MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10237
Follow us: Facebook Twitter
 



Level II Challenges (142)

Page 1 of the challenges in Level II, ordered by date posted (the most recent appear first).

Polyhomophonic Substitution — Part 2

[madness-02] - 10 users already solved this challenge.
 
 
 

This part of the challenge series is a warm-up with polyphonic substitution. In a polyphonic substitution cipher, more than one plaintext letter are encrypted to the same ciphertext symbol. The key is a mapping from the set of plaintext symbols to the set of ciphertext symbols.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-28 15:09
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#10) Achieved points (Global score) y-m-d - h:m:s

Snake (snk) 2000 (170475) 2020-03-28 17:30:14
Armin Krauss (argh) 2000 (194414) 2020-03-28 22:07:46
Kurt Gebauer (Yokozuna) 2000 (214952) 2020-03-28 22:26:59
Alain Collignon (vexilla72) 2000 (116494) 2020-03-28 23:11:11
#5 Dominik M. (Sgt. Pepper) 2000 (115561) 2020-03-29 03:46:39
#6 J-L Morel (Rossignol) 2000 (32804) 2020-03-29 12:00:46
#7 Viktor (Veselovský) 2000 (163827) 2020-03-29 12:49:46
#8 Eugene (lim0n) 2000 (102582) 2020-03-29 14:49:22
#9 Thomas (Thomas4897) 1824 (33941) 2020-03-29 17:36:58
#10 sarah b (silva) 1824 (35520) 2020-03-29 21:05:46
You must be logged in to solve the challenge


The SIGABA Challenge — Part 2

[lasry-27] - 5 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in part 1 of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get less information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-05 19:44
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

S Combes (jerva) 2000 (163132) 2020-03-05 23:35:49
Kurt Gebauer (Yokozuna) 1576 (214952) 2020-03-11 11:19:06
Dominik M. (Sgt. Pepper) 1406 (115561) 2020-03-21 19:54:11
Snake (snk) 1406 (170475) 2020-03-21 21:49:15
#5 D3d4lu5 (D3d4lu5) 1378 (322138) 2020-03-26 17:57:45
You must be logged in to solve the challenge


The SIGABA Challenge — Part 1

[lasry-26] - 5 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. It is believed that the German codebreakers were unable to make any inroads against SIGABA. In this part of the series of challenges, you are provided with a partial known-plaintext, and some information about the key settings.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-02-29 12:29
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

S Combes (jerva) 2000 (163132) 2020-02-29 17:14:45
Dominik M. (Sgt. Pepper) 1576 (115561) 2020-03-06 02:41:04
Kurt Gebauer (Yokozuna) 1523 (214952) 2020-03-08 05:38:58
Snake (snk) 1373 (170475) 2020-03-21 14:15:47
#5 D3d4lu5 (D3d4lu5) 1349 (322138) 2020-03-26 17:55:38
You must be logged in to solve the challenge


The LoRa Cipher: Logic Randomness — Part 1

[theofanidis-10] - 14 users already solved this challenge.
 
 
 

LoRa calculates the ciphertext by using a logic expression as key. The ciphertext unusually contains large bitstreams too. Could you find the logic expression from a given ciphertext?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-02-19 20:31
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#14) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 2000 (163827) 2020-02-19 22:35:21
Kurt Gebauer (Yokozuna) 2000 (214952) 2020-02-20 02:32:51
Dominik M. (Sgt. Pepper) 2000 (115561) 2020-02-20 04:28:34
Eugene (lim0n) 2000 (102582) 2020-02-20 08:26:23
#5 Alain Collignon (vexilla72) 2000 (116494) 2020-02-20 08:50:23
#6 madness (madness) 2000 (45909) 2020-02-20 16:41:35
#7 Snake (snk) 2000 (170475) 2020-02-20 17:26:23
#8 Armin Krauss (argh) 2000 (194414) 2020-02-20 20:27:17
#9 Derek Hatton (alfred_noble) 1613 (18418) 2020-02-24 17:03:34
#10 Mir Dim (mir0soft) 1576 (79760) 2020-02-25 07:51:23
#11 pcback (langkhach11112) 1502 (4860) 2020-02-28 16:00:00
#12 H. Lautenschlager (helmi) 1444 (38017) 2020-03-03 18:52:35
#13 George Lasry (george4096) 1330 (308769) 2020-03-21 21:04:03
#14 sarah b (silva) 1327 (35520) 2020-03-23 08:49:21
You must be logged in to solve the challenge


Differential Cryptanalysis — Part 2

[kopal-bender-02] - 3 users already solved this challenge.
 
 
 

This challenge series introduces in detail the handling of the differential cryptanalysis (DCA). In the first two challenges you have to decrypt encrypted images and enter the code shown in the images. The second challenge requires filtering.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-01-28 15:22
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Eugene (lim0n) 2000 (102582) 2020-01-29 05:52:19
Dominik M. (Sgt. Pepper) 2000 (115561) 2020-01-29 11:13:43
Kurt Gebauer (Yokozuna) 1824 (214952) 2020-01-30 00:15:28
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [04:30 - 30.03.2020] madness solved the Level I challenge 'Nils away on travel'    +++    [00:37 - 30.03.2020] Veselovský solved the Level II challenge 'Polyphonic Substitution Cipher — Part 1'    +++    [23:57 - 29.03.2020] julian_38317 solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [23:44 - 29.03.2020] julian_38317 solved the Level I challenge 'Letter to the Templars — Part 2'    +++    [21:05 - 29.03.2020] silva solved the Level II challenge 'Polyhomophonic Substitution — Part 2'    +++