MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11119
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 



Level III Challenges (74)

Page 15 of the challenges in Level III, ordered by date posted (the most recent appear first).

CMEA 2

[stamp-11] - 27 users already solved this challenge, 2 are working on it.
 
 
 

CMEA is a block cipher and was one of the 4 cryptographic primitives of the mobile communications network in the US. It is your challenge to perform a known-plaintext attack on CMEA with 40 known plaintext blocks given.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-12-06 00:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#27) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 17412 (206965) 2010-12-14 17:00:33
Wolfgang Weisser (wowmyst) 15101 (33108) 2011-03-15 20:30:10
J. M. (jomandi) 14472 (113270) 2011-08-07 11:09:20
Flip (Flip) 14396 (31107) 2011-09-07 18:30:19
#5 Viktor (Veselovský) 14086 (169444) 2012-03-11 13:41:15
#6 Seth Kintigh (DarkFibre) 14050 (79471) 2012-04-11 00:54:45
#7 Luigi Tomelli (archstanton) 13882 (127538) 2012-10-02 16:30:24
#8 Kurt Gebauer (Yokozuna) 13846 (282608) 2012-11-17 15:01:27
#9 zahir mohsen moradi (ariobarzan) 13696 (99757) 2013-07-15 07:57:55
#10 Francisco Moraes (fmoraes) 13631 (90044) 2013-11-24 23:47:34
#11 Alain (Integral) 13617 (207924) 2013-12-26 12:16:10
#12 George (Theofanidis) 13616 (130187) 2013-12-27 21:39:19
#13 Em Doulgerakis (Greko) 13614 (193799) 2014-01-01 00:00:59
#14 Bart den Hartog (Bart13) 13551 (148936) 2014-06-04 12:37:55
#15 Scombes (jerva) 13451 (266541) 2015-04-02 14:39:05
#16 Julia Bernotat (El Greco ) 13370 (81129) 2016-02-01 16:13:43
#17 Nicolas (nicosPavlov) 13305 (257791) 2016-11-27 18:02:06
#18 Javantea (Javantea) 13304 (40816) 2016-11-30 10:01:22
#19 chris (c2) 13282 (51973) 2017-03-22 08:35:23
#20 Mir Dim (mir0soft) 13281 (79760) 2017-03-29 12:18:20
#21 George Lasry (george4096) 13265 (399565) 2017-06-22 21:57:33
#22 D3d4lu5 (D3d4lu5) 13195 (363488) 2018-08-21 12:05:50
#23 Random Dude (rnd) 13184 (103645) 2018-11-06 11:37:31
#24 Jacob (NohatCoder) 13155 (13455) 2019-06-04 09:14:52
#25 Mike (RogueRamblers) 13128 (81614) 2019-12-31 00:27:45
#26 Alain Collignon (vexilla72) 13127 (123666) 2020-01-04 15:44:08
#27 Eugene (lim0n) 13100 (193160) 2020-08-22 08:23:46
You must be logged in to solve the challenge


RSA with Special d

[kitrub-04] - 23 users already solved this challenge, 5 are working on it.
 
 
 

It is well known that RSA with a small private key is insecure. The company, Smart, Inc. has decided to try using special private keys that are large but have a small Hamming weight in order to speed up decryptions and signature generation. The question is whether these keys are safe. Try to reconstruct the private key d from the public parameters.

The codeword for this challenge is the private key d in decimal notation.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

Rank User (#23) Achieved points (Global score) y-m-d - h:m:s

Nobody (nobody) 17412 (42945) 2010-10-22 18:54:58
Christian (Etschupu) 16769 (31788) 2010-10-30 12:12:28
Ilya Ozerov (ilya) 16133 (20556) 2010-11-12 18:59:39
J. M. (jomandi) 14494 (113270) 2011-06-07 17:43:27
#5 Armin Krauss (argh) 14348 (206965) 2011-08-08 08:17:16
#6 Viktor (Veselovský) 14042 (169444) 2012-02-24 21:52:48
#7 Bart den Hartog (Bart13) 13897 (148936) 2012-07-23 09:45:13
#8 Luigi Tomelli (archstanton) 13887 (127538) 2012-08-04 16:30:55
#9 Almut (problelmo) 13681 (45992) 2013-06-22 05:03:48
#10 Kurt Gebauer (Yokozuna) 13661 (282608) 2013-08-01 11:14:10
#11 Em Doulgerakis (Greko) 13613 (193799) 2013-11-13 10:14:29
#12 Francisco Moraes (fmoraes) 13607 (90044) 2013-11-26 19:28:06
#13 Alain (Integral) 13577 (207924) 2014-02-06 16:33:08
#14 George (Theofanidis) 13568 (130187) 2014-02-27 17:15:46
#15 Sean (Kavanaugh) 13386 (29143) 2015-10-09 21:33:57
#16 zahir mohsen moradi (ariobarzan) 13331 (99757) 2016-05-31 18:56:14
#17 George Lasry (george4096) 13248 (399565) 2017-08-05 00:08:48
#18 Kasia (kasia-tutej) 13232 (53366) 2017-11-08 19:49:05
#19 Mir Dim (mir0soft) 13217 (79760) 2018-02-09 18:01:42
#20 Dominik M. (Sgt. Pepper) 13176 (128575) 2018-11-12 01:03:17
#21 Marco Cinelli (Snap) 13148 (37769) 2019-05-31 19:15:04
#22 Eugene (lim0n) 13115 (193160) 2020-02-22 11:24:51
#23 LurkNoi (Lurkrul) 13089 (19595) 2020-10-02 16:18:20
You must be logged in to solve the challenge


World Record Challenge: Break 65 Bits of AES

[schmeh-07] - 0 users already solved this challenge, 5 are working on it.
 
 
 

The longest key that has ever been publicly cracked by exhaustive key search was 64 bits long. The purpose of this challenge is to improve this world record by one bit.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Sigaba Part 2

[stamp-06] - 5 users already solved this challenge.
 
 
 

Decrypt the given ciphertext which is encrypted with the Sigaba machine.
Please give the letters in the key as capital letters.

This challenge has solutions that cannot be automatically checked. If you find such a solution and want to receive your points please write us an E-Mail.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 5

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 13432 (266541) 2015-04-17 19:12:08
Alain (Integral) 13397 (207924) 2015-08-26 15:54:15
George Lasry (george4096) 13258 (399565) 2017-06-08 06:55:11
Eugene (lim0n) 13091 (193160) 2020-09-15 18:36:25
#5 Em Doulgerakis (Greko) 13068 (193799) 2021-04-18 22:32:50
You must be logged in to solve the challenge
Pages [15] << < 123456789101112131415 Show All  
 
 
powered by the CrypTool project  CrypTool

 

   +++    [01:47 - 02.08.2021] jerva solved the Level II challenge 'SIGABA CSP-2900 — Part 1'    +++    [00:40 - 02.08.2021] mochiorochi solved the Level I challenge 'Beaver Code'    +++    [22:51 - 01.08.2021] mochiorochi solved the Level I challenge 'A hidden word'    +++    [22:46 - 01.08.2021] mochiorochi solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [22:05 - 01.08.2021] mochiorochi solved the Level I challenge 'Letter to the Templars — Part 2'    +++