MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9826
Follow us: Facebook Twitter
 



Level II Challenges (133)

Page 1 of the challenges in Level II, ordered by date posted (the most recent appear first).

A Cloaked Substitution Cipher — Part 2

[kallick-27] - 11 users already solved this challenge.
 
 
 

Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 2, the plaintext is first divided into two parts, then each part will be encrypted separately.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-25 19:26
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#11) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 2000 (297709) 2019-08-26 00:10:35
Viktor (Veselovský) 2000 (155163) 2019-08-26 01:43:23
Snake (snk) 2000 (83889) 2019-08-26 01:58:38
Eugene (lim0n) 2000 (55154) 2019-08-26 12:30:26
#5 Kurt Gebauer (Yokozuna) 2000 (177433) 2019-08-26 15:17:12
#6 George (Theofanidis) 1576 (112184) 2019-08-31 00:32:21
#7 Alain Collignon (vexilla72) 1523 (90800) 2019-09-02 11:16:49
#8 sarah b (silva) 1523 (26264) 2019-09-02 13:12:48
#9 Armin Krauss (argh) 1523 (188214) 2019-09-02 18:56:22
#10 Bart den Hartog (Bart13) 1502 (144081) 2019-09-03 08:22:15
#11 George Lasry (george4096) 1385 (302230) 2019-09-14 13:17:41
You must be logged in to solve the challenge


A Cloaked Substitution Cipher — Part 1

[kallick-26] - 12 users already solved this challenge.
 
 
 

Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 1, the cipher uses a key which devides the ciphertext alphabet into signal characters and noise characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-21 12:05
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#12) Achieved points (Global score) y-m-d - h:m:s

Snake (snk) 2000 (83889) 2019-08-21 19:03:44
D3d4lu5 (D3d4lu5) 2000 (297709) 2019-08-21 19:03:46
Michael Möller (michaelm) 2000 (175129) 2019-08-21 23:36:41
Eugene (lim0n) 1824 (55154) 2019-08-22 12:59:50
#5 Kurt Gebauer (Yokozuna) 1824 (177433) 2019-08-23 09:06:13
#6 Bart den Hartog (Bart13) 1725 (144081) 2019-08-24 00:59:12
#7 Viktor (Veselovský) 1660 (155163) 2019-08-24 17:35:25
#8 George (Theofanidis) 1660 (112184) 2019-08-24 19:27:39
#9 Armin Krauss (argh) 1576 (188214) 2019-08-26 16:24:17
#10 sarah b (silva) 1523 (26264) 2019-08-28 12:59:17
#11 Alain Collignon (vexilla72) 1444 (90800) 2019-09-02 15:05:22
#12 George Lasry (george4096) 1357 (302230) 2019-09-14 16:21:30
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 12

[lasry-25] - 2 users already solved this challenge, 1 is working on it.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52ca ciphertext. The key is partially known. You are also provided with a crib.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 1660 (297709) 2019-08-14 16:54:59
Kurt Gebauer (Yokozuna) 1523 (177433) 2019-08-18 15:58:58
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 11

[lasry-24] - 2 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52c ciphertext. The key is partially known. You are also provided with a crib.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

D3d4lu5 (D3d4lu5) 1660 (297709) 2019-08-14 17:05:47
Kurt Gebauer (Yokozuna) 1523 (177433) 2019-08-18 15:58:07
You must be logged in to solve the challenge


The T52 Sturgeon Challenge — Part 10

[lasry-23] - 1 user already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52ca. You are also provided with cribs for each message.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-08-10 17:32
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 1485 (177433) 2019-08-20 03:56:48
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:26 - 20.09.2019] rekondo solved the Level I challenge 'Original Caesar Cipher'    +++    [23:18 - 20.09.2019] rekondo solved the Level I challenge 'Number Sequence'    +++    [22:53 - 20.09.2019] ibex solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [22:47 - 20.09.2019] ibex solved the Level I challenge 'Cryptanalysis Hacking Puzzles — Part 2'    +++    [22:40 - 20.09.2019] ibex solved the Level I challenge 'Number Sequence — Part 9'    +++