MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9655
Follow us: Facebook Twitter
 
 

Four levels

Four levels of increasing difficulty: From pen & paper to complex mathematical problems.

Limited attempts

You have only a limited number of attempts to solve each challenge. Be certain of your answer before you submit it.

Be fast

Be fast and earn a place on the Hall of Fame. The first four to solve each challenge will be displayed permanently.

Special Level X

The special level X contains cryptographic problems which are currently not known to have been solved.



Cipher challenges on four levels

 

Level I crypto challenges

Level I Challenges - Pen & Paper

Level I challenges are similar to crossword puzzles from newspapers and can be solved with little cryptographic background. You might not even need a computer for solving level I challenges — all you need is a bit of clever thinking and probably a pen and paper. A program like CrypTool applied to a level I challenge can help reveal the answer within minutes or even seconds, if the necessary algorithms are already built in. Hence, if you are new to cryptography, but nonetheless interested in the mysterious topic of cryptanalysis, give the level I challenges a try. You will almost assuredly meet quickly with success.
 
Level II crypto challenges

Level II Challenges - Programming skills required

Level II challenges require some background knowledge in cryptology and usually some computational power. Additionally, you may require tools that are not available in such convenient packages like CrypTool, OpenSSL or Sage. Therefore, you must first thoroughly understand the problem in order to write a computer program, which helps you getting along. It could take hours or even days to solve a level II challenge. Hence, if you consider yourself well-armed with cryptologic knowledge (such as if you are a university student in a cryptographic course), give the level II challenges a try. Success may not come easily, but it will be a worthwhile endeavor.
 
Level III crypto challenges

Level III Challenges - Extensive computing power recommended

Level III challenges require a thorough background in cryptanalysis and usually significant computational power as well. The problems in this level represent current research topics that are believed to be very difficult to solve. Thus, practical solutions may not even exist and ready-to-run tools almost certainly do not. The methodology to solve some of these challenges may already be known, but it may require such a huge amount of computational power that only a large group of people working together in a distributed system could obtain the solution. Challenges in this category mark the thin line between algorithms that are still secure and those that are not. Solving them may take weeks or even several months. Hence, challenges in this level are intended for entire research groups with many experts in cryptanalysis, programming, and distributed systems. Success cannot be guaranteed, but if you are the first to successfully solve one of these challenges, it probably would catch the attention of the scientific community. Of course, it still remains up to you to publish or present any such scientific techniques and results.
 
Level X crypto challenges

Level X Challenges - Unsolved ciphers

Most level X challenges contain problems that have remained unsolved for a long time. The fact that they have been unsolved regardless of numerous attempts suggests these challenges being hard. However, a simple idea can probably reduce the difficulty of it to a simple level I challenge — currently it is just unknown if and how they can be solved. Of course such a challenge cannot be solved with a simple codeword, since even we (the respective author and the MTC3 team) do not know the solution (the plaintext, the original message or the approach). So if you discover a promising solution you should either contact the author or the MTC3 team. Furthermore, you can publish your findings in a scientific journal such as Cryptologia or Journal of Cryptology.

 

Additionally, you may require tools that are not available in a convenient package like CrypTool.


All Challenges (276)

Ordered by date posted, the most recent appear first.

The Book Code: A Challenge for Bookworms

[meier-03] - 126 users already solved this challenge, 23 are working on it.
 
 
 

In order to decrypt the intercepted letter addressed to your neighbor, you need to find out which document has been used to encode the message with the book code.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-03-21 11:02
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#126) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 200 (151602) 2012-03-21 14:09:53
Hans Peter (hanspeter) 200 (52256) 2012-03-21 16:45:18
Armin Krauss (argh) 200 (185115) 2012-03-21 18:35:26
Kurt Gebauer (Yokozuna) 200 (153663) 2012-03-21 18:40:55
#5 Seth Kintigh (DarkFibre) 200 (79471) 2012-03-21 19:27:53
#6 Nathan (Witten) 200 (25326) 2012-03-21 22:23:24
#7 J. M. (jomandi) 200 (113270) 2012-03-21 22:28:00
#8 dbuq (dbuq) 200 (22762) 2012-03-21 23:36:52
#9 Bart den Hartog (Bart13) 150 (118984) 2012-03-22 11:24:42
#10 Christof Kleber (Loki) 150 (6051) 2012-03-22 14:41:45
#11 Michael Gürtler (michaelg) 150 (4128) 2012-03-22 15:29:54
#12 Thomas Gonda (TomG) 133 (36291) 2012-03-23 13:28:37
#13 David (aki321) 133 (27482) 2012-03-23 21:46:41
#14 j.h. (haegarq) 117 (15252) 2012-03-27 10:52:16
#15 Dusan (xxdradus) 110 (40236) 2012-03-30 16:32:48
#16 Luigi Tomelli (archstanton) 108 (108345) 2012-04-03 08:49:02
#17 Paco (Methos259) 106 (106) 2012-04-06 00:12:27
#18 Kevin (0xf0unD) 106 (217) 2012-04-08 00:16:43
#19 Dustin Smith (dvst1n) 105 (415) 2012-04-09 20:33:17
#20 Wombat (Wombat) 104 (5822) 2012-04-12 15:05:47
#21 E.T (Ertheb) 104 (81809) 2012-04-12 18:31:21
#22 Aliazer (Aliazer) 104 (12314) 2012-04-13 12:07:24
#23 Sean Atkinson (Seanwatkinson) 104 (410) 2012-04-15 21:39:49
#24 H. Lautenschlager (helmi) 103 (32747) 2012-04-27 00:05:02
#25 Jarosław Szcześniewski (Zjarek) 103 (203) 2012-04-29 23:25:03
#26 Name (geekon) 103 (103) 2012-04-29 23:43:05
#27 Paul Duplys (pd) 102 (1525) 2012-05-02 23:32:59
#28 Christopher (nomadpenguin) 102 (202) 2012-05-03 02:40:10
#29 Christof B. (beans90) 102 (9488) 2012-05-05 22:30:09
#30 captp (bdcht) 102 (5864) 2012-05-08 23:11:26
#31 Bernd Klimaschewski (cryptonoob) 101 (1003) 2012-06-06 19:23:14
#32 Sebastian Slupina (Grandwizard) 101 (10866) 2012-07-13 01:27:07
#33 KW (qwer*) 101 (13963) 2012-08-04 19:47:22
#34 Max (131x) 101 (1659) 2012-08-13 14:28:00
#35 George (Theofanidis) 101 (109124) 2012-08-30 17:35:24
#36 Hank (hanky) 101 (22859) 2012-09-09 02:27:59
#37 chris_3stones (3stones) 101 (37759) 2012-09-11 07:47:24
#38 Martina (Nikita) 101 (3863) 2012-09-27 19:36:49
#39 Benny (Kingombo) 101 (3663) 2012-09-27 19:45:21
#40 Hannes (Hartmann) 100 (8680) 2012-10-15 23:09:57
#41 Harry (Schwabenbambi) 100 (2409) 2012-10-20 12:40:09
#42 Em Doulgerakis (Greko) 100 (124033) 2012-10-21 13:48:43
#43 George Ho (GeorgH) 100 (3095) 2012-12-02 10:05:09
#44 zahir mohsen moradi (ariobarzan) 100 (99757) 2013-01-26 20:05:58
#45 Snake (snk) 100 (77889) 2013-01-28 15:56:21
#46 Michal (misoxxx) 100 (1710) 2013-01-30 17:32:34
#47 Iain Sharp (WoodenHedgehog) 100 (2196) 2013-02-01 17:20:46
#48 RPH (derichard) 100 (27044) 2013-03-20 09:33:31
#49 Mayuresh Anand (effort2break) 100 (8728) 2013-03-23 15:34:35
#50 Kirill (ineaugh) 100 (1920) 2013-03-24 02:44:55
#51 Tom Tox (tox) 100 (17708) 2013-04-04 18:34:32
#52 mk (bilbobeutlin) 100 (12340) 2013-04-09 16:44:23
#53 Velko Nikolov (staafl) 100 (13467) 2013-04-10 10:03:57
#54 Julia Werdelmann (jw) 100 (10407) 2013-04-15 23:40:49
#55 Bernhard Gruber (bgr) 100 (22889) 2013-04-26 19:15:18
#56 Gabriel (mathgl24) 100 (2427) 2013-05-16 00:26:11
#57 Felix (Flix) 100 (13712) 2013-05-28 23:12:00
#58 Steve (Samacian) 100 (23804) 2013-06-10 12:23:14
#59 Bernd (BRK) 100 (2275) 2013-07-06 13:47:12
#60 Sascha (DoctorHell) 100 (1305) 2013-07-09 20:28:45
#61 Philipp Hammer-Pohlau (phase2) 100 (17981) 2013-07-28 20:08:20
#62 Hans Joachim Girulat (joregi) 100 (35017) 2013-08-05 20:30:49
#63 Boris (Kaasu) 100 (16566) 2013-10-28 18:17:27
#64 Brad (braddrew) 100 (15878) 2013-12-21 08:50:21
#65 Kim H. S. (tenchijin) 100 (25468) 2014-01-05 21:02:05
#66 Alain (Integral) 100 (207924) 2014-01-07 12:14:38
#67 Marcel (bene1512) 100 (20896) 2014-02-13 22:40:44
#68 Karl Schutt (günter) 100 (41550) 2014-03-27 21:55:54
#69 Diego (druk) 100 (800) 2014-03-30 18:12:30
#70 Lutz Sittinger (Kryptolutz) 100 (1802) 2014-06-01 17:20:09
#71 Tina (BTina) 100 (1500) 2014-06-01 20:29:47
#72 Julia Bernotat (El Greco ) 100 (81129) 2014-07-30 19:37:44
#73 Robert (rm) 100 (56475) 2014-07-31 22:35:44
#74 julius gaius (julius) 100 (25581) 2014-08-06 08:58:26
#75 Tim Fink (Magellan) 100 (4876) 2014-10-11 10:08:38
#76 Lane Williams (planetlane) 100 (23948) 2014-10-17 21:27:34
#77 Francisco Moraes (fmoraes) 100 (90044) 2014-11-18 21:07:25
#78 Pavel (haw) 100 (22728) 2014-12-05 14:26:01
#79 Michael Jeffrey (empjay) 100 (3004) 2014-12-12 15:23:16
#80 HolgerK (HolgerK) 100 (25776) 2014-12-22 23:42:32
#81 mirth23 (mirth23) 100 (7050) 2015-02-19 19:33:29
#82 micaman (micaman) 100 (4634) 2015-02-19 20:50:33
#83 Rainer Zufall (kiekuk) 100 (56786) 2015-02-26 09:16:06
#84 curmudgeon (curmudgeon) 100 (1973) 2015-03-23 08:08:14
#85 Andreas Frerichs (Ossili) 100 (33266) 2015-04-02 18:42:21
#86 partamier (yann) 100 (5435) 2015-05-15 16:37:47
#87 Michael Ammon (Ammonym) 100 (7719) 2015-06-19 17:41:21
#88 Mark van Heeswijk (markvh) 100 (2600) 2015-07-13 01:21:42
#89 Joerg G. (SnifferMaster) 100 (18154) 2015-09-30 09:25:00
#90 Alain Collignon (vexilla72) 100 (87833) 2015-10-01 15:37:32
#91 J-L Morel (Rossignol) 100 (29125) 2015-10-04 09:54:12
#92 S (Zyphe) 100 (10461) 2015-10-25 15:21:14
#93 Isabella (Isa) 100 (4235) 2015-11-01 19:20:08
#94 Andre Mueller (amueller) 100 (3215) 2015-12-14 21:01:39
#95 Corneli Keim (cryptina) 100 (703) 2015-12-19 21:43:50
#96 Imam Uasa (Merricx) 100 (9188) 2015-12-25 07:52:45
#97 Graham (graham107) 100 (400) 2016-01-07 22:29:27
#98 Szabó Zoltán (szabo.z87) 100 (55604) 2016-01-29 12:30:17
#99 Marco Manfredi (mkk9901) 100 (17686) 2016-03-08 17:41:00
#100 Kurona (Kurona) 100 (1100) 2016-05-31 10:55:50
#101 Robert Kosten (Robert Kosten) 100 (2724) 2016-09-09 13:10:28
#102 Norbert Biermann (Norbert) 100 (45031) 2016-09-18 22:27:24
#103 Nicolas (nicosPavlov) 100 (151166) 2016-10-01 16:21:01
#104 Bertold (bk) 100 (9673) 2016-10-01 18:01:40
#105 Simon Jakob (simon.jakob) 100 (18714) 2016-11-24 22:19:18
#106 Michael (FoM) 100 (36772) 2016-11-30 18:15:21
#107 Tristan1473 (Tristan1473) 100 (18914) 2017-02-05 19:15:50
#108 Mir Dim (mir0soft) 100 (72404) 2017-03-17 21:22:35
#109 chris (c2) 100 (51973) 2017-03-26 21:56:40
#110 Dominik M. (Sgt. Pepper) 100 (97919) 2017-04-02 16:59:32
#111 Daniel Walder (ibex) 100 (14372) 2017-04-28 10:51:07
#112 sarah b (silva) 100 (21031) 2017-06-07 18:34:09
#113 D3d4lu5 (D3d4lu5) 100 (275573) 2017-06-10 03:46:42
#114 Martin (Ehmpunkt) 100 (700) 2017-08-31 17:13:56
#115 nimroth (nimroth cynthor) 100 (6021) 2017-11-27 22:10:43
#116 Dusan Djuric (flapjack) 100 (2104) 2018-02-03 11:27:58
#117 Julian (Lemmynator) 100 (16666) 2018-03-17 00:19:25
#118 Eric (ExAstris) 100 (26990) 2018-05-23 02:06:27
#119 Benjamin (200611736) 100 (10186) 2018-06-02 21:49:04
#120 Random Dude (rnd) 100 (89825) 2018-08-01 02:22:56
#121 Marc (rcll0891) 100 (24004) 2019-01-21 18:19:06
#122 Pierre Robier (tripleedged) 100 (5916) 2019-02-18 14:44:29
#123 LoneWolf219 (LoneWolf219) 100 (12795) 2019-03-10 23:54:05
#124 madness (madness) 100 (15407) 2019-04-07 17:55:41
#125 Jeff (Fountain) 100 (7385) 2019-05-27 02:35:17
#126 Mike (RogueRamblers) 100 (22435) 2019-05-29 01:18:33
You must be logged in to solve the challenge


Monoalphabetic Substitution with Camouflage — Part 5

[veselovsky-13] - 24 users already solved this challenge.
 
 
 

In the fifth part the same variant of the cipher already introduced in Part 3 and 4 of this challenge has been used here, too. The only difference is that spaces were removed previously to the encryption process.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-03-09 21:49
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#24) Achieved points (Global score) y-m-d - h:m:s

The Killer (Killer) 2000 (42393) 2012-03-10 18:17:46
J. M. (jomandi) 2000 (113270) 2012-03-10 18:57:08
Armin Krauss (argh) 2000 (185115) 2012-03-10 21:16:55
Seth Kintigh (DarkFibre) 1824 (79471) 2012-03-11 00:47:49
#5 Peter Mustermann (Gummiboot) 1547 (60285) 2012-03-16 20:59:40
#6 Bart den Hartog (Bart13) 1378 (118984) 2012-03-30 11:45:54
#7 zahir mohsen moradi (ariobarzan) 1141 (99757) 2013-08-30 17:08:47
#8 Alain (Integral) 1133 (207924) 2014-01-02 23:38:42
#9 George (Theofanidis) 1125 (109124) 2014-06-09 16:23:22
#10 Snake (snk) 1125 (77889) 2014-06-15 15:52:48
#11 Francisco Moraes (fmoraes) 1119 (90044) 2014-11-13 01:37:40
#12 Julia Bernotat (El Greco ) 1118 (81129) 2014-12-16 23:53:53
#13 Kurt Gebauer (Yokozuna) 1117 (153663) 2015-01-14 19:29:23
#14 HolgerK (HolgerK) 1113 (25776) 2015-05-14 20:38:49
#15 Robert (rm) 1112 (56475) 2015-07-22 22:23:43
#16 Szabó Zoltán (szabo.z87) 1108 (55604) 2015-12-29 19:29:32
#17 Marc (rcll0891) 1107 (24004) 2016-03-03 20:39:35
#18 Norbert Biermann (Norbert) 1103 (45031) 2016-09-09 13:10:17
#19 Nicolas (nicosPavlov) 1102 (151166) 2016-11-21 14:27:28
#20 George Lasry (george4096) 1098 (299488) 2017-07-29 11:30:40
#21 D3d4lu5 (D3d4lu5) 1097 (275573) 2017-09-06 07:03:14
#22 Alain Collignon (vexilla72) 1095 (87833) 2018-03-13 14:44:44
#23 Dominik M. (Sgt. Pepper) 1094 (97919) 2018-07-17 18:28:56
#24 Random Dude (rnd) 1092 (89825) 2019-02-03 04:40:40
You must be logged in to solve the challenge


ECDH-Key Exchange for Beginners

[meier-02] - 81 users already solved this challenge, 2 are working on it.
 
 
 

Alice and Bob would like to agree upon a shared key. They use an Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol. Try to reproduce the steps that are necessary to calculate the key and to decrypt Bob's message.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-24 00:00
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#81) Achieved points (Global score) y-m-d - h:m:s

Viktor (Veselovský) 200 (151602) 2012-02-24 01:30:57
Bart den Hartog (Bart13) 200 (118984) 2012-02-24 05:01:51
Seth Kintigh (DarkFibre) 200 (79471) 2012-02-24 05:50:55
Armin Krauss (argh) 200 (185115) 2012-02-24 08:50:00
#5 Hans Peter (hanspeter) 200 (52256) 2012-02-24 10:54:50
#6 J. M. (jomandi) 200 (113270) 2012-02-24 13:48:27
#7 dbuq (dbuq) 200 (22762) 2012-02-24 15:06:14
#8 Nathan (Witten) 150 (25326) 2012-02-25 00:13:09
#9 Roland Jansen (roland) 133 (17607) 2012-02-26 16:55:27
#10 Lukas (Kahla) 133 (4719) 2012-02-26 21:45:36
#11 Luigi Tomelli (archstanton) 120 (108345) 2012-02-28 09:14:45
#12 Julius Sewing (H3BX) 120 (332) 2012-02-28 13:29:44
#13 Michel Van Caneghem (vancan) 120 (49719) 2012-02-28 22:05:39
#14 Daniel Fretwell (fretty) 120 (30107) 2012-02-28 23:48:52
#15 Thomas Lambert (lambert) 108 (35237) 2012-03-07 15:10:35
#16 bubba gump (surrenderyourworld) 104 (925) 2012-03-18 17:02:14
#17 Steluta P. (maty_star) 102 (5734) 2012-04-06 00:15:40
#18 Roxana Ioana (rock_sana) 102 (610) 2012-04-11 10:22:19
#19 Aliazer (Aliazer) 102 (12314) 2012-04-13 12:10:20
#20 George (Theofanidis) 102 (109124) 2012-04-16 23:44:55
#21 captp (bdcht) 101 (5864) 2012-05-09 09:53:00
#22 Kurt Gebauer (Yokozuna) 101 (153663) 2012-05-11 00:40:26
#23 E.T (Ertheb) 101 (81809) 2012-05-24 13:27:12
#24 Dusan (xxdradus) 101 (40236) 2012-05-27 12:14:30
#25 Daniel Richter (TheHiveMind) 101 (11147) 2012-06-19 09:50:04
#26 Em Doulgerakis (Greko) 101 (124033) 2012-07-06 16:40:21
#27 chris_3stones (3stones) 101 (37759) 2012-08-19 09:16:38
#28 KW (qwer*) 101 (13963) 2012-09-03 19:42:54
#29 H. Lautenschlager (helmi) 100 (32747) 2012-10-06 16:16:12
#30 Friedrich Wiemer (asante) 100 (5183) 2012-11-04 22:56:25
#31 Andrew (Agromania) 100 (4508) 2012-11-15 10:13:02
#32 fabian (faru) 100 (300) 2013-02-06 23:17:19
#33 Kirill (ineaugh) 100 (1920) 2013-03-25 00:17:47
#34 RPH (derichard) 100 (27044) 2013-04-12 10:10:01
#35 Vlatiha Romanova (Vlatiha) 100 (10323) 2013-06-27 11:21:01
#36 Carsten Hess (machess) 100 (700) 2013-07-27 11:05:23
#37 zahir mohsen moradi (ariobarzan) 100 (99757) 2013-08-08 20:31:11
#38 Almut (problelmo) 100 (45992) 2013-08-19 16:36:54
#39 Geoffrey (FreshGod) 100 (2163) 2013-08-28 11:00:06
#40 Alexander (cruachan) 100 (16051) 2013-10-01 23:25:08
#41 Gergely Simon (george314) 100 (16555) 2013-10-02 20:53:40
#42 Steve (Samacian) 100 (23804) 2013-10-29 06:48:28
#43 Snake (snk) 100 (77889) 2013-11-20 17:48:27
#44 Brad (braddrew) 100 (15878) 2013-12-14 10:34:24
#45 Alain (Integral) 100 (207924) 2013-12-28 09:19:16
#46 Pavel (haw) 100 (22728) 2014-01-06 15:01:25
#47 Forrest Gump (Polyphem) 100 (38763) 2014-01-24 17:53:22
#48 caesar ([caesar]) 100 (10738) 2014-03-24 10:39:27
#49 Karl Schutt (günter) 100 (41550) 2014-04-01 21:40:10
#50 Robert (rm) 100 (56475) 2014-07-31 22:50:40
#51 Julia Bernotat (El Greco ) 100 (81129) 2014-08-04 17:50:29
#52 Sebastian Slupina (Grandwizard) 100 (10866) 2014-10-13 17:07:17
#53 Francisco Moraes (fmoraes) 100 (90044) 2014-11-03 22:27:16
#54 Andreas Frerichs (Ossili) 100 (33266) 2015-01-06 15:49:00
#55 HolgerK (HolgerK) 100 (25776) 2015-01-10 20:55:29
#56 Javantea (Javantea) 100 (40816) 2015-01-23 00:32:25
#57 Rainer Zufall (kiekuk) 100 (56786) 2015-05-07 12:06:18
#58 Fabio (degrigis) 100 (1206) 2015-07-15 18:04:03
#59 Erik (Erox) 100 (22651) 2015-08-28 13:09:21
#60 Claude Vaillancourt (Cl3v3r) 100 (38351) 2015-09-18 20:13:54
#61 S (Zyphe) 100 (10461) 2015-10-26 12:49:19
#62 Alain Collignon (vexilla72) 100 (87833) 2015-11-03 06:03:14
#63 Martin (martinbucher) 100 (27363) 2016-01-02 11:18:48
#64 Lane Williams (planetlane) 100 (23948) 2016-01-25 21:28:42
#65 Dominik M. (Sgt. Pepper) 100 (97919) 2016-10-02 14:52:04
#66 Nicolas (nicosPavlov) 100 (151166) 2016-10-15 06:56:38
#67 Marcel (bene1512) 100 (20896) 2016-12-30 09:38:22
#68 Michael (FoM) 100 (36772) 2017-01-13 14:36:58
#69 Simon Hemmerich (simhem) 100 (3779) 2017-03-13 11:06:49
#70 chris (c2) 100 (51973) 2017-04-25 14:28:55
#71 Mir Dim (mir0soft) 100 (72404) 2017-05-25 13:56:06
#72 Felix (Flix) 100 (13712) 2017-05-30 21:52:08
#73 Kasia (kasia-tutej) 100 (53366) 2017-06-06 14:44:49
#74 D3d4lu5 (D3d4lu5) 100 (275573) 2017-06-25 08:59:49
#75 john doe (misio) 100 (7371) 2017-12-04 21:45:15
#76 Eric (ExAstris) 100 (26990) 2018-05-27 22:10:35
#77 Random Dude (rnd) 100 (89825) 2018-07-17 03:06:07
#78 Ekrem Aydin (Eko115) 100 (1105) 2018-10-27 17:07:50
#79 madness (madness) 100 (15407) 2019-04-01 18:53:59
#80 ENOENT (ENOENT) 100 (13478) 2019-06-01 20:58:17
#81 Darth Thucydides (darththucydides) 100 (100) 2019-06-27 05:54:40
You must be logged in to solve the challenge


Partial Key Exposure with RSA — Part 1

[koy-01] - 72 users already solved this challenge, 12 are working on it.
 
 
 

With RSA keys, the private key d must remain private. If the public key e is very small, this is not completely possible. This exercise demonstrates how simple it is to compute a portion of the secret key d.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-11 13:20
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#72) Achieved points (Global score) y-m-d - h:m:s

Bart den Hartog (Bart13) 2000 (118984) 2012-02-11 13:23:49
Viktor (Veselovský) 2000 (151602) 2012-02-11 13:32:57
J. M. (jomandi) 2000 (113270) 2012-02-11 13:58:47
Nathan (Witten) 2000 (25326) 2012-02-11 14:53:02
#5 The Killer (Killer) 2000 (42393) 2012-02-11 15:19:01
#6 Armin Krauss (argh) 2000 (185115) 2012-02-11 16:11:07
#7 Michel Van Caneghem (vancan) 2000 (49719) 2012-02-11 17:53:01
#8 Seth Kintigh (DarkFibre) 2000 (79471) 2012-02-11 20:11:15
#9 Peter Mustermann (Gummiboot) 1824 (60285) 2012-02-12 14:49:20
#10 Jean-Baptiste Mossé (intersect) 1576 (1676) 2012-02-16 13:24:30
#11 Martin Härterich (HaeM) 1398 (15149) 2012-02-28 16:17:44
#12 Thomas Gonda (TomG) 1362 (36291) 2012-03-05 15:41:48
#13 Luigi Tomelli (archstanton) 1362 (108345) 2012-03-05 16:10:07
#14 Keith Randall (randall77) 1362 (31011) 2012-03-06 01:42:39
#15 Kurt Gebauer (Yokozuna) 1279 (153663) 2012-04-05 13:18:28
#16 Hans Peter (hanspeter) 1278 (52256) 2012-04-05 22:03:17
#17 Aliazer (Aliazer) 1258 (12314) 2012-04-20 21:27:38
#18 Thomas Lambert (lambert) 1256 (35237) 2012-04-21 18:04:08
#19 chris_3stones (3stones) 1187 (37759) 2012-08-30 08:14:28
#20 George (Theofanidis) 1187 (109124) 2012-08-30 08:15:34
#21 Em Doulgerakis (Greko) 1187 (124033) 2012-08-30 08:43:59
#22 Claude Laveaux (claude.laveaux) 1163 (14504) 2012-12-31 13:56:38
#23 Velko Nikolov (staafl) 1149 (13467) 2013-04-25 01:22:32
#24 Almut (problelmo) 1144 (45992) 2013-06-18 20:55:18
#25 zahir mohsen moradi (ariobarzan) 1143 (99757) 2013-07-06 16:45:54
#26 Daniel Fretwell (fretty) 1140 (30107) 2013-08-08 15:49:56
#27 Forrest Gump (Polyphem) 1138 (38763) 2013-09-09 02:08:31
#28 Tanuvir Singh (tanuvir) 1135 (1335) 2013-10-26 21:12:00
#29 Rohit Vobbilisetty (vrohit13) 1135 (1135) 2013-10-26 21:19:12
#30 Francisco Moraes (fmoraes) 1134 (90044) 2013-11-17 22:03:09
#31 Brad (braddrew) 1132 (15878) 2013-12-23 05:04:34
#32 Alain (Integral) 1130 (207924) 2014-02-01 17:22:12
#33 hellman (hellman) 1128 (14862) 2014-03-12 15:48:44
#34 Michael Doucha (mdou) 1126 (13757) 2014-04-14 22:01:32
#35 Thomas Schmucker (dg) 1125 (26066) 2014-05-11 23:29:09
#36 BHAVNA (bhavna) 1119 (1119) 2014-10-14 00:34:45
#37 Bhavna Gurnani (Bhavna Gurnani) 1118 (1118) 2014-11-08 01:35:37
#38 Julia Bernotat (El Greco ) 1117 (81129) 2014-11-29 00:38:21
#39 Robert (rm) 1117 (56475) 2014-12-05 01:22:25
#40 Hank (hanky) 1116 (22859) 2015-01-25 19:07:36
#41 Jeremy Chuang (jeremhh) 1115 (6643) 2015-02-17 01:18:18
#42 R (r?) 1114 (6742) 2015-03-15 22:45:15
#43 Claude Vaillancourt (Cl3v3r) 1110 (38351) 2015-08-12 15:45:55
#44 Javantea (Javantea) 1110 (40816) 2015-08-27 18:37:35
#45 Sean (Kavanaugh) 1110 (29143) 2015-09-15 00:47:45
#46 S Combes (jerva) 1109 (99132) 2015-10-24 18:11:40
#47 Szabó Zoltán (szabo.z87) 1108 (55604) 2015-11-12 12:31:39
#48 Alain Collignon (vexilla72) 1108 (87833) 2015-11-18 10:00:05
#49 Dominik M. (Sgt. Pepper) 1107 (97919) 2015-12-23 14:26:07
#50 Andreas Frerichs (Ossili) 1106 (33266) 2016-02-26 20:26:07
#51 Rainer Zufall (kiekuk) 1106 (56786) 2016-02-26 23:24:36
#52 Norbert Biermann (Norbert) 1104 (45031) 2016-07-10 20:28:32
#53 Nicolas (nicosPavlov) 1102 (151166) 2016-10-18 18:14:10
#54 Tristan1473 (Tristan1473) 1100 (18914) 2017-02-04 09:18:00
#55 Georgius Stolte (HazmatsFear) 1100 (15671) 2017-02-27 20:32:15
#56 Mir Dim (mir0soft) 1099 (72404) 2017-03-29 14:58:43
#57 chris (c2) 1099 (51973) 2017-04-02 16:28:52
#58 Kasia (kasia-tutej) 1098 (53366) 2017-06-01 15:14:34
#59 D3d4lu5 (D3d4lu5) 1098 (275573) 2017-07-12 18:19:58
#60 George Lasry (george4096) 1098 (299488) 2017-07-30 00:01:46
#61 Aijun (geaijun) 1096 (3379) 2018-01-09 01:43:23
#62 Erik (Erox) 1094 (22651) 2018-05-12 15:39:20
#63 Eric (ExAstris) 1094 (26990) 2018-06-27 02:17:47
#64 Karl Schutt (günter) 1093 (41550) 2018-08-08 22:25:19
#65 Random Dude (rnd) 1093 (89825) 2018-10-01 16:42:43
#66 ykaridi (ykaridi) 1091 (7035) 2019-03-23 01:18:39
#67 schwuggel1337 (schwuggel1337) 1091 (7716) 2019-03-24 14:54:58
#68 Klaus (kumaus) 1091 (21415) 2019-04-02 16:31:57
#69 madness (madness) 1091 (15407) 2019-04-07 05:52:56
#70 Marco Cinelli (Snap) 1090 (28365) 2019-05-10 15:10:58
#71 ENOENT (ENOENT) 1090 (13478) 2019-05-31 21:08:57
#72 Michael (FoM) 1090 (36772) 2019-06-18 11:44:06
You must be logged in to solve the challenge


RSA Factoring Challenge: RSA-2048

[rsa-38] - 0 users already solved this challenge, 5 are working on it.
 
 
 

This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 617 decimal digits.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2012-02-07 12:13
Maximum number of attempts for this challenge: 15

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [05:54 - 27.06.2019] darththucydides solved the Level I challenge 'ECDH-Key Exchange for Beginners'    +++    [12:28 - 26.06.2019] D3d4lu5 solved the Level II challenge 'Handycipher — Part 10'    +++    [02:45 - 26.06.2019] RogueRamblers solved the Level I challenge 'ADFGVX — Part 2'    +++    [23:09 - 25.06.2019] V3rmind solved the Level I challenge 'A hidden word'    +++    [22:56 - 25.06.2019] V3rmind solved the Level I challenge 'Number Sequence — Part 8'    +++