020-12-30 16:22:54 |
|
|
|
|
|
You must be logged in to solve the challenge |
|