MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11195
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 



Level II Challenges (160)

Page 9 of the challenges in Level II, ordered by date posted (the most recent appear first).

The T52 Sturgeon Challenge — Part 1

[lasry-14] - 16 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-07-13 23:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#16) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 1725 (282608) 2019-07-16 04:47:40
D3d4lu5 (D3d4lu5) 1725 (363488) 2019-07-16 17:31:02
Bart den Hartog (Bart13) 1444 (149236) 2019-07-26 16:40:28
Alain Collignon (vexilla72) 1247 (123666) 2019-10-01 11:45:38
#5 Random Dude (rnd) 1232 (103645) 2019-10-19 17:45:53
#6 H. Lautenschlager (helmi) 1211 (57600) 2019-11-25 18:14:29
#7 Luigi Tomelli (archstanton) 1204 (127538) 2019-12-10 14:42:26
#8 Michael Möller (michaelm) 1202 (256593) 2019-12-17 21:35:46
#9 Snake (snk) 1176 (187783) 2020-03-18 20:53:02
#10 Dominik M. (Sgt. Pepper) 1174 (128575) 2020-03-27 14:26:11
#11 Nobody (nobody) 1163 (42945) 2020-06-02 22:56:49
#12 Nicolas (nicosPavlov) 1157 (257791) 2020-07-15 13:20:13
#13 Scombes (jerva) 1151 (266541) 2020-09-08 17:03:27
#14 Mike (RogueRamblers) 1131 (81614) 2021-06-08 19:03:01
#15 George (Theofanidis) 1130 (132517) 2021-06-15 23:06:13
#16 zuben c3 (zuben-c3) 1127 (44417) 2021-08-19 22:35:23
You must be logged in to solve the challenge


Handycipher — Part 10

[kallick-25] - 1 user already solved this challenge.
 
 
 

Handycipher is a low-tech stream cipher, simple enough to permit pen-and-paper encrypting and decrypting of messages, while providing a significantly high level of security. Handycipher was first published in 2014 and further improved in 2015 and 2016. Part 10 of the Handycipher series presents the same challenge as Part 9 but with a different key choice. It is a ciphertext-only challenge.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-06-25 17:10
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 2000 (363488) 2019-06-26 12:28:07
You must be logged in to solve the challenge


Handycipher made in love — Part 2

[kallick-24] - 17 users already solved this challenge, 1 is working on it.
 
 
 

Part 2 of the series "Handycipher made in love" is almost identical to Part 1 except that the solution you are asked for is the correct key that Alice used to produce the ciphertext rather than the short message embedded in the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-05-21 16:47
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#17) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 2000 (206965) 2019-05-21 19:53:02
D3d4lu5 (D3d4lu5) 2000 (363488) 2019-05-21 22:37:28
Viktor (Veselovský) 2000 (169444) 2019-05-21 23:37:36
Kurt Gebauer (Yokozuna) 2000 (282608) 2019-05-22 04:17:23
#5 Alain Collignon (vexilla72) 2000 (123666) 2019-05-22 11:15:40
#6 Michael Möller (michaelm) 2000 (256593) 2019-05-22 12:28:56
#7 Danny Higgins (hamster147) 2000 (39638) 2019-05-22 12:46:19
#8 Dominik M. (Sgt. Pepper) 2000 (128575) 2019-05-22 15:03:47
#9 Eugene (lim0n) 1824 (195334) 2019-05-23 13:37:11
#10 George (Theofanidis) 1725 (132517) 2019-05-23 23:00:36
#11 Random Dude (rnd) 1469 (103645) 2019-05-31 23:52:30
#12 E.T (Ertheb) 1324 (81809) 2019-06-23 17:55:08
#13 Bart den Hartog (Bart13) 1244 (149236) 2019-08-11 23:04:07
#14 Silvia Kortmann (mikinsget) 1152 (24027) 2020-07-04 16:11:25
#15 Nicolas (nicosPavlov) 1147 (257791) 2020-08-26 07:12:20
#16 Em Doulgerakis (Greko) 1136 (193799) 2021-01-22 18:34:44
#17 madness (madness) 1128 (71592) 2021-06-17 18:13:56
You must be logged in to solve the challenge


Homophonic Encryption — Part 4

[kopal-04] - 29 users already solved this challenge.
 
 
 

Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 4 of this series we consider a distribution of the homophones based on English language statistics like in part 2, but the alphabet doesn't contain the blank. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-05-08 21:31
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#29) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 2000 (169444) 2019-05-09 00:56:19
Snake (snk) 2000 (187783) 2019-05-09 14:10:58
Armin Krauss (argh) 2000 (206965) 2019-05-09 17:58:49
George Lasry (george4096) 2000 (422251) 2019-05-09 20:48:39
#5 D3d4lu5 (D3d4lu5) 1824 (363488) 2019-05-10 18:25:33
#6 E.T (Ertheb) 1613 (81809) 2019-05-13 19:52:53
#7 Random Dude (rnd) 1456 (103645) 2019-05-20 13:42:29
#8 Dominik M. (Sgt. Pepper) 1444 (128575) 2019-05-21 18:51:04
#9 sarah b (silva) 1321 (52424) 2019-06-12 14:03:49
#10 Stephan (Stephje1978) 1254 (27064) 2019-07-20 19:51:56
#11 Bart den Hartog (Bart13) 1251 (149236) 2019-07-23 02:41:07
#12 Gerd Wilts (gerdw) 1246 (50634) 2019-07-27 22:50:35
#13 Danny Higgins (hamster147) 1207 (39638) 2019-09-28 23:53:20
#14 Em Doulgerakis (Greko) 1198 (193799) 2019-10-21 19:24:28
#15 George (Theofanidis) 1196 (132517) 2019-10-27 20:00:15
#16 Alain Collignon (vexilla72) 1180 (123666) 2019-12-22 12:16:59
#17 madness (madness) 1170 (71592) 2020-02-10 11:37:44
#18 Thomas (Thomas4897) 1167 (36141) 2020-02-28 18:57:12
#19 J-L Morel (Rossignol) 1162 (42130) 2020-03-31 18:24:56
#20 Eugene (lim0n) 1161 (195334) 2020-04-07 14:18:21
#21 Derek Hatton (alfred_noble) 1140 (33998) 2020-11-02 21:47:30
#22 Michael (FoM) 1138 (57794) 2020-12-04 17:55:52
#23 Mike (RogueRamblers) 1134 (81614) 2021-02-08 17:02:56
#24 Lane Williams (planetlane) 1131 (34637) 2021-04-01 21:35:05
#25 gordon (sir5) 1129 (16181) 2021-05-12 12:00:48
#26 Martin (martinbucher) 1129 (38365) 2021-05-13 16:47:53
#27 Luigi Tomelli (archstanton) 1129 (127538) 2021-05-16 17:49:42
#28 Eric (ExAstris) 1129 (56037) 2021-05-19 03:49:58
#29 zuben c3 (zuben-c3) 1127 (44417) 2021-06-29 10:57:09
You must be logged in to solve the challenge


Homophonic Encryption — Part 3

[kopal-03] - 30 users already solved this challenge, 1 is working on it.
 
 
 

Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 3 of this series every plaintext symbol has the same number of possible substitutions like in part 1, but the alphabet doesn't contain the blank. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-05-08 21:30
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#30) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 2000 (169444) 2019-05-09 00:41:40
Alain Collignon (vexilla72) 2000 (123666) 2019-05-09 10:44:10
Dominik M. (Sgt. Pepper) 2000 (128575) 2019-05-09 13:01:44
Snake (snk) 2000 (187783) 2019-05-09 13:48:05
#5 D3d4lu5 (D3d4lu5) 2000 (363488) 2019-05-09 17:16:18
#6 Armin Krauss (argh) 2000 (206965) 2019-05-09 17:34:33
#7 George Lasry (george4096) 2000 (422251) 2019-05-09 20:51:40
#8 Kurt Gebauer (Yokozuna) 1660 (282608) 2019-05-12 09:56:05
#9 E.T (Ertheb) 1613 (81809) 2019-05-13 19:39:06
#10 Random Dude (rnd) 1469 (103645) 2019-05-19 06:21:43
#11 Eugene (lim0n) 1469 (195334) 2019-05-19 07:57:08
#12 sarah b (silva) 1444 (52424) 2019-05-21 10:23:59
#13 Danny Higgins (hamster147) 1312 (39638) 2019-06-15 09:29:43
#14 George (Theofanidis) 1310 (132517) 2019-06-15 23:35:10
#15 Stephan (Stephje1978) 1254 (27064) 2019-07-20 19:44:17
#16 Bart den Hartog (Bart13) 1251 (149236) 2019-07-23 01:31:01
#17 Gerd Wilts (gerdw) 1246 (50634) 2019-07-27 22:34:51
#18 Em Doulgerakis (Greko) 1198 (193799) 2019-10-20 22:10:48
#19 madness (madness) 1170 (71592) 2020-02-10 10:31:39
#20 Thomas (Thomas4897) 1167 (36141) 2020-02-29 08:11:06
#21 J-L Morel (Rossignol) 1162 (42130) 2020-03-31 17:34:46
#22 Derek Hatton (alfred_noble) 1140 (33998) 2020-11-02 19:28:52
#23 Michael (FoM) 1138 (57794) 2020-12-04 17:34:08
#24 Mike (RogueRamblers) 1134 (81614) 2021-01-31 01:22:41
#25 Lane Williams (planetlane) 1131 (34637) 2021-04-01 20:55:27
#26 gordon (sir5) 1129 (16181) 2021-05-12 11:50:10
#27 Martin (martinbucher) 1129 (38365) 2021-05-13 16:36:41
#28 Luigi Tomelli (archstanton) 1129 (127538) 2021-05-14 18:17:35
#29 Eric (ExAstris) 1129 (56037) 2021-05-19 02:13:17
#30 zuben c3 (zuben-c3) 1127 (44417) 2021-06-28 23:51:25
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [16:58 - 27.09.2021] Surtees solved the Level I challenge 'Number Sequence — Part 2'    +++    [14:53 - 27.09.2021] jenniferdecastro solved the Level I challenge 'A hidden word'    +++    [14:28 - 27.09.2021] Mercer solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [09:52 - 26.09.2021] CRYbaby solved the Level I challenge 'How do you become a big cryptographer?'    +++    [17:29 - 25.09.2021] gemmath solved the Level I challenge 'Letter to the Templars — Part 1'    +++