MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11119
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 



Level III Challenges (74)

All challenges in Level III, ordered by date posted (the most recent appear first).

SIGABA CSP-2900 — Part 3

[kopal-30] - 1 user already solved this challenge.
 
 
 

The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 200 and 100 characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2021-07-31 18:03
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 20000 (266541) 2021-08-01 09:36:13
You must be logged in to solve the challenge


SIGABA CSP-889 — Part 3

[kopal-27] - 2 users already solved this challenge.
 
 
 

The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 200 and 100 characters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2021-06-01 13:45
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 20000 (399565) 2021-06-01 21:12:15
Scombes (jerva) 20000 (266541) 2021-06-02 12:03:55
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 9

[kopal-13] - 1 user already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52E ciphertext and a crib. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-30 13:03
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 15245 (253196) 2020-07-22 07:22:48
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 8

[kopal-12] - 0 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52D ciphertext and a crib. The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-24 16:56
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 7

[kopal-11] - 3 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52AB ciphertext and a crib. The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-23 12:30
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 16645 (253196) 2020-05-10 20:53:41
Nicolas (nicosPavlov) 14822 (257791) 2020-09-15 14:25:59
Scombes (jerva) 14427 (266541) 2021-01-10 14:34:22
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 6

[kopal-10] - 1 user already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52D ciphertext and a crib. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-22 15:06
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 14677 (253196) 2020-10-19 09:11:58
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 5

[kopal-09] - 2 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from T52D ciphertexts "in-depth". You are also provided with cribs for each message. The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-21 12:33
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

Kurt Gebauer (Yokozuna) 18745 (282608) 2020-04-23 23:55:05
Nicolas (nicosPavlov) 14827 (257791) 2020-09-12 14:33:35
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 4

[kopal-08] - 4 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from T52E ciphertexts "in-depth". You are also provided with cribs for each message. The key is partially known.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-15 13:24
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#4) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 17893 (253196) 2020-04-20 16:19:30
Kurt Gebauer (Yokozuna) 17893 (282608) 2020-04-20 21:51:42
George Lasry (george4096) 16705 (399565) 2020-05-02 11:16:22
Nicolas (nicosPavlov) 14928 (257791) 2020-08-19 06:43:45
You must be logged in to solve the challenge


The SIGABA Challenge — Part 6

[lasry-31] - 1 user already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first five parts of this series of challenges, you are provided with a partial known-plaintext. However, in this part you get no information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-04-05 18:47
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 14326 (266541) 2021-02-07 21:35:56
You must be logged in to solve the challenge


The SIGABA Challenge — Part 5

[lasry-30] - 2 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first four parts of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-26 13:03
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 20000 (266541) 2020-03-26 13:34:12
Snake (snk) 20000 (187783) 2020-03-26 21:39:40
You must be logged in to solve the challenge


The SIGABA Challenge — Part 4

[lasry-29] - 5 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first three parts of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-17 20:15
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 20000 (266541) 2020-03-17 20:56:40
Snake (snk) 18390 (187783) 2020-03-21 17:08:22
D3d4lu5 (D3d4lu5) 16438 (363488) 2020-04-08 18:24:55
Nicolas (nicosPavlov) 14472 (257791) 2020-11-17 09:28:05
#5 Em Doulgerakis (Greko) 14143 (193799) 2021-05-10 11:47:05
You must be logged in to solve the challenge


The SIGABA Challenge — Part 3

[lasry-28] - 6 users already solved this challenge.
 
 
 

The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in part 1 and part 2 of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2020-03-11 21:10
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#6) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 20000 (266541) 2020-03-11 22:43:44
Kurt Gebauer (Yokozuna) 18390 (282608) 2020-03-15 07:50:32
Snake (snk) 17290 (187783) 2020-03-21 19:19:23
D3d4lu5 (D3d4lu5) 16839 (363488) 2020-03-26 17:58:44
#5 Nicolas (nicosPavlov) 14732 (257791) 2020-08-24 04:19:56
#6 Em Doulgerakis (Greko) 14164 (193799) 2021-04-18 22:38:29
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 3

[kopal-07] - 2 users already solved this challenge, 1 is working on it.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52C ciphertext. The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-10-26 18:50
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 14126 (266541) 2020-12-29 18:50:16
George Lasry (george4096) 14125 (399565) 2020-12-31 12:43:06
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 2

[kopal-06] - 0 users already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52AB ciphertext. The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-10-09 12:36
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


The Heavy T52 Sturgeon Challenge — Part 1

[kopal-05] - 1 user already solved this challenge.
 
 
 

The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover the plaintexts from T52D ciphertexts "in-depth". The key is unknown.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2019-09-30 17:57
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 14576 (399565) 2020-04-25 19:03:07
You must be logged in to solve the challenge


ElsieFour — Part 1

[rotthaler-01] - 4 users already solved this challenge, 1 is working on it.
 
 
 

ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 1 is a partly-known-plaintext challenge which provides 2 messages that were encrypted with the same key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-10-03 06:37
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#4) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 14436 (266541) 2018-06-18 22:14:19
Michael Möller (michaelm) 14182 (253196) 2018-10-29 13:09:48
D3d4lu5 (D3d4lu5) 13586 (363488) 2021-01-04 19:14:20
Eugene (lim0n) 13512 (193160) 2021-07-20 12:27:20
You must be logged in to solve the challenge


Handycipher — Part 9

[kallick-23] - 3 users already solved this challenge, 1 is working on it.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 9 is the same as Part 6, but uses an improved version of the cipher. It is a ciphertext-only challenge.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-01-21 22:17
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 14906 (399565) 2017-05-31 11:00:46
Michael Möller (michaelm) 14129 (253196) 2018-03-26 21:50:27
D3d4lu5 (D3d4lu5) 13830 (363488) 2019-01-26 17:57:14
You must be logged in to solve the challenge


Handycipher — Part 8

[kallick-22] - 3 users already solved this challenge, 1 is working on it.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 8 is the same as Part 5, but uses an improved version of the cipher. You are given the ciphertext and 229 letters occuring at an unknown location in the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-01-21 22:14
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 14917 (399565) 2017-05-28 23:32:02
Michael Möller (michaelm) 14117 (253196) 2018-04-04 18:16:20
D3d4lu5 (D3d4lu5) 13830 (363488) 2019-01-26 09:32:09
You must be logged in to solve the challenge


Handycipher — Part 7

[kallick-21] - 2 users already solved this challenge, 1 is working on it.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 7 is the same as Part 4, but uses an improved version of the cipher. You are given the ciphertext and the first 229 letters of the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2017-01-21 22:11
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 14917 (399565) 2017-05-28 23:43:15
D3d4lu5 (D3d4lu5) 13830 (363488) 2019-01-26 07:53:23
You must be logged in to solve the challenge


Extended Handycipher — Part 6

[kallick-17] - 2 users already solved this challenge.
 
 
 

Extended Handycipher is an enhancement of Handycipher. Part 6 is the same as Part 3, but uses an improved version of the cipher. You are given two encryptions of the plaintext generated with the same key. It is ciphertext-only.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 20:06
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 14274 (399565) 2017-05-30 15:01:05
D3d4lu5 (D3d4lu5) 13701 (363488) 2019-01-28 18:39:51
You must be logged in to solve the challenge


Extended Handycipher — Part 5

[kallick-16] - 3 users already solved this challenge.
 
 
 

Extended Handycipher is an enhancement of Handycipher. Part 5 is the same as Part 2, but uses an improved version of the cipher. You are given two encryptions of the plaintext generated with the same key, and 229 characters occuring at an unknown location in the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 20:04
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 14510 (253196) 2017-02-13 22:37:52
George Lasry (george4096) 14276 (399565) 2017-05-29 00:37:15
D3d4lu5 (D3d4lu5) 13704 (363488) 2019-01-22 06:27:03
You must be logged in to solve the challenge


Extended Handycipher — Part 4

[kallick-15] - 3 users already solved this challenge, 1 is working on it.
 
 
 

Extended Handycipher is an enhancement of Handycipher. Part 4 is the same as Part 1, but uses an improved version of the cipher. You are given three encryptions of the plaintext generated with the same key, and the first 229 characters of the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 20:02
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#3) Achieved points (Global score) y-m-d - h:m:s

Michael Möller (michaelm) 14475 (253196) 2017-02-27 14:57:16
George Lasry (george4096) 14276 (399565) 2017-05-29 00:30:45
D3d4lu5 (D3d4lu5) 13725 (363488) 2018-12-14 06:34:24
You must be logged in to solve the challenge


Handycipher — Part 6

[kallick-14] - 5 users already solved this challenge.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 6 is the same as Part 3, but uses an improved version of the cipher. It is a ciphertext-only challenge.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 19:59
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Alain (Integral) 15666 (207924) 2016-08-16 23:27:18
Michael Möller (michaelm) 15124 (253196) 2016-10-03 10:57:55
George Lasry (george4096) 14276 (399565) 2017-05-28 23:48:45
Nicolas (nicosPavlov) 13925 (257791) 2018-03-06 14:54:25
#5 D3d4lu5 (D3d4lu5) 13748 (363488) 2018-11-04 23:47:38
You must be logged in to solve the challenge


Handycipher — Part 5

[kallick-13] - 5 users already solved this challenge.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 5 is the same as Part 2, but uses an improved version of the cipher. You are given the ciphertext and 229 letters occuring at an unknown location in the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 19:55
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Alain (Integral) 15684 (207924) 2016-08-16 15:08:03
Michael Möller (michaelm) 15043 (253196) 2016-10-14 13:50:17
George Lasry (george4096) 14276 (399565) 2017-05-28 23:56:58
Nicolas (nicosPavlov) 13926 (257791) 2018-03-05 11:40:29
#5 D3d4lu5 (D3d4lu5) 13749 (363488) 2018-11-04 13:40:58
You must be logged in to solve the challenge


Handycipher — Part 4

[kallick-12] - 4 users already solved this challenge.
 
 
 

Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 4 is the same as Part 1, but uses an improved version of the cipher. You are given the ciphertext and the first 229 letters of the plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2016-06-28 19:50
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#4) Achieved points (Global score) y-m-d - h:m:s

Alain (Integral) 15684 (207924) 2016-08-15 21:12:28
George Lasry (george4096) 14276 (399565) 2017-05-29 00:06:01
Nicolas (nicosPavlov) 13928 (257791) 2018-03-03 03:12:00
D3d4lu5 (D3d4lu5) 13748 (363488) 2018-11-05 06:48:23
You must be logged in to solve the challenge


Spirale — Part 4

[allard-04] - 0 users already solved this challenge.
 
 
 

Spirale is a OTP cipher designed to be simply performed by hand.
Part 4 is a ciphertext-only challenge with a 485-letter ciphertext.
Unlike the other three parts of this series, this one uses four new random keys.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-08-23 19:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Handycipher — Part 3

[kallick-03] - 6 users already solved this challenge, 4 are working on it.
 
 
 

Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. You got only the ciphertext of the 993-character plaintext.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2015-03-03 23:40
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#6) Achieved points (Global score) y-m-d - h:m:s

Alain (Integral) 15093 (207924) 2015-06-12 19:31:53
Michael Möller (michaelm) 14592 (253196) 2015-09-23 19:08:45
Em Doulgerakis (Greko) 13977 (193799) 2016-09-13 10:59:28
George Lasry (george4096) 13775 (399565) 2017-05-27 02:00:58
#5 Nicolas (nicosPavlov) 13640 (257791) 2018-01-31 14:46:27
#6 D3d4lu5 (D3d4lu5) 13529 (363488) 2018-11-01 21:36:05
You must be logged in to solve the challenge


ORYX Stream Cipher — Part 4c

[stamp-17] - 0 users already solved this challenge, 1 is working on it.
 
 
 

The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods!
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2014-04-14 20:39
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


ORYX Stream Cipher — Part 4b

[stamp-16] - 2 users already solved this challenge.
 
 
 

The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods!
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2014-04-14 20:38
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 14283 (266541) 2015-03-10 22:57:57
George Lasry (george4096) 13594 (399565) 2017-06-27 11:31:13
You must be logged in to solve the challenge


Double Column Transposition Reloaded — Part 3

[wacker-10] - 0 users already solved this challenge.
 
 
 

The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the third part a German plaintext has been encrypted with random keys.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2013-12-11 20:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Double Column Transposition Reloaded — Part 2

[wacker-09] - 0 users already solved this challenge, 1 is working on it.
 
 
 

The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the second part two interleaved English texts have been encrypted with random keys.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2013-12-11 20:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Double Column Transposition Reloaded — Part 1

[wacker-08] - 0 users already solved this challenge, 2 are working on it.
 
 
 

The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the first part an English plaintext has been encrypted with keys derived from English sentences.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2013-12-11 20:09
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


ORYX Stream Cipher — Part 4d

[stamp-14] - 0 users already solved this challenge, 1 is working on it.
 
 
 

The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods!
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2013-06-27 11:38
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-617

[rsa-37] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 617 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:13
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-2048

[rsa-38] - 0 users already solved this challenge, 6 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 617 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:13
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-500

[rsa-36] - 0 users already solved this challenge, 2 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 500 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-490

[rsa-35] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 490 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:10
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-480

[rsa-34] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 480 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:09
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-470

[rsa-33] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 470 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:08
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-1536

[rsa-32] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 463 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:07
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-460

[rsa-31] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 460 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:06
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-450

[rsa-30] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 450 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:05
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-440

[rsa-29] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 440 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:04
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-430

[rsa-28] - 0 users already solved this challenge, 1 is working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 430 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:03
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-420

[rsa-27] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 420 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:02
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-410

[rsa-26] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 410 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:01
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-400

[rsa-25] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 400 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:00
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-390

[rsa-24] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 390 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:59
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-380

[rsa-23] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 380 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:58
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-370

[rsa-22] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 370 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:57
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-360

[rsa-21] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 360 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:55
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-350

[rsa-20] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 350 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:21
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-340

[rsa-19] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 340 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:19
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-330

[rsa-18] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 330 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:18
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-320

[rsa-17] - 0 users already solved this challenge, 1 is working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 320 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:16
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-310

[rsa-16] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 310 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:15
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-1024

[rsa-15] - 0 users already solved this challenge, 3 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 309 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:13
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-309

[rsa-14] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 309 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:11
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-300

[rsa-13] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 300 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:09
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-290

[rsa-12] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 290 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:07
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-280

[rsa-11] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 280 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:05
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-896

[rsa-10] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 270 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:04
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-270

[rsa-09] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 270 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 11:02
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-260

[rsa-08] - 0 users already solved this challenge.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 260 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 10:50
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-250

[rsa-07] - 15 users already solved this challenge, 1 is working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 250 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 10:48
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#15) Achieved points (Global score) y-m-d - h:m:s

George (Theofanidis) 0 (130187) 2020-03-12 21:20:24
Snake (snk) 0 (187783) 2020-03-16 22:31:47
Erik (Erox) 0 (26141) 2020-03-17 16:24:16
simone (xseris) 0 (8632) 2020-04-14 09:48:28
#5 D3d4lu5 (D3d4lu5) 0 (363488) 2020-05-06 18:10:29
#6 Alain Collignon (vexilla72) 0 (123666) 2020-07-13 16:19:10
#7 noother (noother) 0 (1489) 2020-08-11 03:02:15
#8 0bliviate (0bliviate) 0 (8634) 2020-08-17 19:26:38
#9 George Lasry (george4096) 0 (399565) 2020-09-06 12:14:42
#10 Kevin Shepherd (kshepherd) 0 (2391) 2020-09-14 06:15:17
#11 Alexander W. Janssen (itnomad) 0 (10782) 2021-02-10 17:00:24
#12 Gerd Wilts (gerdw) 0 (50634) 2021-02-15 20:32:01
#13 gordon (sir5) 0 (16181) 2021-05-12 20:01:12
#14 Eric (ExAstris) 0 (56037) 2021-05-13 03:15:00
#15 Antares (Antares) 0 (32880) 2021-07-10 16:54:57
The solution for this challenge was made public on 2020-02-28, and thus it is not possible to get points for this challenge any more. However, you can still solve and enter a solution for this challenge.
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-240

[rsa-06] - 16 users already solved this challenge, 2 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 240 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 10:47
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#16) Achieved points (Global score) y-m-d - h:m:s

Snake (snk) 0 (187783) 2019-12-02 20:05:22
Kurt Gebauer (Yokozuna) 0 (282608) 2019-12-03 02:09:39
George (Theofanidis) 0 (130187) 2019-12-15 22:40:32
Antares (Antares) 0 (32880) 2020-03-02 11:00:19
#5 Erik (Erox) 0 (26141) 2020-03-17 16:26:56
#6 simone (xseris) 0 (8632) 2020-04-14 09:46:01
#7 D3d4lu5 (D3d4lu5) 0 (363488) 2020-05-06 18:08:05
#8 Alain Collignon (vexilla72) 0 (123666) 2020-07-09 07:54:58
#9 0bliviate (0bliviate) 0 (8634) 2020-08-17 19:24:05
#10 George Lasry (george4096) 0 (399565) 2020-09-06 12:15:26
#11 Kevin Shepherd (kshepherd) 0 (2391) 2020-09-14 06:14:02
#12 Alexander W. Janssen (itnomad) 0 (10782) 2021-02-10 16:57:04
#13 Gerd Wilts (gerdw) 0 (50634) 2021-02-15 20:30:27
#14 gordon (sir5) 0 (16181) 2021-05-12 19:59:29
#15 Eric (ExAstris) 0 (56037) 2021-05-13 03:07:15
The solution for this challenge was made public on 2019-12-02, and thus it is not possible to get points for this challenge any more. However, you can still solve and enter a solution for this challenge.
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-232

[rsa-05] - 14 users already solved this challenge, 2 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 232 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 10:45
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#14) Achieved points (Global score) y-m-d - h:m:s

George (Theofanidis) 0 (130187) 2020-03-12 21:24:12
Erik (Erox) 0 (26141) 2020-03-17 16:25:27
Snake (snk) 0 (187783) 2020-03-25 13:36:58
simone (xseris) 0 (8632) 2020-04-14 09:43:45
#5 D3d4lu5 (D3d4lu5) 0 (363488) 2020-05-06 18:09:25
#6 Alain Collignon (vexilla72) 0 (123666) 2020-07-09 07:48:17
#7 0bliviate (0bliviate) 0 (8634) 2020-08-17 19:30:58
#8 George Lasry (george4096) 0 (399565) 2020-09-06 12:13:09
#9 Kevin Shepherd (kshepherd) 0 (2391) 2020-09-14 06:16:27
#10 Alexander W. Janssen (itnomad) 0 (10782) 2021-02-10 17:02:54
#11 Gerd Wilts (gerdw) 0 (50634) 2021-02-15 20:33:29
#12 gordon (sir5) 0 (16181) 2021-05-12 19:57:44
#13 Eric (ExAstris) 0 (56037) 2021-05-13 03:11:30
#14 Antares (Antares) 0 (32880) 2021-07-10 16:54:04
The solution for this challenge was made public on 2020-02-17, and thus it is not possible to get points for this challenge any more. However, you can still solve and enter a solution for this challenge.
You must be logged in to solve the challenge


Digital Signatures: DSA with Medium Fields

[lange-01] - 0 users already solved this challenge, 1 is working on it.
 
 
 

This challenge concerns the Discrete Logarithm Problem (DLP) in a "medium" field.
For powers of very small primes and for large prime fields the function-field sieve and the number-field sieve are highly optimized; for intermediate fields algorithms with the same asymptotic behavior exist but the actual running times are slower. Are you able to solve the DLP in such a field anyway?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-09-02 12:23
Maximum number of attempts for this challenge: 20

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Substitution Cipher with Non-Prefix Codes

[muralidhar-01] - 1 user already solved this challenge, 3 are working on it.
 
 
 

Usually prefix-free codes are used for encryption because it makes the decryption process easier at the receiver's end. However, this challenge deals with a substitution cipher with non-prefix codes. This should be broken by performing a "ciphertext-only attack".
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-06-15 11:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Peter Mustermann (Gummiboot) 13959 (60285) 2013-01-14 07:53:12
You must be logged in to solve the challenge


Recovering the Private Key in the Fully Homomorphic Encryption Scheme

[ramaekers-02] - 0 users already solved this challenge, 4 are working on it.
 
 
 

In the Fully Homomorphic Encryption scheme by Gentry and Halevi the private key is included in the public key. So, theoretically it is possible to recover the secret key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-01-14 00:00
Maximum number of attempts for this challenge: 25

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


CMEA 2

[stamp-11] - 27 users already solved this challenge, 2 are working on it.
 
 
 

CMEA is a block cipher and was one of the 4 cryptographic primitives of the mobile communications network in the US. It is your challenge to perform a known-plaintext attack on CMEA with 40 known plaintext blocks given.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-12-06 00:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#27) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 17412 (206965) 2010-12-14 17:00:33
Wolfgang Weisser (wowmyst) 15101 (33108) 2011-03-15 20:30:10
J. M. (jomandi) 14472 (113270) 2011-08-07 11:09:20
Flip (Flip) 14396 (31107) 2011-09-07 18:30:19
#5 Viktor (Veselovský) 14086 (169444) 2012-03-11 13:41:15
#6 Seth Kintigh (DarkFibre) 14050 (79471) 2012-04-11 00:54:45
#7 Luigi Tomelli (archstanton) 13882 (127538) 2012-10-02 16:30:24
#8 Kurt Gebauer (Yokozuna) 13846 (282608) 2012-11-17 15:01:27
#9 zahir mohsen moradi (ariobarzan) 13696 (99757) 2013-07-15 07:57:55
#10 Francisco Moraes (fmoraes) 13631 (90044) 2013-11-24 23:47:34
#11 Alain (Integral) 13617 (207924) 2013-12-26 12:16:10
#12 George (Theofanidis) 13616 (130187) 2013-12-27 21:39:19
#13 Em Doulgerakis (Greko) 13614 (193799) 2014-01-01 00:00:59
#14 Bart den Hartog (Bart13) 13551 (148936) 2014-06-04 12:37:55
#15 Scombes (jerva) 13451 (266541) 2015-04-02 14:39:05
#16 Julia Bernotat (El Greco ) 13370 (81129) 2016-02-01 16:13:43
#17 Nicolas (nicosPavlov) 13305 (257791) 2016-11-27 18:02:06
#18 Javantea (Javantea) 13304 (40816) 2016-11-30 10:01:22
#19 chris (c2) 13282 (51973) 2017-03-22 08:35:23
#20 Mir Dim (mir0soft) 13281 (79760) 2017-03-29 12:18:20
#21 George Lasry (george4096) 13265 (399565) 2017-06-22 21:57:33
#22 D3d4lu5 (D3d4lu5) 13195 (363488) 2018-08-21 12:05:50
#23 Random Dude (rnd) 13184 (103645) 2018-11-06 11:37:31
#24 Jacob (NohatCoder) 13155 (13455) 2019-06-04 09:14:52
#25 Mike (RogueRamblers) 13128 (81614) 2019-12-31 00:27:45
#26 Alain Collignon (vexilla72) 13127 (123666) 2020-01-04 15:44:08
#27 Eugene (lim0n) 13100 (193160) 2020-08-22 08:23:46
You must be logged in to solve the challenge


RSA with Special d

[kitrub-04] - 23 users already solved this challenge, 5 are working on it.
 
 
 

It is well known that RSA with a small private key is insecure. The company, Smart, Inc. has decided to try using special private keys that are large but have a small Hamming weight in order to speed up decryptions and signature generation. The question is whether these keys are safe. Try to reconstruct the private key d from the public parameters.

The codeword for this challenge is the private key d in decimal notation.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

Rank User (#23) Achieved points (Global score) y-m-d - h:m:s

Nobody (nobody) 17412 (42945) 2010-10-22 18:54:58
Christian (Etschupu) 16769 (31788) 2010-10-30 12:12:28
Ilya Ozerov (ilya) 16133 (20556) 2010-11-12 18:59:39
J. M. (jomandi) 14494 (113270) 2011-06-07 17:43:27
#5 Armin Krauss (argh) 14348 (206965) 2011-08-08 08:17:16
#6 Viktor (Veselovský) 14042 (169444) 2012-02-24 21:52:48
#7 Bart den Hartog (Bart13) 13897 (148936) 2012-07-23 09:45:13
#8 Luigi Tomelli (archstanton) 13887 (127538) 2012-08-04 16:30:55
#9 Almut (problelmo) 13681 (45992) 2013-06-22 05:03:48
#10 Kurt Gebauer (Yokozuna) 13661 (282608) 2013-08-01 11:14:10
#11 Em Doulgerakis (Greko) 13613 (193799) 2013-11-13 10:14:29
#12 Francisco Moraes (fmoraes) 13607 (90044) 2013-11-26 19:28:06
#13 Alain (Integral) 13577 (207924) 2014-02-06 16:33:08
#14 George (Theofanidis) 13568 (130187) 2014-02-27 17:15:46
#15 Sean (Kavanaugh) 13386 (29143) 2015-10-09 21:33:57
#16 zahir mohsen moradi (ariobarzan) 13331 (99757) 2016-05-31 18:56:14
#17 George Lasry (george4096) 13248 (399565) 2017-08-05 00:08:48
#18 Kasia (kasia-tutej) 13232 (53366) 2017-11-08 19:49:05
#19 Mir Dim (mir0soft) 13217 (79760) 2018-02-09 18:01:42
#20 Dominik M. (Sgt. Pepper) 13176 (128575) 2018-11-12 01:03:17
#21 Marco Cinelli (Snap) 13148 (37769) 2019-05-31 19:15:04
#22 Eugene (lim0n) 13115 (193160) 2020-02-22 11:24:51
#23 LurkNoi (Lurkrul) 13089 (19595) 2020-10-02 16:18:20
You must be logged in to solve the challenge


World Record Challenge: Break 65 Bits of AES

[schmeh-07] - 0 users already solved this challenge, 5 are working on it.
 
 
 

The longest key that has ever been publicly cracked by exhaustive key search was 64 bits long. The purpose of this challenge is to improve this world record by one bit.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Sigaba Part 2

[stamp-06] - 5 users already solved this challenge.
 
 
 

Decrypt the given ciphertext which is encrypted with the Sigaba machine.
Please give the letters in the key as capital letters.

This challenge has solutions that cannot be automatically checked. If you find such a solution and want to receive your points please write us an E-Mail.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 5

All successful users of this challenge

Rank User (#5) Achieved points (Global score) y-m-d - h:m:s

Scombes (jerva) 13432 (266541) 2015-04-17 19:12:08
Alain (Integral) 13397 (207924) 2015-08-26 15:54:15
George Lasry (george4096) 13258 (399565) 2017-06-08 06:55:11
Eugene (lim0n) 13091 (193160) 2020-09-15 18:36:25
#5 Em Doulgerakis (Greko) 13068 (193799) 2021-04-18 22:32:50
You must be logged in to solve the challenge
Pages [15] 123456789101112131415 > >> Show All  
 
 
powered by the CrypTool project  CrypTool

 

   +++    [01:47 - 02.08.2021] jerva solved the Level II challenge 'SIGABA CSP-2900 — Part 1'    +++    [00:40 - 02.08.2021] mochiorochi solved the Level I challenge 'Beaver Code'    +++    [22:51 - 01.08.2021] mochiorochi solved the Level I challenge 'A hidden word'    +++    [22:46 - 01.08.2021] mochiorochi solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [22:05 - 01.08.2021] mochiorochi solved the Level I challenge 'Letter to the Templars — Part 2'    +++