MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9767
Follow us: Facebook Twitter
 
 

Four levels

Four levels of increasing difficulty: From pen & paper to complex mathematical problems.

Limited attempts

You have only a limited number of attempts to solve each challenge. Be certain of your answer before you submit it.

Be fast

Be fast and earn a place on the Hall of Fame. The first four to solve each challenge will be displayed permanently.

Special Level X

The special level X contains cryptographic problems which are currently not known to have been solved.



Cipher challenges on four levels

 

Level I crypto challenges

Level I Challenges - Pen & Paper

Level I challenges are similar to crossword puzzles from newspapers and can be solved with little cryptographic background. You might not even need a computer for solving level I challenges — all you need is a bit of clever thinking and probably a pen and paper. A program like CrypTool applied to a level I challenge can help reveal the answer within minutes or even seconds, if the necessary algorithms are already built in. Hence, if you are new to cryptography, but nonetheless interested in the mysterious topic of cryptanalysis, give the level I challenges a try. You will almost assuredly meet quickly with success.
 
Level II crypto challenges

Level II Challenges - Programming skills required

Level II challenges require some background knowledge in cryptology and usually some computational power. Additionally, you may require tools that are not available in such convenient packages like CrypTool, OpenSSL or Sage. Therefore, you must first thoroughly understand the problem in order to write a computer program, which helps you getting along. It could take hours or even days to solve a level II challenge. Hence, if you consider yourself well-armed with cryptologic knowledge (such as if you are a university student in a cryptographic course), give the level II challenges a try. Success may not come easily, but it will be a worthwhile endeavor.
 
Level III crypto challenges

Level III Challenges - Extensive computing power recommended

Level III challenges require a thorough background in cryptanalysis and usually significant computational power as well. The problems in this level represent current research topics that are believed to be very difficult to solve. Thus, practical solutions may not even exist and ready-to-run tools almost certainly do not. The methodology to solve some of these challenges may already be known, but it may require such a huge amount of computational power that only a large group of people working together in a distributed system could obtain the solution. Challenges in this category mark the thin line between algorithms that are still secure and those that are not. Solving them may take weeks or even several months. Hence, challenges in this level are intended for entire research groups with many experts in cryptanalysis, programming, and distributed systems. Success cannot be guaranteed, but if you are the first to successfully solve one of these challenges, it probably would catch the attention of the scientific community. Of course, it still remains up to you to publish or present any such scientific techniques and results.
 
Level X crypto challenges

Level X Challenges - Unsolved ciphers

Most level X challenges contain problems that have remained unsolved for a long time. The fact that they have been unsolved regardless of numerous attempts suggests these challenges being hard. However, a simple idea can probably reduce the difficulty of it to a simple level I challenge — currently it is just unknown if and how they can be solved. Of course such a challenge cannot be solved with a simple codeword, since even we (the respective author and the MTC3 team) do not know the solution (the plaintext, the original message or the approach). So if you discover a promising solution you should either contact the author or the MTC3 team. Furthermore, you can publish your findings in a scientific journal such as Cryptologia or Journal of Cryptology.

 

Additionally, you may require tools that are not available in a convenient package like CrypTool.


All Challenges (292)

Ordered by date posted, the most recent appear first.

Kaskade-S/T — Part 2

[esslinger-10] - 46 users already solved this challenge, 4 are working on it.
 
 
 

Your friend calls you again and wants you to “test” his cipher (see Kaskade-S/T Part 1) with a longer key. He sends you a plaintext and the corresponding ciphertext and asks, if you could discover the key used for encryption.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-03-04 00:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#46) Achieved points (Global score) y-m-d - h:m:s

mischa (mmisc) 1613 (22426) 2011-03-08 03:15:02
Armin Krauss (argh) 1613 (185115) 2011-03-08 18:26:50
Thomas Gonda (TomG) 1576 (36291) 2011-03-09 18:25:14
Christian Inci (ch100) 1398 (9253) 2011-03-21 16:38:35
#5 J. M. (jomandi) 1217 (113270) 2011-07-03 23:15:20
#6 Seth Kintigh (DarkFibre) 1207 (79471) 2011-07-24 09:27:14
#7 Dano (Dano) 1203 (14610) 2011-08-04 01:02:25
#8 Peter Mustermann (Gummiboot) 1196 (60285) 2011-08-22 14:17:04
#9 Nicolas Golubovic (qll) 1191 (14919) 2011-09-07 02:37:09
#10 Viktor (Veselovský) 1188 (153262) 2011-09-17 23:18:10
#11 Dennis Walter (Lotus) 1188 (6827) 2011-09-18 04:23:42
#12 Keith Randall (randall77) 1175 (31011) 2011-11-09 19:59:34
#13 The Killer (Killer) 1172 (42393) 2011-11-27 16:21:43
#14 Bart den Hartog (Bart13) 1169 (139176) 2011-12-14 16:38:50
#15 Kurt Gebauer (Yokozuna) 1156 (175433) 2012-03-15 19:48:59
#16 Hans Peter (hanspeter) 1147 (52256) 2012-06-07 19:25:00
#17 Michel Van Caneghem (vancan) 1147 (49719) 2012-06-07 21:15:36
#18 Christian (Etschupu) 1145 (31788) 2012-07-03 14:06:25
#19 Luigi Tomelli (archstanton) 1144 (108345) 2012-07-06 18:08:24
#20 Michael Möller (michaelm) 1141 (175129) 2012-08-18 15:02:02
#21 George (Theofanidis) 1141 (110784) 2012-08-24 19:51:03
#22 Em Doulgerakis (Greko) 1140 (124033) 2012-08-30 15:41:07
#23 chris_3stones (3stones) 1138 (37759) 2012-09-30 22:06:36
#24 E.T (Ertheb) 1124 (81809) 2013-07-03 13:14:40
#25 zahir mohsen moradi (ariobarzan) 1123 (99757) 2013-07-06 16:54:09
#26 George Lasry (george4096) 1122 (299488) 2013-08-23 22:15:57
#27 Boris (Kaasu) 1119 (16566) 2013-11-11 23:05:56
#28 Dusan (xxdradus) 1117 (40236) 2013-12-23 14:30:19
#29 Alain (Integral) 1117 (207924) 2013-12-29 18:46:19
#30 Forrest Gump (Polyphem) 1116 (38763) 2014-01-26 01:29:25
#31 Kim H. S. (tenchijin) 1116 (25468) 2014-02-08 08:08:06
#32 hellman (hellman) 1114 (14862) 2014-04-08 16:14:23
#33 Francisco Moraes (fmoraes) 1108 (90044) 2014-11-26 17:33:02
#34 Robert (rm) 1108 (56475) 2014-12-19 20:44:10
#35 Julia Bernotat (El Greco ) 1108 (81129) 2015-01-01 00:00:00
#36 Szabó Zoltán (szabo.z87) 1100 (55604) 2016-03-03 14:30:39
#37 Norbert Biermann (Norbert) 1097 (45031) 2016-09-23 14:02:50
#38 Nicolas (nicosPavlov) 1097 (151166) 2016-10-27 14:45:56
#39 Alain Collignon (vexilla72) 1097 (87833) 2016-11-07 10:11:44
#40 Dominik M. (Sgt. Pepper) 1095 (97919) 2017-03-21 16:59:48
#41 chris (c2) 1095 (51973) 2017-04-04 12:10:18
#42 Mir Dim (mir0soft) 1095 (72404) 2017-04-06 10:35:16
#43 D3d4lu5 (D3d4lu5) 1094 (297709) 2017-07-10 19:21:52
#44 J-L Morel (Rossignol) 1093 (29425) 2017-09-11 11:07:06
#45 Random Dude (rnd) 1089 (90929) 2018-09-08 15:14:30
#46 Mike (RogueRamblers) 1087 (26411) 2019-07-08 03:06:23
You must be logged in to solve the challenge


Kaskade-S/T — Part 3

[esslinger-11] - 29 users already solved this challenge, 2 are working on it.
 
 
 

This time your friend only sends you a ciphertext, which has been encrypted using his cipher (see Kaskade-S/T Part 1 and Part 2). He wants you to figure out the title of the decrypted text.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-03-04 00:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#29) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 1613 (185115) 2011-03-08 11:25:24
Thomas Gonda (TomG) 1444 (36291) 2011-03-16 21:24:17
mischa (mmisc) 1272 (22426) 2011-05-01 03:25:02
J. M. (jomandi) 1216 (113270) 2011-07-06 01:33:39
#5 Seth Kintigh (DarkFibre) 1200 (79471) 2011-08-12 05:07:01
#6 Dennis Walter (Lotus) 1188 (6827) 2011-09-18 04:25:27
#7 Viktor (Veselovský) 1188 (153262) 2011-09-18 17:04:08
#8 Keith Randall (randall77) 1175 (31011) 2011-11-09 23:13:13
#9 Peter Mustermann (Gummiboot) 1165 (60285) 2012-01-06 14:53:14
#10 Michael Möller (michaelm) 1141 (175129) 2012-08-21 16:40:01
#11 George (Theofanidis) 1136 (110784) 2012-11-03 22:55:34
#12 Bart den Hartog (Bart13) 1135 (139176) 2012-11-23 03:57:19
#13 E.T (Ertheb) 1124 (81809) 2013-07-05 20:58:41
#14 zahir mohsen moradi (ariobarzan) 1123 (99757) 2013-07-06 16:51:49
#15 George Lasry (george4096) 1122 (299488) 2013-08-25 00:04:34
#16 Em Doulgerakis (Greko) 1120 (124033) 2013-10-04 17:59:51
#17 Alain (Integral) 1117 (207924) 2013-12-30 00:43:40
#18 Dusan (xxdradus) 1117 (40236) 2014-01-08 15:31:24
#19 Forrest Gump (Polyphem) 1114 (38763) 2014-04-23 01:05:00
#20 Julia Bernotat (El Greco ) 1109 (81129) 2014-10-23 19:26:11
#21 Francisco Moraes (fmoraes) 1108 (90044) 2014-12-08 22:37:18
#22 Szabó Zoltán (szabo.z87) 1100 (55604) 2016-03-08 18:44:40
#23 Nicolas (nicosPavlov) 1095 (151166) 2017-02-17 02:57:06
#24 Mir Dim (mir0soft) 1095 (72404) 2017-04-08 16:03:25
#25 Alain Collignon (vexilla72) 1094 (87833) 2017-06-01 15:56:08
#26 D3d4lu5 (D3d4lu5) 1093 (297709) 2017-08-19 22:34:27
#27 J-L Morel (Rossignol) 1093 (29425) 2017-09-19 14:29:52
#28 Kurt Gebauer (Yokozuna) 1092 (175433) 2018-01-05 01:10:03
#29 Random Dude (rnd) 1088 (90929) 2019-02-22 03:35:38
You must be logged in to solve the challenge


Recovering the Private Key in the Fully Homomorphic Encryption Scheme

[ramaekers-02] - 0 users already solved this challenge, 4 are working on it.
 
 
 

In the Fully Homomorphic Encryption scheme by Gentry and Halevi the private key is included in the public key. So, theoretically it is possible to recover the secret key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-01-14 00:00
Maximum number of attempts for this challenge: 25

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Lunchtime Attack on the Fully Homomorphic Encryption Scheme

[ramaekers-01] - 39 users already solved this challenge, 1 is working on it.
 
 
 

The Fully Homomorphic Encryption Scheme by Gentry and Halevi turns out to be vulnerable to so called lunchtime attacks. In this challenge you have to perform such an attack.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-01-14 00:00
Maximum number of attempts for this challenge: 25

All successful users of this challenge

Rank User (#39) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 2000 (185115) 2011-01-14 18:58:14
Nobody (nobody) 1824 (40618) 2011-01-15 20:51:56
Thomas Gonda (TomG) 1725 (36291) 2011-01-16 19:26:47
mischa (mmisc) 1324 (22426) 2011-02-16 22:47:37
#5 Sayali Deshpande (sayali84) 1244 (1244) 2011-04-06 06:52:00
#6 J. M. (jomandi) 1213 (113270) 2011-05-23 21:53:58
#7 Fabian Bendun (benfa) 1199 (8697) 2011-06-26 21:09:51
#8 Seth Kintigh (DarkFibre) 1193 (79471) 2011-07-12 23:50:36
#9 Viktor (Veselovský) 1186 (153262) 2011-08-08 20:07:01
#10 Daniel Fretwell (fretty) 1182 (30107) 2011-08-22 23:41:59
#11 Christian Matt (Luy) 1168 (9889) 2011-11-01 23:39:41
#12 Keith Randall (randall77) 1163 (31011) 2011-12-04 06:08:51
#13 Bart den Hartog (Bart13) 1160 (139176) 2011-12-26 18:49:57
#14 Nathan (Witten) 1159 (25326) 2011-12-30 18:27:47
#15 Thomas Lambert (lambert) 1147 (35237) 2012-04-14 15:41:53
#16 Kurt Gebauer (Yokozuna) 1146 (175433) 2012-04-25 17:17:50
#17 Michel Van Caneghem (vancan) 1146 (49719) 2012-05-06 16:41:41
#18 Luigi Tomelli (archstanton) 1140 (108345) 2012-07-21 16:36:17
#19 Hans Peter (hanspeter) 1129 (52256) 2013-01-11 23:50:43
#20 Almut (problelmo) 1123 (45992) 2013-06-04 17:12:18
#21 zahir mohsen moradi (ariobarzan) 1120 (99757) 2013-08-11 09:11:45
#22 Alexander (cruachan) 1118 (16051) 2013-10-28 21:09:37
#23 Em Doulgerakis (Greko) 1116 (124033) 2013-12-30 18:17:29
#24 Alain (Integral) 1114 (207924) 2014-02-10 10:07:39
#25 Michael Doucha (mdou) 1113 (13757) 2014-04-10 14:46:15
#26 Francisco Moraes (fmoraes) 1108 (90044) 2014-11-14 21:51:58
#27 Snake (snk) 1106 (79889) 2015-02-27 13:45:28
#28 S Combes (jerva) 1101 (99132) 2015-11-08 16:14:12
#29 Julia Bernotat (El Greco ) 1101 (81129) 2015-11-15 21:22:07
#30 Robert (rm) 1101 (56475) 2015-12-06 17:29:57
#31 Karl Schutt (günter) 1101 (41550) 2015-12-07 02:43:06
#32 Alain Collignon (vexilla72) 1100 (87833) 2016-01-29 14:41:03
#33 Claude Vaillancourt (Cl3v3r) 1096 (38351) 2016-11-17 01:56:44
#34 Nicolas (nicosPavlov) 1096 (151166) 2016-11-19 04:46:31
#35 chris (c2) 1094 (51973) 2017-03-29 23:05:52
#36 Dominik M. (Sgt. Pepper) 1094 (97919) 2017-04-12 00:20:56
#37 Kasia (kasia-tutej) 1093 (53366) 2017-06-16 20:35:08
#38 D3d4lu5 (D3d4lu5) 1093 (297709) 2017-07-18 18:37:06
#39 Random Dude (rnd) 1089 (90929) 2018-10-28 02:16:43
You must be logged in to solve the challenge


Playfair Encryption

[schoettle-01] - 93 users already solved this challenge, 8 are working on it.
 
 
 

In this challenge you shall break the Playfair encryption which was used by the British forces in the Crimean War and in World War I, among others.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-12-22 00:00
Maximum number of attempts for this challenge: 25

All successful users of this challenge

Rank User (#93) Achieved points (Global score) y-m-d - h:m:s

Vincent (Bwian) 133 (552) 2010-12-24 04:03:59
Armin Krauss (argh) 113 (185115) 2010-12-29 19:12:56
Lukas (Kahla) 104 (4719) 2011-01-17 00:12:12
David (aki321) 103 (27482) 2011-01-23 15:31:00
#5 Flip (Flip) 103 (31107) 2011-01-25 17:32:25
#6 Alan Dixon (NickBourbaki) 102 (7761) 2011-02-05 15:10:10
#7 Thomas Gonda (TomG) 101 (36291) 2011-03-11 15:32:09
#8 Wombat (Wombat) 101 (5822) 2011-04-25 17:32:51
#9 mischa (mmisc) 101 (22426) 2011-05-01 01:47:17
#10 The Killer (Killer) 101 (42393) 2011-06-15 03:41:22
#11 Seth Kintigh (DarkFibre) 100 (79471) 2011-07-12 05:10:05
#12 Daniel Fretwell (fretty) 100 (30107) 2011-07-31 11:19:15
#13 Viktor (Veselovský) 100 (153262) 2011-08-13 01:21:56
#14 J. M. (jomandi) 100 (113270) 2011-09-20 23:12:09
#15 Nathan (Witten) 100 (25326) 2011-12-13 01:34:23
#16 Bart den Hartog (Bart13) 100 (139176) 2012-01-31 00:55:43
#17 John (Tiger) 100 (1505) 2012-02-20 21:51:02
#18 bubba gump (surrenderyourworld) 100 (925) 2012-04-08 23:31:45
#19 Kurt Gebauer (Yokozuna) 100 (175433) 2012-06-01 01:34:30
#20 Michel Van Caneghem (vancan) 100 (49719) 2012-06-14 16:48:33
#21 Luigi Tomelli (archstanton) 100 (108345) 2012-06-16 17:48:12
#22 Dusan (xxdradus) 100 (40236) 2012-07-12 14:26:20
#23 E.T (Ertheb) 100 (81809) 2012-09-27 19:44:24
#24 Michael Möller (michaelm) 100 (175129) 2012-11-14 17:33:28
#25 Snake (snk) 100 (79889) 2013-01-28 18:13:10
#26 Ramon Rojas (superme) 100 (3409) 2013-04-05 03:01:38
#27 swarmspider (swarmspider) 100 (4528) 2013-04-22 14:50:11
#28 RPH (derichard) 100 (27044) 2013-05-13 21:32:26
#29 George Lasry (george4096) 100 (299488) 2013-08-18 00:47:53
#30 zahir mohsen moradi (ariobarzan) 100 (99757) 2013-08-27 16:00:21
#31 Em Doulgerakis (Greko) 100 (124033) 2013-10-04 18:02:20
#32 chris_3stones (3stones) 100 (37759) 2013-10-05 21:46:00
#33 George (Theofanidis) 100 (110784) 2013-10-06 21:02:37
#34 H. Lautenschlager (helmi) 100 (32947) 2013-10-15 19:04:19
#35 Norbert Paefgen (egebamyasi) 100 (2728) 2013-12-01 17:16:49
#36 Jim Gillogly (Scryer) 100 (21260) 2013-12-02 08:18:08
#37 Francisco Moraes (fmoraes) 100 (90044) 2013-12-11 15:34:26
#38 Alain (Integral) 100 (207924) 2013-12-15 18:07:05
#39 cworstell (ace2) 100 (4870) 2013-12-20 15:17:44
#40 Marcel (bene1512) 100 (20896) 2014-02-02 01:08:47
#41 Sascha (The Hoddich) 100 (4350) 2014-03-06 15:15:53
#42 mark (FivePrime) 100 (3345) 2014-03-21 17:21:25
#43 Stefan Vahlsten Öhlin (goomba) 100 (200) 2014-05-10 13:27:16
#44 julius gaius (julius) 100 (25581) 2014-07-29 16:35:57
#45 Robert (rm) 100 (56475) 2014-07-31 22:48:20
#46 jej (stationz) 100 (4939) 2014-11-08 21:24:19
#47 Tim Fink (Magellan) 100 (4876) 2014-11-16 12:32:09
#48 Pavel (haw) 100 (22728) 2014-12-07 22:44:33
#49 Julia Bernotat (El Greco ) 100 (81129) 2014-12-21 21:45:26
#50 Claude Vaillancourt (Cl3v3r) 100 (38351) 2014-12-26 18:50:37
#51 Danny Higgins (hamster147) 100 (34095) 2014-12-27 10:33:19
#52 Bertold (bk) 100 (9673) 2014-12-29 18:25:59
#53 S Combes (jerva) 100 (99132) 2015-01-19 22:47:34
#54 HolgerK (HolgerK) 100 (25776) 2015-01-27 20:40:39
#55 partamier (yann) 100 (5635) 2015-03-21 14:33:02
#56 Karl Schutt (günter) 100 (41550) 2015-04-17 20:24:18
#57 Andreas Frerichs (Ossili) 100 (33266) 2015-06-26 09:47:48
#58 Hans Joachim Girulat (joregi) 100 (36279) 2015-07-16 15:05:16
#59 J-L Morel (Rossignol) 100 (29425) 2015-07-28 08:41:44
#60 Tradecraft (Tradecraft) 100 (5540) 2015-08-04 14:11:08
#61 Rainer Zufall (kiekuk) 100 (56786) 2015-10-04 17:41:36
#62 Szabó Zoltán (szabo.z87) 100 (55604) 2015-11-10 13:19:19
#63 Alain Collignon (vexilla72) 100 (87833) 2015-11-13 07:37:47
#64 Lane Williams (planetlane) 100 (23948) 2015-12-28 01:17:09
#65 Marc (rcll0891) 100 (24004) 2016-01-12 22:06:41
#66 Norbert Biermann (Norbert) 100 (45031) 2016-07-12 10:45:43
#67 Bernhard Gruber (bgr) 100 (22889) 2016-07-28 15:56:57
#68 Nicolas (nicosPavlov) 100 (151166) 2016-10-07 16:44:16
#69 Michael (FoM) 100 (38953) 2016-12-31 00:17:03
#70 zuben c3 (zuben-c3) 100 (24853) 2017-01-09 14:52:32
#71 Dominik M. (Sgt. Pepper) 100 (97919) 2017-03-31 22:04:05
#72 chris (c2) 100 (51973) 2017-04-24 15:19:50
#73 Mir Dim (mir0soft) 100 (72404) 2017-05-20 08:58:06
#74 D3d4lu5 (D3d4lu5) 100 (297709) 2017-06-22 10:31:32
#75 Handreo (handreoc) 100 (100) 2017-06-24 02:28:33
#76 Peter (Garnet) 100 (14234) 2017-07-01 15:43:36
#77 Kim H. S. (tenchijin) 100 (25468) 2017-08-27 15:20:58
#78 andy (drandika) 100 (500) 2018-01-18 11:17:00
#79 Nofre Tete (noffi) 100 (21921) 2018-01-25 19:53:42
#80 Sebastian Slupina (Grandwizard) 100 (10866) 2018-02-15 18:26:39
#81 Thomas (Thomas4897) 100 (16596) 2018-03-28 17:48:14
#82 micaman (micaman) 100 (4634) 2018-05-11 17:41:05
#83 Eric (ExAstris) 100 (26990) 2018-05-22 02:33:17
#84 Julian (Lemmynator) 100 (16666) 2018-08-11 00:34:15
#85 Random Dude (rnd) 100 (90929) 2018-09-23 17:07:56
#86 sarah b (silva) 100 (23218) 2019-01-01 11:40:50
#87 madness (madness) 100 (15407) 2019-02-11 07:45:59
#88 Mort (mbrumm) 100 (700) 2019-03-10 23:53:42
#89 Mike (RogueRamblers) 100 (26411) 2019-03-11 18:54:27
#90 Klaus (kumaus) 100 (21415) 2019-04-10 12:36:54
#91 Hughes (hughes) 100 (7925) 2019-05-12 16:57:50
#92 Jeff (Fountain) 100 (8788) 2019-06-13 23:13:07
#93 Stephan (Stephje1978) 100 (26762) 2019-07-20 13:12:48
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:10 - 26.08.2019] D3d4lu5 solved the Level II challenge 'A Cloaked Substitution Cipher — Part 2'    +++    [23:35 - 25.08.2019] Stephje1978 solved the Level I challenge 'New Year's Greetings — Part 2'    +++    [23:20 - 25.08.2019] Stephje1978 solved the Level I challenge 'New Year's Greetings — Part 1'    +++    [22:14 - 25.08.2019] Stephje1978 solved the Level I challenge 'News from Castle Mansfeld'    +++    [09:32 - 25.08.2019] zhuanwancaishi solved the Level II challenge 'AES key — encoded in the machine readable zone of a European ePassport'    +++