MysteryTwister C3

Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.


Exzellenzcluster CASA – Cyber Security in the Age of Large-Scale Adversaries

Innovative, holistic, internationally unique: CASA - Cyber Security in the Age of Large-Scale Adversaries - is the home for cutting-edge IT security research. In a highly interdisciplinary approach, outstanding scientists investigate not only technical questions but also the interaction of human behavior and IT security - and thus develop strong countermeasures against powerful cyber-attacks.

Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy - EXC 2092 CASA - 390781972.

CITS - Institute for Cryptology and IT Security - Ruhr-University Bochum

The main area of research is cryptology and its applications to IT security. The CITS chair is part of the Horst Görtz Institute for IT Security and involved in the degree programmes in IT security at the University of Bochum.

Contact person: This email address is being protected from spambots. You need JavaScript enabled to view it.

CODE Research Institute

The research institute CODE at the University of the Federal Armed Forces in Munich networks experts for cyber security from research, the military, business, industry, public authorities, and associations.

University of Kassel

As a contributor to the CrypTool project is Prof. Dr. Arno Wacker responsible for CrypTool 2 and additionally takes care of the CrypTool-Server. Prof. Wacker was the lead of the department Applied Information Security.

Distributed Systems Research Group - University of Duisburg-Essen

The Distributed Systems research group at the University of Duisburg-Essen is headed by Prof. Torben Weis. The group was established in 2007 and belongs to the department of Computational and Cognitive Sciences (Informatik und angewandte Kognitionswissenschaft, INKO). Research areas include peer-to-peer systems, security in computer networks, context-aware applications, distributed systems design and model-driven software development.

We put special emphasis on the practical applicability of our research results. One of our projects is coordinating the development of the open-source software CrypTool 2. The goal of this project is to improve the teaching of security and cryptography. We have been using CrypTool 2 across all levels of education with great success. We want to continue to increase the public awareness of cryptography, because its applications are of utmost importance in the digital world, although most users remain unaware of how cryptography works and fits into the scheme of computer security. For the very same reasons we support MTC3. Solving one of these challenges will heighten the awareness of the security (or insecurity) of the algorithms involved in the challenge beyond any means of theoretical learning and understanding.

ECRYPT II - European Network of Excellence for Cryptology II

ECRYPT II stands for "European Network of Excellence for Cryptology II". It is a network project funded by the European Commission.

ECRYPT II started on 1 August 2008 and lasts 4 years. ECRYPT II focuses on cryptology, which is the science that studies mathematical techniques in order to provide secrecy, authenticity and related properties for digital information. Its objective is to increase the collaboration of European researchers in information security. In order to reach this goal, 11 partners work together within three virtual labs focusing on symmetric key algorithms (SymLab), public key algorithms and protocols (MAYA), and hardware and software implementations (VAMPIRE). They will be joined by more than 20 associate members to the network who will closely collaborate with the core partners.

ECRYPT II plans to organize joint workshops, exchange of researchers and students, development of common tools and benchmarks and a website and forum which will be a focal point for the network and the wider cryptographic community. Spreading activities will include a training program, a substantial contribution towards standardization, bodies and an active publication policy. The project team has the critical mass and breadth to address the key questions in these areas.

Contact person: This email address is being protected from spambots. You need JavaScript enabled to view it.


Prof. Stamp of the Computer Science Department San José State University

Mark Stamp can neither confirm nor deny that he spent seven years as a National Security Agency cryptanalyst. However, he can confirm that he spent two years as Chief Cryptologic Scientist at a small Silicon Valley startup. Since 2002 he has been a Professor in the Department of Computer Science at San Jose State University, where he teaches courses in information security. He has published a substantial number of research papers and two textbooks. His second textbook, Applied Cryptanalysis: Breaking Ciphers in the Real World (Wiley-IEEE Press, 2007) was the inspiration for several challenges problems posted here.

powered by the CrypTool project  CrypTool


   +++    [21:27 - 24.10.2021] mikinsget solved the Level I challenge 'One-Time Pad with Flaws'    +++    [15:29 - 24.10.2021] Jericho solved the Level I challenge 'Nils away on travel'    +++    [10:32 - 24.10.2021] jerva solved the Level II challenge 'The SZ42 Challenge — Part 13'    +++    [02:01 - 24.10.2021] Jet Sam solved the Level I challenge 'Caesar Encryption'    +++    [00:30 - 24.10.2021] Jet Sam solved the Level I challenge 'Number Sequence — Part 2'    +++