Level II Challenges (153)
Page 7 of the challenges in Level II, ordered by date posted (the most recent appear first).
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author:
This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-07-22 23:20 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#9) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Kurt Gebauer (Yokozuna)
|
1725 (274906) |
2019-07-25 18:49:21 |
|
D3d4lu5 (D3d4lu5)
|
1385 (359988) |
2019-08-11 20:05:00 |
|
Alain Collignon (vexilla72)
|
1256 (122384) |
2019-10-01 18:59:20 |
|
Luigi Tomelli (archstanton)
|
1203 (113164) |
2019-12-22 13:48:06 |
#5 |
Michael Möller (michaelm)
|
1201 (253046) |
2019-12-28 11:47:25 |
#6 |
Snake (snk)
|
1177 (187650) |
2020-03-19 22:22:52 |
#7 |
Dominik M. (Sgt. Pepper)
|
1176 (127349) |
2020-03-27 15:39:42 |
#8 |
Nicolas (nicosPavlov)
|
1157 (257791) |
2020-07-21 11:44:51 |
#9 |
S Combes (jerva)
|
1152 (204567) |
2020-09-08 17:05:30 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52d ciphertext. The key is partially known. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-07-22 23:17 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#10) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Kurt Gebauer (Yokozuna)
|
2000 (274906) |
2019-07-23 07:38:03 |
|
D3d4lu5 (D3d4lu5)
|
1824 (359988) |
2019-07-24 06:19:13 |
|
Alain Collignon (vexilla72)
|
1256 (122384) |
2019-10-01 14:41:57 |
|
Random Dude (rnd)
|
1238 (98856) |
2019-10-21 21:48:09 |
#5 |
Luigi Tomelli (archstanton)
|
1204 (113164) |
2019-12-19 13:52:50 |
#6 |
H. Lautenschlager (helmi)
|
1203 (56270) |
2019-12-22 20:03:03 |
#7 |
Michael Möller (michaelm)
|
1180 (253046) |
2020-03-08 15:55:33 |
#8 |
Snake (snk)
|
1178 (187650) |
2020-03-18 22:24:04 |
#9 |
Nicolas (nicosPavlov)
|
1158 (257791) |
2020-07-19 04:58:23 |
#10 |
S Combes (jerva)
|
1151 (204567) |
2020-09-13 20:41:17 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52c ciphertext. The key is partially known. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-07-22 23:15 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#12) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Kurt Gebauer (Yokozuna)
|
2000 (274906) |
2019-07-23 00:55:17 |
|
D3d4lu5 (D3d4lu5)
|
1824 (359988) |
2019-07-24 06:18:14 |
|
Alain Collignon (vexilla72)
|
1256 (122384) |
2019-10-01 11:47:41 |
|
Random Dude (rnd)
|
1238 (98856) |
2019-10-20 20:34:27 |
#5 |
H. Lautenschlager (helmi)
|
1212 (56270) |
2019-12-01 22:01:22 |
#6 |
Luigi Tomelli (archstanton)
|
1208 (113164) |
2019-12-11 18:04:06 |
#7 |
Michael Möller (michaelm)
|
1193 (253046) |
2020-01-19 18:06:17 |
#8 |
Snake (snk)
|
1178 (187650) |
2020-03-18 22:23:05 |
#9 |
Dominik M. (Sgt. Pepper)
|
1175 (127349) |
2020-03-30 23:52:11 |
#10 |
Nobody (nobody)
|
1164 (42945) |
2020-06-04 12:23:23 |
#11 |
Nicolas (nicosPavlov)
|
1158 (257791) |
2020-07-15 14:49:31 |
#12 |
S Combes (jerva)
|
1152 (204567) |
2020-09-10 07:36:41 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-07-13 23:11 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#13) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
Kurt Gebauer (Yokozuna)
|
1725 (274906) |
2019-07-16 04:47:40 |
|
D3d4lu5 (D3d4lu5)
|
1725 (359988) |
2019-07-16 17:31:02 |
|
Bart den Hartog (Bart13)
|
1444 (148936) |
2019-07-26 16:40:28 |
|
Alain Collignon (vexilla72)
|
1247 (122384) |
2019-10-01 11:45:38 |
#5 |
Random Dude (rnd)
|
1232 (98856) |
2019-10-19 17:45:53 |
#6 |
H. Lautenschlager (helmi)
|
1211 (56270) |
2019-11-25 18:14:29 |
#7 |
Luigi Tomelli (archstanton)
|
1204 (113164) |
2019-12-10 14:42:26 |
#8 |
Michael Möller (michaelm)
|
1202 (253046) |
2019-12-17 21:35:46 |
#9 |
Snake (snk)
|
1176 (187650) |
2020-03-18 20:53:02 |
#10 |
Dominik M. (Sgt. Pepper)
|
1174 (127349) |
2020-03-27 14:26:11 |
#11 |
Nobody (nobody)
|
1163 (42945) |
2020-06-02 22:56:49 |
#12 |
Nicolas (nicosPavlov)
|
1157 (257791) |
2020-07-15 13:20:13 |
#13 |
S Combes (jerva)
|
1151 (204567) |
2020-09-08 17:03:27 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
Handycipher is a low-tech stream cipher, simple enough to permit pen-and-paper encrypting and decrypting of messages, while providing a significantly high level of security. Handycipher was first published in 2014 and further improved in 2015 and 2016. Part 10 of the Handycipher series presents the same challenge as Part 9 but with a different key choice. It is a ciphertext-only challenge. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-06-25 17:10 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#1) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
D3d4lu5 (D3d4lu5)
|
2000 (359988) |
2019-06-26 12:28:07 |
|
|
|
|
|
You must be logged in to solve the challenge |
|