Level III Challenges (72)
Page 3 of the challenges in Level III, ordered by date posted (the most recent appear first).
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52C ciphertext. The key is unknown. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author:
This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-10-26 18:50 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#2) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
S Combes (jerva)
|
14126 (204567) |
2020-12-29 18:50:16 |
|
George Lasry (george4096)
|
14125 (369910) |
2020-12-31 12:43:06 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52AB ciphertext. The key is unknown. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-10-09 12:36 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
No one solved the challenge right now. Be the first! |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover the plaintexts from T52D ciphertexts "in-depth". The key is unknown. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2019-09-30 17:57 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#1) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
George Lasry (george4096)
|
14576 (369910) |
2020-04-25 19:03:07 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
ElsieFour — Part 1
[rotthaler-01] - 3 users already solved this challenge, 1 is working on it.
|
|
|
|
|
ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 1 is a partly-known-plaintext challenge which provides 2 messages that were encrypted with the same key. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2017-10-03 06:37 |
|
Maximum number of attempts for this challenge: 15 |
|
|
All successful users of this challenge
Rank |
User (#3) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
S Combes (jerva)
|
14436 (204567) |
2018-06-18 22:14:19 |
|
Michael Möller (michaelm)
|
14182 (253046) |
2018-10-29 13:09:48 |
|
D3d4lu5 (D3d4lu5)
|
13586 (363282) |
2021-01-04 19:14:20 |
|
|
|
|
|
You must be logged in to solve the challenge |
|
|
|
|
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 9 is the same as Part 6, but uses an improved version of the cipher. It is a ciphertext-only challenge. Read more...
Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.
|
|
Author: This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Published on: 2017-01-21 22:17 |
|
Maximum number of attempts for this challenge: 20 |
|
|
All successful users of this challenge
Rank |
User (#3) |
Achieved points (Global score) |
y-m-d - h:m:s |
|
|
George Lasry (george4096)
|
14906 (369910) |
2017-05-31 11:00:46 |
|
Michael Möller (michaelm)
|
14129 (253046) |
2018-03-26 21:50:27 |
|
D3d4lu5 (D3d4lu5)
|
13830 (363282) |
2019-01-26 17:57:14 |
|
|
|
|
|
You must be logged in to solve the challenge |
|