Powered by the CrypTool project

© 2009-2026 MysteryTwister

Contact | Legal Notice | Privacy

 Challenge list
LevelNameSolves
1Heartbleed — Part 190
1A hidden word — Part 2144
1A modified homophonic cipher with reduced alphabets — Part 2376
1ADFGVX — Part 1136
1ADFGVX — Part 2141
1An Invisible Message73
1Advent-Challenge — Part 1622
1Beaver Code1387
1Alberti Challenge — Part 1195
1Autokey Cipher244
1ECDH-Key Exchange for Beginners114
1Cryptanalysis Hacking Puzzles — Part 143
1An 'unhearable' message46
1Caesar Encryption1664
1Cryptanalysis Hacking Puzzles — Part 2268
1Double Columnar Transposition133
1Enigma Messages with Repeated Letters — Part 495
1Enigma Messages98
1Enigma Messages with Repeated Letters — Part 2104
1Find the right route — Part 346
1Grille Cipher556
1Classical Ciphers^3206
1Enigma Combinatorics122
1How do you become a big cryptographer?260
1Enigma Messages with Repeated Letters — Part 596
1Image Noise203
1Hill Cipher with Sudoku Key123
1Number Sequence — Part 4970
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
1Factorization Cipher — Part 1567
2Alberti Challenge — Part 213
1Modular Sequences109
1Find the right route — Part 248
1Modified Caesar Cipher265
1New Year's Greetings — Part 257
1Number Sequence — Part 10152
1Heartbleed — Part 260
1Multilingual Monoalphabetic Substitution90
1Kaskade-S/T — Part 1120
1¿No Hablas Español? No problemo!195
1Number Sequence4918
1News from Castle Mansfeld64
1Number Sequence — Part 31179
1Letter to the Templars — Part 2931
1Original Caesar Cipher3536
1Pigpen with a twist — Part 1170
1Playfair Encryption144
1Number Sequence — Part 9153
2AES ECB Wrong Encoding29
1Recycled One-Time Pad81
1Strange Message from Thessaloniki54
2Wheatstone Cryptograph — Part 220
1Reserve Hand Procedure — Part 1210
1Molehunt (Part 2/3)163
1Snow White and the seven dwarfs325
1Lightweight Introduction to Lattices — Part 172
1The Syllabary Cipher – Part 1359
1Turing Bombe Enigma I86
1Wheatstone Cryptograph — Part 1138
2Advent-Challenge — Part 267
1Music Code — Part 145
1Lightweight Introduction to Lattices — Part 250
2Advent Challenge — Part 453
2ASAC — A Strong(er) ADFGVX Cipher — Part 121
1Monoalphabetic Substitution596
1M-138 — Part 1253
1Number Sequence — Part 22422
2Alice's Birthday Party (Part 1)351
1Merkle-Hellman Knapsack Challenge - Part 1106
2BCR code (Book-Caesar-RSA)82
1Nils away on travel198
2Bigram Substitution – Part 28
1Monoalphabetic substitution with camouflage — Part 455
1Number Sequence — Part 7114
2Cascading Encryption — Part 3/316
2Lattice Part 136
1New Year's Greetings — Part 167
1Number Sequence — Part 8483
2Homophonic Encryption — Part 346
2Double-Column Transposition/Granit — Part 20
2Double Column Transposition — Part 135
3RSA Factoring Challenge: RSA-3400
2RSA Factoring Challenge: RSA-23040
2The Fialka Challenge – Part 17
2Enigma Part 299
2Merkle-Hellman Knapsack Challenge — Part 218
2Brute-Force-Attack on Triple-DES with Reduced Key Space251
2Handycipher made in love — Part 225
2Handycipher made in love — Part 131
2Not-so-Secret Message from Malawi — Part I (RSA)223
1The Last Note116
2Heartbleed — Part 333
2Kaskade-S/T — Part 339
1Trifid Cipher145
2A Cloaked Substitution Cipher — Part 224
XUnknown Author2
2Hybrid Encryption I195
2Advent Challenge — Part 357
2AES key — encoded in the machine readable zone of a European ePassport94
2Keyshanc — Part 243
2Partial Key Exposure with RSA — Part 1114
2Akelarre Part 111
2SIGABA CSP-889 — Part 12
2Monoalphabetic substitution with camouflage — Part 259
2Monoalphabetic substitution with camouflage — Part 355
2Monoalphabetic Substitution with Nostradamus Flavor45
2Spirale — Part 28
2Breaking a Filter Generator24
3RSA Factoring Challenge: RSA-3600
2The SIGABA Challenge — Part 210
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2Pigpen with a twist — Part 250
2Pigpen with a twist — Part 349
3RSA Factoring Challenge: RSA-4600
2RSA Factoring Challenge: RSA-21064
2Weakened ElsieFour — Part 21
2PX-1000 Encryption – Part 111
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
3Extended Handycipher — Part 63
2The Lady Liz Challenge0
2The T52 Sturgeon Challenge — Part 220
2RSA: Two different keys — same ciphertext168
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-20480
2Spirale — Part 36
2Weakened Handycipher — Part 47
2Weakened Handycipher — Part 57
2The Fialka Challenge – Part 26
2The Hutton Cipher – Part 44
3A Heavy SZ42 Challenge – Part 140
XThe Vatican Challenge — Part 41
2The Hutton Cipher – Part 34
1A hidden word992
1Number Sequence — Part 5134
3RSA Factoring Challenge: RSA-3100
2"The Road" — Part 110
1A modified homophonic cipher with reduced alphabets — Part 1433
2Double Column Transposition — Part 250
3RSA Factoring Challenge: RSA-2900
2The Syllabary Cipher – Part 325
2The Syllabary Cipher – Part 416
2Typex — Part 225
2Double Column Transposition — Part 342
2Double Column Transposition — Part 457
2The SZ42 Challenge — Part 1211
2Double Column Transposition — Part 512
2The SZ42 Challenge — Part 114
2Unconcealed RSA messages57
2Elliptic Boogaloo – Part 15
2Extended Handycipher — Part 14
2Extended Handycipher — Part 24
2The SZ42 Challenge — Part 615
2Factorization Cipher — Part 2160
2Fastest in the West42
2The SZ42 Challenge — Part 914
2Alice's Birthday Party (Part 2)350
3The Heavy T52 Sturgeon Challenge — Part 93
2Handycipher — Part 101
1Affine Codes / Modulo Arithmetic with N / Extended Euclid668
2Extended Handycipher — Part 34
2Trendy Messenger40
2Hill Cipher15
3RSA Factoring Challenge: RSA-3500
2A really long number sequence129
2Cipher ID — Part 120
3Digital Signatures: DSA with Medium Fields0
2Hilly — Part 19
2Hilly — Part 21
2ORYX Stream Cipher Part II50
2Holographic Encryption — Part 23
3RSA Factoring Challenge: RSA-6170
2Differential Cryptanalysis — Part 25
3Handycipher — Part 66
3Elliptic Boogaloo – Part 34
3The Heavy T52 Sturgeon Challenge — Part 46
1Cascading Encryption — Part 1/384
2Kaskade-S/T — Part 259
2The Fialka Challenge – Part 36
2The T52 Sturgeon Challenge — Part 414
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
2Weakened ElsieFour — Part 16
3ORYX Stream Cipher — Part 4c0
2RSA Factoring Challenge: RSA-22047
2Keyshanc — Part 153
2Holographic Encryption — Part 18
2ORYX Stream Cipher Part I83
XDorabella0
3Elliptic Boogaloo – Part 24
2Letter to the Templars — Part 3778
2Lightweight Introduction to Lattices — Part 341
2M-138 — Part 2152
3RSA Factoring Challenge: RSA-10240
2Modified Vigenère Cipher15
2New Year's Greetings — Part 518
3RSA Factoring Challenge: RSA-4400
2Not-so-Secret Message from Malawi — Part II (ECC)45
2The SZ42 Challenge — Part 317
3RSA Factoring Challenge: RSA-5000
2The SZ42 Challenge — Part 107
3RSA Factoring Challenge: RSA-4900
2The SZ42 Challenge — Part 714
2The T52 Sturgeon Challenge — Part 121
3SIGABA CSP-889 — Part 32
2M-138 — Part 435
3Substitution Cipher with Non-Prefix Codes1
3The Heavy T52 Sturgeon Challenge — Part 24
2Cascading Encryption — Part 2/325
3Spirale — Part 40
3The Heavy T52 Sturgeon Challenge — Part 13
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 710
3The Heavy T52 Sturgeon Challenge — Part 57
2ORYX Stream Cipher — Part 4a12
2Polyhomophonic Substitution — Part 235
XConcealed Messages — Vigenère's Night Sky16
XD'Agapeyeff0
3RSA Factoring Challenge: RSA-3000
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2Polyhomophonic Substitution — Part 321
2Polyphonic Substitution Cipher — Part 127
2Weakened Handycipher — Part 216
XThe Vatican Challenge — Part 30
1A disguised code95
2Sigaba Part 118
XTwelve-Year-Old Murder Case0
2The T52 Sturgeon Challenge — Part 58
3CMEA 230
2The Josse Challenge – Part 118
2The T52 Sturgeon Challenge — Part 78
1Letter from the Alleged Countess Julie von Ortenburg188
2The T52 Sturgeon Challenge — Part 811
2Purple 122
1Molehunt (Part 1/3)174
1New Year's Greetings — Part 353
2SIGABA CSP-2900 — Part 22
1Number Sequence — Part 6198
1Playfair with hints about the grid135
2Twisting the Rubik's Cube10
2SIGABA CSP-2900 — Part 12
1Weakened Granit — Part 155
1Zodiac Cipher114
2SIGABA CSP-889 — Part 22
2Summer Job69
2The T52 Sturgeon Challenge — Part 99
2CMEA 148
2Double-Column Transposition/Granit — Part 30
2Enigma Part 1139
2Spanish Strip Cipher — Part 138
2Factorization Cipher — Part 3103
2Spanish Strip Cipher — Part 235
2The Einstein Enigma69
3RSA Factoring Challenge: RSA-3900
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
2Weakened Granit — Part 20
3RSA Factoring Challenge: RSA-3090
2Monoalphabetic Substitution with Camouflage — Part 536
2M-138 — Part 372
2Molehunt (Part 3/3)93
2Music Code — Part 244
2Polyphonic Substitution Cipher — Part 225
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4300
2The Hutton Cipher – Part 50
2The SZ42 Challenge — Part 220
XThe Vatican Challenge — Part 23
2The Josse Challenge – Part 218
2The SZ42 Challenge — Part 120
2Unusual encryption using a diophantine equation71
2The T52 Sturgeon Challenge — Part 68
2Typex — Part 131
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2"The Road" — Part 30
3Double Column Transposition Reloaded — Part 20
1Bigram Substitution – Part 1 (Tutorial)71
1Monoalphabetic substitution with camouflage — Part 174
3Handycipher — Part 38
3Handycipher — Part 72
3RSA with Special d26
3RSA Factoring Challenge: RSA-25028
XKryptos0
1Assembly Point – Part 10
2The Syllabary Cipher – Part 239
2The SZ42 Challenge — Part 1310
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
3RSA Factoring Challenge: RSA-3300
1From Russia with Love333
1Letter to the Templars — Part 11162
2The SZ42 Challenge — Part 418
1One-Time Pad with Flaws337
1Polyhomophonic Substitution — Part 165
3The Heavy T52 Sturgeon Challenge — Part 33
2The T52 Sturgeon Challenge — Part 109
XBeale Ciphers1
XDouble Column Transposition2
3Vinaigrette Signature Scheme5
3The SIGABA Challenge — Part 52
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1107
3ElsieFour — Part 14
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-2700
2Homophonic Encryption — Part 154
3ORYX Stream Cipher — Part 4b2
2Homophonic Encryption — Part 248
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-4000
2ORYX Stream Cipher — Part 3 (revised)31
2The Hutton Cipher – Part 229
3RSA Factoring Challenge: RSA-4700
XThe Vatican Challenge — Part 50
2The Syllabary Cipher – Part 516
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 213
1Enigma Messages with Repeated Letters — Part 1208
2The SZ42 Challenge — Part 815
1Find the right route — Part 1119
3World Record Challenge: Break 65 Bits of AES0
2RSA Factoring Challenge: RSA-70469
2Weakened Handycipher — Part 316
2The Hutton Cipher – Part 128
2Weakened Granit — Part 30
2The SIGABA Challenge — Part 113
3Extended Handycipher — Part 54
3Handycipher — Part 56
3Double Column Transposition Reloaded — Part 30
2A Cloaked Substitution Cipher — Part 125
3RSA Factoring Challenge: RSA-2800
3Extended Handycipher — Part 44
2Weakened ElsieFour — Part 34
1A Secret Message from Castle Mansfeld139
3RSA Factoring Challenge: RSA-23229
3ORYX Stream Cipher — Part 4d0
2Weakened Handycipher — Part 118
1Enigma Messages with Repeated Letters — Part 3103
3The SIGABA Challenge — Part 61
1New Year's Greetings — Part 451
3Double Column Transposition Reloaded — Part 10
3Handycipher — Part 45
3RSA Factoring Challenge: RSA-3200
1The Book Code: A Challenge for Bookworms169
2Broadcasting and low exponent — RSA Attack265
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-4500
2Flawed Usage of a OTP Cipher by the BND21
2Cracking SHA1-Hashed Passwords678
2Double-Column Transposition/Granit — Part 10
2Homophonic Encryption — Part 445
3RSA Factoring Challenge: RSA-8960
3SIGABA CSP-2900 — Part 32
XNotes of an Italian Soldier4
2Spirale — Part 18
XSpanish Strip Cipher — Part 30
2Smartcard RSA83
2The Josse Challenge – Part 315
2The LoRa Cipher: Logic Randomness — Part 130
2Weakened Handycipher — Part 67
3Handycipher — Part 93
3RSA Factoring Challenge: RSA-2600
3Sigaba Part 25
3The Heavy T52 Sturgeon Challenge — Part 80
3The SIGABA Challenge — Part 36
XThe Vatican Challenge — Part 13
3Handycipher — Part 83
2Handycipher — Part 29
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Handycipher — Part 17
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme50
2Monoalphabetic Substitution with Camouflage — Part 62
2"The Road" — Part 22
2The SZ42 Challenge — Part 517
2The T52 Sturgeon Challenge — Part 316
XKu Klux Klan44
XThe third ENIGMA M4 message0
3RSA Factoring Challenge: RSA-4800
3The SIGABA Challenge — Part 45