MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11057
Follow us: Facebook Twitter
 



Level II Challenges (158)

Page 6 of the challenges in Level II, ordered by date posted (the most recent appear first).

A Cloaked Substitution Cipher — Part 2

[kallick-27] - 14 users already solved this challenge.
 
 
 

Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 2, the plaintext is first divided into two parts, then each part will be encrypted separately.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-25 19:26
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#14) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 2000 (363488) 2019-08-26 00:10:35
Viktor (Veselovský) 2000 (169444) 2019-08-26 01:43:23
Snake (snk) 2000 (187783) 2019-08-26 01:58:38
Eugene (lim0n) 2000 (178540) 2019-08-26 12:30:26
#5 Kurt Gebauer (Yokozuna) 2000 (282608) 2019-08-26 15:17:12
#6 George (Theofanidis) 1576 (122085) 2019-08-31 00:32:21
#7 Alain Collignon (vexilla72) 1523 (123666) 2019-09-02 11:16:49
#8 sarah b (silva) 1523 (47847) 2019-09-02 13:12:48
#9 Armin Krauss (argh) 1523 (206965) 2019-09-02 18:56:22
#10 Bart den Hartog (Bart13) 1502 (148936) 2019-09-03 08:22:15
#11 George Lasry (george4096) 1385 (399565) 2019-09-14 13:17:41
#12 Random Dude (rnd) 1290 (103645) 2019-10-12 06:28:34
#13 Em Doulgerakis (Greko) 1252 (193799) 2019-11-08 13:51:58
#14 madness (madness) 1192 (71292) 2020-02-25 00:03:25
You must be logged in to solve the challenge


A Cloaked Substitution Cipher — Part 1

[kallick-26] - 15 users already solved this challenge.
 
 
 

Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 1, the cipher uses a key which devides the ciphertext alphabet into signal characters and noise characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-21 12:05
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#15) Achieved points (Global score) y-m-d - h:m:s

Snake (snk) 2000 (187783) 2019-08-21 19:03:44
D3d4lu5 (D3d4lu5) 2000 (363488) 2019-08-21 19:03:46
Michael Möller (michaelm) 2000 (253196) 2019-08-21 23:36:41
Eugene (lim0n) 1824 (178540) 2019-08-22 12:59:50
#5 Kurt Gebauer (Yokozuna) 1824 (282608) 2019-08-23 09:06:13
#6 Bart den Hartog (Bart13) 1725 (148936) 2019-08-24 00:59:12
#7 Viktor (Veselovský) 1660 (169444) 2019-08-24 17:35:25
#8 George (Theofanidis) 1660 (122085) 2019-08-24 19:27:39
#9 Armin Krauss (argh) 1576 (206965) 2019-08-26 16:24:17
#10 sarah b (silva) 1523 (47847) 2019-08-28 12:59:17
#11 Alain Collignon (vexilla72) 1444 (123666) 2019-09-02 15:05:22
#12 George Lasry (george4096) 1357 (399565) 2019-09-14 16:21:30
#13 Random Dude (rnd) 1286 (103645) 2019-10-10 02:25:14
#14 Em Doulgerakis (Greko) 1262 (193799) 2019-10-25 20:45:39
#15 madness (madness) 1193 (71292) 2020-02-19 04:28:42
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 12

[lasry-25] - 6 users already solved this challenge, 1 is working on it.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52ca ciphertext. The key is partially known. You are also provided with a crib.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#6) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 1660 (363488) 2019-08-14 16:54:59
Kurt Gebauer (Yokozuna) 1523 (282608) 2019-08-18 15:58:58
Michael Möller (michaelm) 1196 (253196) 2020-01-27 22:15:31
Snake (snk) 1181 (187783) 2020-03-23 23:23:18
#5 Nicolas (nicosPavlov) 1159 (257791) 2020-07-28 16:06:37
#6 S Combes (jerva) 1143 (242717) 2020-12-30 23:21:59
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 11

[lasry-24] - 6 users already solved this challenge, 1 is working on it.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52c ciphertext. The key is partially known. You are also provided with a crib.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#6) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 1660 (363488) 2019-08-14 17:05:47
Kurt Gebauer (Yokozuna) 1523 (282608) 2019-08-18 15:58:07
Michael Möller (michaelm) 1197 (253196) 2020-01-26 10:12:37
Snake (snk) 1181 (187783) 2020-03-22 20:17:10
#5 Nicolas (nicosPavlov) 1159 (257791) 2020-07-29 03:02:52
#6 S Combes (jerva) 1143 (242717) 2020-12-30 16:24:32
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 10

[lasry-23] - 5 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52ca. You are also provided with cribs for each message.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 1485 (282608) 2019-08-20 03:56:48
Michael Möller (michaelm) 1198 (253196) 2020-01-23 21:42:35
Snake (snk) 1181 (187783) 2020-03-23 16:25:18
Nicolas (nicosPavlov) 1159 (257791) 2020-07-24 11:17:51
#5 S Combes (jerva) 1143 (242717) 2020-12-30 16:22:54
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:13 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [04:01 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 1'    +++    [01:02 - 17.06.2021] RogueRamblers solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++    [13:38 - 16.06.2021] E01814058 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [13:37 - 16.06.2021] E01814263 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++