MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10769
Follow us: Facebook Twitter
 



Level II Challenges (153)

Page 7 of the challenges in Level II, ordered by date posted (the most recent appear first).

The T52 Sturgeon Challenge — Part 4

[lasry-17] - 9 users already solved this challenge, 1 is working on it.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-07-22 23:20
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#9) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 1725 (274906) 2019-07-25 18:49:21
D3d4lu5 (D3d4lu5) 1385 (359988) 2019-08-11 20:05:00
Alain Collignon (vexilla72) 1256 (122384) 2019-10-01 18:59:20
Luigi Tomelli (archstanton) 1203 (113164) 2019-12-22 13:48:06
#5 Michael Möller (michaelm) 1201 (253046) 2019-12-28 11:47:25
#6 Snake (snk) 1177 (187650) 2020-03-19 22:22:52
#7 Dominik M. (Sgt. Pepper) 1176 (127349) 2020-03-27 15:39:42
#8 Nicolas (nicosPavlov) 1157 (257791) 2020-07-21 11:44:51
#9 S Combes (jerva) 1152 (204567) 2020-09-08 17:05:30
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 3

[lasry-16] - 10 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52d ciphertext. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-07-22 23:17
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#10) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 2000 (274906) 2019-07-23 07:38:03
D3d4lu5 (D3d4lu5) 1824 (359988) 2019-07-24 06:19:13
Alain Collignon (vexilla72) 1256 (122384) 2019-10-01 14:41:57
Random Dude (rnd) 1238 (98856) 2019-10-21 21:48:09
#5 Luigi Tomelli (archstanton) 1204 (113164) 2019-12-19 13:52:50
#6 H. Lautenschlager (helmi) 1203 (56270) 2019-12-22 20:03:03
#7 Michael Möller (michaelm) 1180 (253046) 2020-03-08 15:55:33
#8 Snake (snk) 1178 (187650) 2020-03-18 22:24:04
#9 Nicolas (nicosPavlov) 1158 (257791) 2020-07-19 04:58:23
#10 S Combes (jerva) 1151 (204567) 2020-09-13 20:41:17
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 2

[lasry-15] - 12 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52c ciphertext. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-07-22 23:15
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#12) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 2000 (274906) 2019-07-23 00:55:17
D3d4lu5 (D3d4lu5) 1824 (359988) 2019-07-24 06:18:14
Alain Collignon (vexilla72) 1256 (122384) 2019-10-01 11:47:41
Random Dude (rnd) 1238 (98856) 2019-10-20 20:34:27
#5 H. Lautenschlager (helmi) 1212 (56270) 2019-12-01 22:01:22
#6 Luigi Tomelli (archstanton) 1208 (113164) 2019-12-11 18:04:06
#7 Michael Möller (michaelm) 1193 (253046) 2020-01-19 18:06:17
#8 Snake (snk) 1178 (187650) 2020-03-18 22:23:05
#9 Dominik M. (Sgt. Pepper) 1175 (127349) 2020-03-30 23:52:11
#10 Nobody (nobody) 1164 (42945) 2020-06-04 12:23:23
#11 Nicolas (nicosPavlov) 1158 (257791) 2020-07-15 14:49:31
#12 S Combes (jerva) 1152 (204567) 2020-09-10 07:36:41
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 1

[lasry-14] - 13 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-07-13 23:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#13) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 1725 (274906) 2019-07-16 04:47:40
D3d4lu5 (D3d4lu5) 1725 (359988) 2019-07-16 17:31:02
Bart den Hartog (Bart13) 1444 (148936) 2019-07-26 16:40:28
Alain Collignon (vexilla72) 1247 (122384) 2019-10-01 11:45:38
#5 Random Dude (rnd) 1232 (98856) 2019-10-19 17:45:53
#6 H. Lautenschlager (helmi) 1211 (56270) 2019-11-25 18:14:29
#7 Luigi Tomelli (archstanton) 1204 (113164) 2019-12-10 14:42:26
#8 Michael Möller (michaelm) 1202 (253046) 2019-12-17 21:35:46
#9 Snake (snk) 1176 (187650) 2020-03-18 20:53:02
#10 Dominik M. (Sgt. Pepper) 1174 (127349) 2020-03-27 14:26:11
#11 Nobody (nobody) 1163 (42945) 2020-06-02 22:56:49
#12 Nicolas (nicosPavlov) 1157 (257791) 2020-07-15 13:20:13
#13 S Combes (jerva) 1151 (204567) 2020-09-08 17:03:27
You must be logged in to solve the challenge


Handycipher — Part 10

[kallick-25] - 1 user already solved this challenge.
 
 
 

Handycipher is a low-tech stream cipher, simple enough to permit pen-and-paper encrypting and decrypting of messages, while providing a significantly high level of security. Handycipher was first published in 2014 and further improved in 2015 and 2016. Part 10 of the Handycipher series presents the same challenge as Part 9 but with a different key choice. It is a ciphertext-only challenge.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-06-25 17:10
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 2000 (359988) 2019-06-26 12:28:07
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [20:03 - 16.01.2021] Cubitus solved the Level I challenge 'Original Caesar Cipher'    +++    [16:31 - 16.01.2021] V5November solved the Level I challenge 'Autokey Cipher'    +++    [15:44 - 16.01.2021] itnomad solved the Level I challenge 'Number Sequence — Part 8'    +++    [14:12 - 16.01.2021] itnomad solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [11:33 - 16.01.2021] Rossignol solved the Level II challenge 'Double Column Transposition — Part 2'    +++