All Challenges
Description
Ready for the third Elliptic Boogaloo? In this challenge, we dance on elliptical curves and try to forge digital signatures. But some hints went missing. However, a nasty encryption algorithm prevents us from putting the necessary pieces of the puzzle together. Can you still manage to forge a signature? Show details…Hide details…
Author
newton
Publication
March 9, 2024, 9:48 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Ready for the second Elliptic Boogaloo? In this challenge, we dance on elliptical curves and try to forge digital signatures. But some hints went missing. Can you still forge a signature? Show details…Hide details…
Author
newton
Publication
Jan. 15, 2024, 9:04 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Ready for the Elliptic Boogaloo? In this challenge, we dance on elliptic curves and try to forge digital signatures. Show details…Hide details…
Author
newton
Publication
Nov. 27, 2023, 3:02 p.m.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This challenge is a puzzle about a mysterious ciphertext, which is also protected by a clever disguise. Can you crack it? Show details…Hide details…
Author
M. Mertens
Publication
Oct. 31, 2023, 9:23 a.m.
22 users have already solved this challenge, 40 are working on it.
You need to be logged in to solve this challenge.
Description
An English plaintext of length 4272 was encrypted with the Hutton cipher, a pen-and-paper cipher from 2018. The length of the two passwords is also known. Can you successfully perform a ciphertext-only attack? Show details…Hide details…
Author
Eric Bond Hutton
Publication
Oct. 16, 2023, 11:04 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher from 2018. Can you crack the ciphertext? Show details…Hide details…
Author
Eric Bond Hutton
Publication
Sept. 6, 2023, 10:45 a.m.
4 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher from 2018. Can you crack the ciphertext? Show details…Hide details…
Author
Eric Bond Hutton
Publication
July 21, 2023, 11:05 a.m.
4 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher that has baffled cryptographers since 2018. Can you reconstruct the keywords used? Show details…Hide details…
Author
Eric Bond Hutton
Publication
June 5, 2023, 2:19 p.m.
20 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Unlock the secrets of the Hutton cipher, a pen-and-paper cipher that has baffled cryptographers since 2018. Can you crack the ciphertext? Show details…Hide details…
Author
Eric Bond Hutton
Publication
May 2, 2023, 4:02 p.m.
19 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts. Show details…Hide details…
Author
Nils Kopal
Publication
March 27, 2023, 10:05 a.m.
13 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts. Show details…Hide details…
Author
Nils Kopal
Publication
Feb. 25, 2023, 1:27 a.m.
15 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Josse cipher is a polyalphabetic cipher from the time of the Franco-Prussian War. Its description was lost. It was only rediscovered and published in 2020. In these challenges you are to decipher several, increasingly shorter ciphertexts. Show details…Hide details…
Author
Nils Kopal
Publication
Feb. 10, 2023, 8:47 a.m.
15 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the fourteenth challenge in a series of 16 level-3 challenges with the SZ42. In this "Breaking" challenge you are only provided with one ciphertext. Can you find the MU-, CHI-, and PSI wheel patterns and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Dec. 30, 2022, 12:51 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Syllabary cipher seems to be just another substitution cipher. This time, the table got mixed up. Is a solution even possible? Find it out! Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 28, 2022, 1:32 p.m.
13 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! All keys went missing... Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 28, 2022, 1:31 p.m.
13 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! But this time, the table is weird... Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 28, 2022, 1:29 p.m.
20 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! A key got missing... Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 28, 2022, 1:27 p.m.
25 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
The Syllabary cipher seems to be just another substitution cipher, but is it? Find out and solve its mystery! Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 28, 2022, 1:24 p.m.
225 users have already solved this challenge, 34 are working on it.
You need to be logged in to solve this challenge.
Description
The legendary Merkle-Hellman Knapsack cryptosystem can also be used for public-key encryption. Is the cryptosystem secure or can you crack the ciphertext? Show details…Hide details…
Author
Peter Uelkes
Publication
Oct. 14, 2022, 5:28 p.m.
16 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The legendary Merkle-Hellman Knapsack cryptosystem is not suitable for hiking, but it is considered a pioneer of asymmetric cryptography.
Can you crack the ciphertext? Show details…Hide details…
Author
Peter Uelkes
Publication
Oct. 14, 2022, 5:22 p.m.
70 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.
Description
The historical Hill cipher uses matrix-vector multiplications to encrypt blocks
of letters. Can you find the inverse matrix and recover the plaintext? Show details…Hide details…
Author
Peter Uelkes
Publication
Sept. 4, 2022, 10:05 a.m.
12 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
A more difficult and even more interesting sequel to the "Alberti Challenge - Part 1".
Will you manage to crack this puzzle this time as well? Show details…Hide details…
Author
Peter Uelkes
Publication
May 14, 2022, 12:15 p.m.
loading…
Loading the list of solvers has failed. Please try again.
10 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge is about one of the oldest polyalphabetic ciphers.
Can you crack this centuries-old puzzle? Show details…Hide details…
Author
Peter Uelkes
Publication
March 26, 2022, 8:40 p.m.
loading…
Loading the list of solvers has failed. Please try again.
138 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.
Description
This cipher is a new take on the well-known Vigenère cipher. It has been
designed to fix its "brother's" weaknesses. Can you find another weakness? Show details…Hide details…
Author
Encrypted Puzzle
Publication
Jan. 24, 2022, 11:52 a.m.
loading…
Loading the list of solvers has failed. Please try again.
11 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the last challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and parts of the corresponding plaintext. Can you find the MU wheel patterns and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 6, 2021, 11:51 a.m.
8 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the twelfth challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and parts of the corresponding plaintext. Can you find the PSI wheel patterns and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 6, 2021, 11:47 a.m.
9 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 200 and 100 characters. Show details…Hide details…
Author
Nils Kopal
Publication
July 31, 2021, 6:03 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 270 and 120 characters. Show details…Hide details…
Author
Nils Kopal
Publication
July 31, 2021, 5:58 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-2900 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 320 and 120 characters. Show details…Hide details…
Author
Nils Kopal
Publication
July 31, 2021, 5:47 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 200 and 100 characters. Show details…Hide details…
Author
Nils Kopal
Publication
June 1, 2021, 1:45 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 270 and 120 characters. Show details…Hide details…
Author
Nils Kopal
Publication
June 1, 2021, 1:35 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA CSP-889 was a highly secure encryption machine used by the US for strategic communication in WWII. In this series of challenges, you are provided with a ciphertext and a partially-known plaintext, here with the length of 320 and 120 characters.
Update June 2021: We replaced the used key (and this changed the ciphertext) since a part of the previous used key was leaked in the newest SIGABA template of CrypTool 2. Show details…Hide details…
Author
Nils Kopal
Publication
June 1, 2021, 1:18 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Wheatstone Cryptograph is a simple device that resembles a clock with two hands. For each hand there is a ring of symbols. In this challenge the key is a random permutation of the english alphabet. Are you able to decrypt the given ciphertext? Show details…Hide details…
Author
madness
Publication
May 21, 2021, 3:10 p.m.
loading…
Loading the list of solvers has failed. Please try again.
15 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Wheatstone Cryptograph is a simple device that resembles a clock with two hands. For each hand there is a ring of symbols.
Are you able to decrypt the given ciphertext? Show details…Hide details…
Author
madness
Publication
April 21, 2021, 7:17 p.m.
loading…
Loading the list of solvers has failed. Please try again.
106 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the eleventh challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and the corresponding plaintext. Can you find the wheel patterns? Show details…Hide details…
Author
Nils Kopal
Publication
Jan. 30, 2021, 3:48 p.m.
4 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the tenth challenge in a series of 13 level-2 challenges with the SZ42. In this "key breaking" challenge you are provided with one ciphertext and the corresponding plaintext. Can you find the wheel patterns?
Update January 2021: The starting positions for the CHI wheels were added.
Show details…Hide details…
Author
Nils Kopal
Publication
Jan. 30, 2021, 3:40 p.m.
5 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given three grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 26, 2020, 6:24 p.m.
33 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given four grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 19, 2020, 4:53 p.m.
35 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the ninth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI wheels. Can you find the starting positions for both the MU and PSI wheels and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Dec. 19, 2020, 4:31 p.m.
13 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the eighth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI and PSI wheels. Can you find the starting positions for the MU wheels and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 31, 2020, 4:06 p.m.
14 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given two grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Oct. 27, 2020, 5:01 p.m.
95 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the seventh challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext; the patterns for all the wheels are known as well as the starting positions for the CHI and MU wheels. Can you find the starting positions for the PSI wheels and decrypt the ciphertext? Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 27, 2020, 4:54 p.m.
13 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the sixth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for all five CHI wheels are known. Can you find the starting positions for the five CHI wheels? Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 2, 2020, 8:09 p.m.
14 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the fifth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for CHI1 and CHI2 wheels are known. Can you find the starting positions for CHI1 and CHI2? Show details…Hide details…
Author
Nils Kopal
Publication
Sept. 3, 2020, 1:25 p.m.
16 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the fourth challenge in a series of 13 level-2 challenges with the SZ42. In this "setting" challenge you are provided with only one ciphertext and the patterns for CHI1 and CHI2 wheels are known. Can you find the starting positions for CHI1 and CHI2? Show details…Hide details…
Author
Nils Kopal
Publication
Aug. 29, 2020, 11:25 p.m.
16 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the third challenge in a series of 13 level-2 challenges with the SZ42. Here, you are provided with 2 in-depth ciphertexts and a limitation is used. Can you recover the plaintexts? Show details…Hide details…
Author
Nils Kopal
Publication
Aug. 15, 2020, 9:26 p.m.
16 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the second challenge in a series of 13 level-2 challenges with the SZ42. Here, you are provided with 4 in-depth ciphertexts and a limitation is used. Can you recover the plaintexts? Show details…Hide details…
Author
Nils Kopal
Publication
Aug. 5, 2020, 3:44 p.m.
18 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Lorenz SZ42, codenamed Tunny, was a German teleprinter encryption device used during WW2. This is the first challenge in a series of 13 Level-2 challenges with the SZ42. Here, you are provided with 8 in-depth ciphertexts. Can you recover the plaintexts? Show details…Hide details…
Author
Nils Kopal
Publication
July 22, 2020, 11:20 p.m.
19 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This is part 3 of the challenge series about lattice-based cryptography schemes. This challenge introduces an encryption scheme which uses systems of linear equations. Can you decrypt a message without knowing the key? Show details…Hide details…
Authors
Miroslav Dimitrov,
Bernhard Esslinger
Publication
July 16, 2020, 12:58 p.m.
loading…
Loading the list of solvers has failed. Please try again.
37 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Lattice-based cryptography schemes are relevant for current post-quantum cryptography research. This challenge series accompanies the basic theory from a chapter of the CrypTool Book called "LIGHTWEIGHT INTRODUCTION TO LATTICES". This part of the challenge series uses vectors to hide a famous quote in modern art. Can you reveal it? Show details…Hide details…
Authors
Miroslav Dimitrov,
Bernhard Esslinger
Publication
June 23, 2020, 11:05 p.m.
loading…
Loading the list of solvers has failed. Please try again.
44 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
Lattice-based cryptography schemes are relevant for current post-quantum cryptography research. This challenge series accompanies the basic theory from a chapter of the CrypTool Book called "LIGHTWEIGHT INTRODUCTION TO LATTICES". In this part of the challenge series we introduce systems of linear equations to find a hidden message in a picture. Show details…Hide details…
Authors
Miroslav Dimitrov,
Bernhard Esslinger
Publication
May 16, 2020, 4:03 p.m.
loading…
Loading the list of solvers has failed. Please try again.
61 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52E ciphertext and a crib. The key is partially known. Show details…Hide details…
Author
Nils Kopal
Publication
April 30, 2020, 1:03 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52D ciphertext and a crib. The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
April 24, 2020, 4:56 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52AB ciphertext and a crib. The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
April 23, 2020, 12:30 p.m.
7 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from a T52D ciphertext and a crib. The key is partially known. Show details…Hide details…
Author
Nils Kopal
Publication
April 22, 2020, 3:06 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from T52D ciphertexts "in-depth". You are also provided with cribs for each message. The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
April 21, 2020, 12:33 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from T52E ciphertexts "in-depth". You are also provided with cribs for each message. The key is partially known. Show details…Hide details…
Author
Nils Kopal
Publication
April 15, 2020, 1:24 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This part of the challenge series introduces polyhomophonic substitution. In a polyhomophonic substitution cipher, each ciphertext symbol can represent one of several plaintext symbols, and each plaintext letter can be encrypted as one of several ciphertext letters. The key is a mapping from the set of plaintext symbols to the set of ciphertext symbols. Show details…Hide details…
Author
madness
Publication
April 6, 2020, 8:44 p.m.
loading…
Loading the list of solvers has failed. Please try again.
18 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first five parts of this series of challenges, you are provided with a partial known-plaintext. However, in this part you get no information about the key. Show details…Hide details…
Author
George Lasry
Publication
April 5, 2020, 6:47 p.m.
1 user has already solved this challenge.
You need to be logged in to solve this challenge.
Description
This part of the challenge series is a warm-up with polyphonic substitution. In a polyphonic substitution cipher, more than one plaintext letter are encrypted to the same ciphertext symbol. The key is a mapping from the set of plaintext symbols to the set of ciphertext symbols. Show details…Hide details…
Author
madness
Publication
March 28, 2020, 3:09 p.m.
loading…
Loading the list of solvers has failed. Please try again.
29 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first four parts of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key. Show details…Hide details…
Author
George Lasry
Publication
March 26, 2020, 1:03 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This part of the challenge series is a warm-up with homophonic substitution. In a homophonic substitution cipher, there are more than one ciphertext symbol for each plaintext symbol. The key is a mapping. Show details…Hide details…
Author
madness
Publication
March 22, 2020, 1:57 a.m.
loading…
Loading the list of solvers has failed. Please try again.
56 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in the first three parts of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key. Show details…Hide details…
Author
George Lasry
Publication
March 17, 2020, 8:15 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in part 1 and part 2 of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get even less information about the key. Show details…Hide details…
Author
George Lasry
Publication
March 11, 2020, 9:10 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. As in part 1 of this series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. However, in this part you get less information about the key. Show details…Hide details…
Author
George Lasry
Publication
March 5, 2020, 7:44 p.m.
9 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The SIGABA was a highly secure encryption machine used by the US for strategic communications in WWII. It is believed that the German codebreakers were unable to make any inroads against SIGABA. In this part of the series of challenges, you are provided with a partial known-plaintext, and some information about the key settings. Show details…Hide details…
Author
George Lasry
Publication
Feb. 29, 2020, 12:29 p.m.
10 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
LoRa calculates the ciphertext by using a logic expression as key. The ciphertext unusually contains large bitstreams too. Could you find the logic expression from a given ciphertext? Show details…Hide details…
Author
George Theofanidis
Publication
Feb. 19, 2020, 8:31 p.m.
28 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge series introduces in detail the handling of the differential cryptanalysis (DCA). In the first two challenges you have to decrypt encrypted images and enter the code shown in the images. The second challenge requires filtering. Show details…Hide details…
Authors
Nils Kopal,
Christian Bender
Publication
Jan. 28, 2020, 3:22 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This is part two of the two polyphonic cipher challenges, where again two or more plaintext letters correspond to one cipher symbol. Can you solve such a cipher? Show details…Hide details…
Author
S. Tomokiyo
Publication
Jan. 14, 2020, 3:20 p.m.
23 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge series introduces in detail the handling of the differential cryptanalysis (DCA). In the first two challenges you have to decrypt encrypted images and enter the code shown in the images. The first challenge needs no filtering, as only valid plaintext-ciphertext pairs are delivered. Show details…Hide details…
Authors
Nils Kopal,
Christian Bender
Publication
Dec. 22, 2019, 9:04 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
In a polyphonic cipher, two or more plaintext letters correspond to one ciphertext symbol. Show details…Hide details…
Author
S. Tomokiyo
Publication
Nov. 21, 2019, 1:18 p.m.
25 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Determine which type of classic cipher was used to generate each of 500 ciphertext messages. The ciphers used in this challenge are simple substitution, columnar transposition, Vigenère, Playfair, and Hill. Show details…Hide details…
Author
Mark Stamp
Publication
Nov. 19, 2019, noon
18 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52C ciphertext. The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 26, 2019, 6:50 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover a plaintext from one T52AB ciphertext. The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
Oct. 9, 2019, 12:36 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of new heavier challenges with T52. In this challenge, you need to recover the plaintexts from T52D ciphertexts "in-depth". The key is unknown. Show details…Hide details…
Author
Nils Kopal
Publication
Sept. 30, 2019, 5:57 p.m.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 2, the plaintext is first divided into two parts, then each part will be encrypted separately. Show details…Hide details…
Author
Bruce Kallick
Publication
Aug. 25, 2019, 7:26 p.m.
21 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Like the MONOALPHABETIC SUBSTITUTION WITH CAMOUFLAGE series of challenges, this two-part challenge considers a modification of the classic simple substitution cipher achieved by randomly introducing decoy characters into the ciphertext in encryption which are then ignored in decryption. In part 1, the cipher uses a key which devides the ciphertext alphabet into signal characters and noise characters. Show details…Hide details…
Author
Bruce Kallick
Publication
Aug. 21, 2019, 12:05 p.m.
22 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52ca ciphertext. The key is partially known. You are also provided with a crib. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:32 p.m.
9 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from a T52c ciphertext. The key is partially known. You are also provided with a crib. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:32 p.m.
9 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52ca. You are also provided with cribs for each message. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:32 p.m.
8 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52a/b. You are also provided with cribs for each message. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:31 p.m.
8 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from six "in-depth" ciphertexts built with T52c. The key is partially known. You are also provided with cribs for each message. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:31 p.m.
10 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from ten "in-depth" ciphertexts built with T52ca. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:30 p.m.
7 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from ten "in-depth" ciphertexts built with T52c. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:30 p.m.
7 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext from ten "in-depth" ciphertexts built with T52ab. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
Aug. 10, 2019, 5:30 p.m.
7 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
July 22, 2019, 11:20 p.m.
13 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52d ciphertext. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
July 22, 2019, 11:17 p.m.
15 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52c ciphertext. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
July 22, 2019, 11:15 p.m.
19 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Siemens and Halske T52 was a family of German teleprinter encryption devices used during WW2. This challenge is part of a series of challenges with T52. In this challenge, you need to recover the plaintext only from a T52ab ciphertext. The key is partially known. Show details…Hide details…
Author
George Lasry
Publication
July 13, 2019, 11:11 p.m.
20 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Vatican owns some encrypted manuscripts waiting for decryption. Can you find the solution for an archive manuscript from 1539-1548? Show details…Hide details…
Author
George Lasry
Publication
July 7, 2019, 8:50 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Vatican owns some encrypted manuscripts waiting for decryption. Can you find the solution for an archive manuscript from 1535/1536? Show details…Hide details…
Author
George Lasry
Publication
July 7, 2019, 8:46 p.m.
1 user has already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Vatican owns some encrypted manuscripts waiting for decryption. Can you find the solution for a message from 1721? Show details…Hide details…
Author
George Lasry
Publication
June 25, 2019, 5:14 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Handycipher is a low-tech stream cipher, simple enough to permit pen-and-paper encrypting and decrypting of messages, while providing a significantly high level of security. Handycipher was first published in 2014 and further improved in 2015 and 2016. Part 10 of the Handycipher series presents the same challenge as Part 9 but with a different key choice. It is a ciphertext-only challenge. Show details…Hide details…
Author
Bruce Kallick
Publication
June 25, 2019, 5:10 p.m.
1 user has already solved this challenge.
You need to be logged in to solve this challenge.
Description
Part 2 of the series "Handycipher made in love" is almost identical to Part 1 except that the solution you are asked for is the correct key that Alice used to produce the ciphertext rather than the short message embedded in the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
May 21, 2019, 4:47 p.m.
22 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 4 of this series we consider a distribution of the homophones based on English language statistics like in part 2, but the alphabet doesn't contain the blank. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext. Show details…Hide details…
Authors
Nils Kopal,
Bernhard Esslinger
Publication
May 8, 2019, 9:31 p.m.
37 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 3 of this series every plaintext symbol has the same number of possible substitutions like in part 1, but the alphabet doesn't contain the blank. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext. Show details…Hide details…
Authors
Nils Kopal,
Bernhard Esslinger
Publication
May 8, 2019, 9:30 p.m.
37 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 2 of this series we consider a distribution of the homophones based on English language statistics. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext. Show details…Hide details…
Authors
Nils Kopal,
Bernhard Esslinger
Publication
May 8, 2019, 9:30 p.m.
39 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Homophonic encryption is a modified version of the monoalphabetic substitution: One plaintext symbol can be substituted by more than one ciphertext symbol. In part 1 of this series every plaintext symbol has the same number of possible substitutions. This is a ciphertext-only challenge. Try to crack the ciphertext and extract a specific word from the plaintext. Show details…Hide details…
Authors
Nils Kopal,
Bernhard Esslinger
Publication
May 4, 2019, 3:22 p.m.
44 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Strange things happen when you're in love. This challenge is about how the plaintext can be revealed when Handycipher is used in a wrong way. Show details…Hide details…
Author
George Theofanidis
Publication
Feb. 16, 2019, 12:29 p.m.
28 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
What would Nostradamus do to make a mono-alphabetic substitution harder to break? Show details…Hide details…
Author
George Theofanidis
Publication
Feb. 16, 2019, 12:28 p.m.
loading…
Loading the list of solvers has failed. Please try again.
38 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
Solving this challenge is not as hard as finding the needle in a haystack, isn't it? Show details…Hide details…
Author
Joao Vaz Martins
Publication
Jan. 9, 2019, 2:10 p.m.
loading…
Loading the list of solvers has failed. Please try again.
212 users have already solved this challenge, 39 are working on it.
You need to be logged in to solve this challenge.
Description
Once upon a time, there was a three-part challenge which was inspired by Kryptos and is based on a fairy tale. Can you solve this mysterious challenge? Show details…Hide details…
Author
Marc Gutgesell
Publication
Dec. 8, 2018, 5:45 p.m.
0 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
Once upon a time, there was a three-part challenge which was inspired by Kryptos and is based on a fairy tale. Can you solve this mysterious challenge? Show details…Hide details…
Author
Marc Gutgesell
Publication
Dec. 8, 2018, 5:42 p.m.
loading…
Loading the list of solvers has failed. Please try again.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Once upon a time, there was a three-part challenge which was inspired by Kryptos and is based on a fairy tale. Can you solve this mysterious challenge? Show details…Hide details…
Author
Marc Gutgesell
Publication
Dec. 8, 2018, 5:27 p.m.
loading…
Loading the list of solvers has failed. Please try again.
9 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
On November 3rd, 1509, Catherine of Aragon wrote an encrypted letter to her father. What did she tell him? Show details…Hide details…
Author
S. Tomokiyo
Publication
Nov. 28, 2018, 3:42 p.m.
loading…
Loading the list of solvers has failed. Please try again.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Three messages were delivered — two encrypted, one in clear. Can you solve the puzzle? Show details…Hide details…
Author
Joao Vaz Martins
Publication
Oct. 26, 2018, 8:33 p.m.
loading…
Loading the list of solvers has failed. Please try again.
33 users have already solved this challenge, 42 are working on it.
You need to be logged in to solve this challenge.
Description
You are given a part of a keystream, which was produced by a filter generator. Can you find the missing keystream bytes? Show details…Hide details…
Author
Chaoyun Li
Publication
Sept. 25, 2018, 2:22 p.m.
loading…
Loading the list of solvers has failed. Please try again.
20 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The autokey cipher uses only a short keyword and the plaintext to encrypt messages. Are you able to break the given ciphertext? Show details…Hide details…
Author
Chaoyun Li
Publication
Sept. 25, 2018, 2:21 p.m.
loading…
Loading the list of solvers has failed. Please try again.
193 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.
Description
What do you know about modular sequences? Work it out. Show details…Hide details…
Author
Chaoyun Li
Publication
Sept. 25, 2018, 2:19 p.m.
loading…
Loading the list of solvers has failed. Please try again.
83 users have already solved this challenge, 38 are working on it.
You need to be logged in to solve this challenge.
Description
Sniffing on the WiFi, you notice an ElGamal encrypted message. Are you able to compute it? Show details…Hide details…
Author
Matthias Minihold
Publication
June 12, 2018, 1:26 p.m.
loading…
Loading the list of solvers has failed. Please try again.
37 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Buying a train ticket via credit card should not be a problem — actually. Can you solve the subset-sum problem to get your train? Show details…Hide details…
Author
Matthias Minihold
Publication
June 12, 2018, 1:24 p.m.
loading…
Loading the list of solvers has failed. Please try again.
40 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
During your summer job in an Austrian weekly magazine a mysterious letter arrives. Are you able to decrypt the message? Show details…Hide details…
Author
Matthias Minihold
Publication
June 12, 2018, 1:16 p.m.
loading…
Loading the list of solvers has failed. Please try again.
59 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened ElsieFour serve as an exercise and use an intentionally weakened version of LC4. ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 2 is a partly-known key challenge which provides 12 consecutive characters of the key. Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
April 28, 2018, 4:36 p.m.
1 user has already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened ElsieFour serve as an exercise and use an intentionally weakened version of LC4. ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 1 is a partly-known key challenge which provides the first 12 characters of the key. Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
April 28, 2018, 4:29 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
How many experience points does Thomas need to reach the 200th level of his new computer game? Show details…Hide details…
Author
Benjamin Strauss
Publication
April 18, 2018, 4:56 p.m.
loading…
Loading the list of solvers has failed. Please try again.
124 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.
Description
The Secret Archives of the Vatican keep a large collection of ciphertexts from papal correspondence. The keys of these manuscripts have been destroyed, or are kept elsewhere and been forgotten. Can you find out how to decipher the letter from March 14, 1625? Show details…Hide details…
Author
Beáta Megyesi
Publication
Feb. 14, 2018, 8:43 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on June 20, 2018, 12:26 a.m., and thus it is no longer possible to get points for this challenge.
Description
The Main Library of the Vatican owns some encrypted manuscripts, waiting for decryption. Can you find the solution to the letter from 1628? Show details…Hide details…
Author
Beáta Megyesi
Publication
Feb. 14, 2018, 8:36 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on June 20, 2018, 12:25 a.m., and thus it is no longer possible to get points for this challenge.
Description
The hero of the book has to decode a manuscript — seven lines of it are here for you. These lines were encoded with a mixture of classic methods — anagrams, two position-dependent monoalphabetic substitutions and Atbash. Can you help him? Show details…Hide details…
Author
Luis Hiker
Publication
Feb. 7, 2018, 11:40 p.m.
loading…
Loading the list of solvers has failed. Please try again.
62 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
What do you do, if your father and your stepmother decide to communicate only encrypted? You tape-record the messages. But what do the two of them really talk about? Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Dec. 22, 2017, 6:19 p.m.
loading…
Loading the list of solvers has failed. Please try again.
48 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Decrypting a Christmas carol to help children in need? It's not that easy, if you don't know much about cryptography. Can you help Jacob and the children? Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Dec. 21, 2017, 5:06 p.m.
loading…
Loading the list of solvers has failed. Please try again.
45 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Do you believe that AES is easy to break because of a wrong encoding? Try it yourself... Show details…Hide details…
Author
Miroslav Dimitrov
Publication
Dec. 16, 2017, 7:21 p.m.
29 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Mike would like to belong to the cryptographers. Can you help him to find out their meeting point at the Christmas market? Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Dec. 16, 2017, 7:20 p.m.
loading…
Loading the list of solvers has failed. Please try again.
57 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Little Anna has forgotten how to decrypt her ciphertext. Can you come up to her pre-Christmas wish? Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Dec. 8, 2017, 7:24 p.m.
loading…
Loading the list of solvers has failed. Please try again.
509 users have already solved this challenge, 26 are working on it.
You need to be logged in to solve this challenge.
Description
Are you able to crack the password of Radomil and find the missing 5 digits? Show details…Hide details…
Author
Andreas Kölblin
Publication
Nov. 16, 2017, 5:43 p.m.
loading…
Loading the list of solvers has failed. Please try again.
124 users have already solved this challenge, 68 are working on it.
You need to be logged in to solve this challenge.
Description
Hilly is an improved version of Hill cipher. This challenge consists of the decryption of a ciphertext by means of a partly-known key. Show details…Hide details…
Author
Yahya Almardeny
Publication
Oct. 17, 2017, 5:12 p.m.
1 user has already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened ElsieFour serve as an exercise and use an intentionally weakened version of LC4. ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 3 is a partly-known-plaintext challenge which provides 2 messages that were encrypted with the same key. Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Oct. 3, 2017, 6:39 a.m.
4 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
ElsieFour combines ideas of modern RC4 stream cipher, historical Playfair cipher and plaintext-dependent keystreams. It can be computed manually. Part 1 is a partly-known-plaintext challenge which provides 2 messages that were encrypted with the same key. Show details…Hide details…
Author
Anna Lena Rotthaler
Publication
Oct. 3, 2017, 6:37 a.m.
4 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
From a honeypot you get a set of encrypted files and the according plaintext files. Could you discover the used key, to help victims of the ransom ware? Show details…Hide details…
Authors
Miroslav Dimitrov,
Bernhard Esslinger
Publication
July 2, 2017, 12:32 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Holographic encryption can be performed by employing encryption masks which alter the field before propagation. This makes the image
unrecognizable when recorded. You are given three holograms that represent the cipher image and three plain images and their holograms which were encrypted with the same encryption masks. Show details…Hide details…
Author
Nicolas Pavillon
Publication
April 7, 2017, 10:29 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Holographic encryption can be performed by employing encryption masks which alter the field before propagation. This makes the image unrecognizable when recorded. You are given three holograms that represent the cipher image and two corrupted encryption masks. Show details…Hide details…
Author
Nicolas Pavillon
Publication
April 7, 2017, 10:25 p.m.
7 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Hilly is an improved version of the Hill cipher. This challenge consists of the decryption of a ciphertext by means of a given plaintext-ciphertext pair. Show details…Hide details…
Author
Yahya Almardeny
Publication
Jan. 25, 2017, 4:09 a.m.
9 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 9 is the same as Part 6, but uses an improved version of the cipher. It is a ciphertext-only challenge. Show details…Hide details…
Author
Bruce Kallick
Publication
Jan. 21, 2017, 10:17 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 8 is the same as Part 5, but uses an improved version of the cipher. You are given the ciphertext and 229 letters occuring at an unknown location in the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
Jan. 21, 2017, 10:14 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 7 is the same as Part 4, but uses an improved version of the cipher. You are given the ciphertext and the first 229 letters of the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
Jan. 21, 2017, 10:11 p.m.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This series consists of 5 challenges based on each other. It introduces a new three-step cipher called ASAC, which is a modified version of ADFGVX. Part 5 is a "bonus" and just modifies the second challenge of this series by improving the second step of the cipher. Show details…Hide details…
Author
Stefan Fendt
Publication
July 9, 2016, 7:15 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series consists of 5 challenges based on each other. It introduces a new three-step cipher called ASAC, which is a modified version of ADFGVX. Part 4 uses the complete cipher and is the main challenge of this series. Show details…Hide details…
Author
Stefan Fendt
Publication
July 9, 2016, 7:13 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series consists of 5 challenges based on each other. It introduces a new three-step cipher called ASAC, which is a modified version of ADFGVX. Part 3 involves the complete cipher but weakens the third step by using a single-column transposition instead of a double column transposition. Show details…Hide details…
Author
Stefan Fendt
Publication
July 9, 2016, 7:10 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series consists of 5 challenges based on each other. It introduces a new three-step cipher called ASAC, which is a modified version of ADFGVX. Part 2 uses only the first two steps of the cipher. Show details…Hide details…
Author
Stefan Fendt
Publication
July 9, 2016, 7:08 p.m.
1 user has already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series consists of 5 challenges based on each other. It introduces a new three-step cipher called ASAC, which is a modified version of ADFGVX. Part 1 is meant as an introduction and uses only the first step of ASAC. Show details…Hide details…
Author
Stefan Fendt
Publication
July 9, 2016, 7:05 p.m.
19 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The Weakened Handycipher challenges serve as an exercise and use an intentionally weakened version of Handycipher. Part 6 is the same as Part 3, but uses an improved version of the cipher. It is ciphertext-only. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:12 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Weakened Handycipher challenges serve as an exercise and use an intentionally weakened version of Handycipher. Part 5 is the same as Part 2, but uses an improved version of the cipher. It is ciphertext-only, but you are given some partial information about the key. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:10 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Weakened Handycipher challenges serve as an exercise and use an intentionally weakened version of Handycipher. Part 4 is the same as Part 1, but uses an improved version of the cipher. You are given the first 1,009 characters of the plaintext, and some partial information about the key. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:08 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of Handycipher. Part 6 is the same as Part 3, but uses an improved version of the cipher. You are given two encryptions of the plaintext generated with the same key. It is ciphertext-only. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:06 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of Handycipher. Part 5 is the same as Part 2, but uses an improved version of the cipher. You are given two encryptions of the plaintext generated with the same key, and 229 characters occuring at an unknown location in the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:04 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of Handycipher. Part 4 is the same as Part 1, but uses an improved version of the cipher. You are given three encryptions of the plaintext generated with the same key, and the first 229 characters of the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 8:02 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 6 is the same as Part 3, but uses an improved version of the cipher. It is a ciphertext-only challenge. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 7:59 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 5 is the same as Part 2, but uses an improved version of the cipher. You are given the ciphertext and 229 letters occuring at an unknown location in the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 7:55 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly created cipher designed to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Part 4 is the same as Part 1, but uses an improved version of the cipher. You are given the ciphertext and the first 229 letters of the plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
June 28, 2016, 7:50 p.m.
4 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. This is the last part and teaches us something about the weaknesses of this method by improving it a little bit in some points. Show details…Hide details…
Author
Marc Gutgesell
Publication
March 21, 2016, 10:05 a.m.
loading…
Loading the list of solvers has failed. Please try again.
16 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. This part is the actual challenge and tells you the New Year's greeting of the author. Show details…Hide details…
Author
Marc Gutgesell
Publication
March 21, 2016, 10:02 a.m.
loading…
Loading the list of solvers has failed. Please try again.
44 users have already solved this challenge, 13 are working on it.
You need to be logged in to solve this challenge.
Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 3 adds another modification. Show details…Hide details…
Author
Marc Gutgesell
Publication
March 21, 2016, 9:59 a.m.
loading…
Loading the list of solvers has failed. Please try again.
47 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 2 modifies the encryption of part 1 a little bit. Show details…Hide details…
Author
Marc Gutgesell
Publication
March 21, 2016, 9:55 a.m.
loading…
Loading the list of solvers has failed. Please try again.
49 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 1 is the easiest part of this series. Show details…Hide details…
Author
Marc Gutgesell
Publication
March 21, 2016, 9:48 a.m.
loading…
Loading the list of solvers has failed. Please try again.
54 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.
Description
Both images in this challenge seem to contain no information at all. Or do they trick us? Find the secret message. Show details…Hide details…
Author
Joerg Gerschuetz
Publication
Nov. 20, 2015, 8:26 p.m.
171 users have already solved this challenge, 25 are working on it.
You need to be logged in to solve this challenge.
Description
The story of the simple bookseller Paul from Eisleben and his beloved from the near Castle Mansfeld will be continued: A second postcard has been found.
Can you decipher the encrypted message? Show details…Hide details…
Author
Joerg Gerschuetz
Publication
Nov. 13, 2015, 12:43 p.m.
loading…
Loading the list of solvers has failed. Please try again.
60 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the simplified GRANIT cipher, a method that can be done manually, serve as an exercise and use an intentionally simplified version of GRANIT.
Part 3 is a ciphertext-only challenge for which the second permutation key is known. Show details…Hide details…
Author
Jörg Drobick
Publication
Sept. 24, 2015, 7:37 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The challenges for the simplified GRANIT cipher, a method that can be done manually, serve as an exercise and use an intentionally simplified version of GRANIT.
Part 2 is a ciphertext-only challenge for which the first permutation key is known. Show details…Hide details…
Author
Jörg Drobick
Publication
Sept. 24, 2015, 7:34 a.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the simplified GRANIT cipher, a method that can be done manually, serve as an exercise and use an intentionally simplified version of GRANIT.
Part 1 is a ciphertext-only challenge for which both permutation keys are known. Show details…Hide details…
Author
Jörg Drobick
Publication
Sept. 24, 2015, 7:30 a.m.
52 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
How are the numbers interconnected? Can you find the three missing numbers? Show details…Hide details…
Author
George Theofanidis
Publication
Sept. 14, 2015, 8:54 a.m.
loading…
Loading the list of solvers has failed. Please try again.
415 users have already solved this challenge, 32 are working on it.
You need to be logged in to solve this challenge.
Description
Spirale is a OTP cipher designed to be simply performed by hand.
Part 4 is a ciphertext-only challenge with a 485-letter ciphertext.
Unlike the other three parts of this series, this one uses four new random keys. Show details…Hide details…
Author
Philippe Allard
Publication
Aug. 23, 2015, 7:11 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Spirale is a OTP cipher designed to be simply performed by hand.
Part 3 is a ciphertext-only challenge with a 949-letter ciphertext.
In this part, two of the four keys are equal to the keys of the first two parts. Show details…Hide details…
Author
Philippe Allard
Publication
Aug. 23, 2015, 7:08 p.m.
6 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Spirale is a OTP cipher designed to be simply performed by hand.
Part 2 is a ciphertext-only challenge with a 659-letter ciphertext.
This part uses the same four keys for encryption as part 1 does. Show details…Hide details…
Author
Philippe Allard
Publication
Aug. 23, 2015, 7:05 p.m.
8 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Spirale is a OTP cipher designed to be simple to implement by hand. It is resilient to errors as they have only a local effect without obscuring all the ciphertext.
Part 1 is a partly-known plaintext challenge with a 314-letter ciphertext. The first 75 letters of the plaintext are known.
Part 2 of this series uses the same four keys as this one. Show details…Hide details…
Author
Philippe Allard
Publication
Aug. 23, 2015, 7:04 p.m.
8 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
During the cold war the foreign intelligence agency of Germany established so-called stay-behind units. Their radio messages were encrypted by a OTP method, but the keys were used multiple times.
This challenge is about the effect of this multiple usage on the security of the method. You are given 5 messages, all encrypted with the same key. Show details…Hide details…
Author
Jörg Drobick
Publication
Aug. 23, 2015, 7 p.m.
loading…
Loading the list of solvers has failed. Please try again.
20 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. This part has a ciphertext-only challenge and the ciphertext has 80 characters. Show details…Hide details…
Author
Jörg Drobick
Publication
July 1, 2015, 6:23 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. This part has a ciphertext-only challenge and the ciphertext has 110 characters. Show details…Hide details…
Author
Jörg Drobick
Publication
July 1, 2015, 6:21 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge series is about the GRANIT cipher, a method that can be done manually. It has been used for instance by the former GDR spy Günter Guillaume till about 1960.
Part 1, 2 and 3 of this series use the same keyword for generating the key matrix, but different permutation keys. In this part a codebook is used additionally, and the given ciphertext has 70 characters. Show details…Hide details…
Author
Jörg Drobick
Publication
July 1, 2015, 6:20 p.m.
0 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened Handycipher serve as an exercise and use an intentionally weakened version of Handycipher. Part 3 is a ciphertext-only challenge.
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Show details…Hide details…
Author
Bruce Kallick
Publication
May 13, 2015, 11:49 a.m.
15 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened Handycipher serve as an exercise and use an intentionally weakened version of Handycipher. Part 2 is a ciphertext-only challenge with a helping additional information.
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Show details…Hide details…
Author
Bruce Kallick
Publication
May 13, 2015, 11:48 a.m.
15 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The challenges for the weakened Handycipher serve as an exercise and use an intentionally weakened version of Handycipher. Part 1 is a partially-known-plaintext challenge with a helping additional information.
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. Show details…Hide details…
Author
Bruce Kallick
Publication
May 13, 2015, 11:47 a.m.
17 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
A friend of yours has given you the following text which contains only X and Y characters. He claims that this text contains a codeword. Can you find it? Show details…Hide details…
Author
George Theofanidis
Publication
April 16, 2015, 4:47 p.m.
loading…
Loading the list of solvers has failed. Please try again.
117 users have already solved this challenge, 52 are working on it.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of the newly designed cipher Handycipher, which permits pen-and-paper encrypting and decrypting, while providing a significantly high level of security. You got only two different ciphertexts of the 996-character plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
March 27, 2015, 3:28 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of the newly designed cipher Handycipher, which permits pen-and-paper encrypting and decrypting, while providing a significantly high level of security. From the 905-character plaintext 229 characters somewhere in it are known. Show details…Hide details…
Author
Bruce Kallick
Publication
March 27, 2015, 3:27 p.m.
3 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Extended Handycipher is an enhancement of the newly designed cipher Handycipher, which permits pen-and-paper encrypting and decrypting, while providing a significantly high level of security. From the 815-character plaintext the first 229 characters are known. Show details…Hide details…
Author
Bruce Kallick
Publication
March 27, 2015, 3:26 p.m.
3 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
How are the numbers linked? Can you find the two missing numbers? Show details…Hide details…
Author
Bruce Kallick
Publication
March 23, 2015, 11:51 a.m.
loading…
Loading the list of solvers has failed. Please try again.
100 users have already solved this challenge, 39 are working on it.
You need to be logged in to solve this challenge.
Description
How are the numbers linked? Can you find the two missing numbers? Show details…Hide details…
Author
Bruce Kallick
Publication
March 23, 2015, 11:49 a.m.
loading…
Loading the list of solvers has failed. Please try again.
168 users have already solved this challenge, 21 are working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. You got only the ciphertext of the 993-character plaintext. Show details…Hide details…
Author
Bruce Kallick
Publication
March 3, 2015, 11:40 p.m.
7 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. From the 1142-character plaintext 229 characters somewhere in it are known. Show details…Hide details…
Author
Bruce Kallick
Publication
March 3, 2015, 11:34 p.m.
8 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Handycipher is a newly designed cipher to permit pen-and-paper encrypting and decrypting, while providing a significantly high level of security. From the 858-character plaintext the first 229 characters are known. Show details…Hide details…
Author
Bruce Kallick
Publication
March 3, 2015, 11:33 p.m.
6 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
This is part 4 in a series about the M-138. Part 4 is a ciphertext-only challenge (75 letters). Show details…Hide details…
Author
K. Schmeh
Publication
Dec. 24, 2014, 12:34 a.m.
31 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This is part 3 in a series about the M-138. Part 3 is a ciphertext-only challenge (125 letters). Show details…Hide details…
Author
K. Schmeh
Publication
Dec. 24, 2014, 12:33 a.m.
65 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
This is part 2 in a series about the M-138. Part 2 is a partly-known plaintext challenge (48/100). Show details…Hide details…
Author
K. Schmeh
Publication
Dec. 24, 2014, 12:31 a.m.
140 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
This is the beginner's challenge in a series about M-138, a manual cipher of the US army which has been relatively save at the beginning of world war 2nd. Part 1 of the series is a ciphertext-only challenge whose key is largely known. Show details…Hide details…
Author
K. Schmeh
Publication
Dec. 24, 2014, 12:28 a.m.
230 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.
Description
You can find a short encrypted note at the end of the novel "Die achte Offenbarung" by Karl Olsberg. Decrypt the secret message! Show details…Hide details…
Author
Bernhard Esslinger
Publication
Sept. 22, 2014, 10:13 p.m.
loading…
Loading the list of solvers has failed. Please try again.
103 users have already solved this challenge, 22 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge is based on the Heartbleed Bug in OpenSSL discovered in April 2014. Attack a server which is specifically prepared to be vulnerable to the Heartbleed bug. Please note that it is necessary to solve Part 1 and 2 at first.
!!! We had to take off this challenge, as our firewall doesn't allow flawed servers any more -- even if this flaw was offered by will for training and within a sandbox. !!! Show details…Hide details…
Author
A. Wacker
Publication
Aug. 28, 2014, 2:35 p.m.
loading…
Loading the list of solvers has failed. Please try again.
33 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on May 17, 2022, 6:32 p.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge is based on the Heartbleed bug in OpenSSL discovered in April 2014. Attack a server which is specifically prepared to be vulnerable to the Heartbleed bug. Please note that it is necessary to solve Part 1 first.
!!! We had to take off this challenge, as our firewall doesn't allow flawed servers any more -- even if this flaw was offered by will for training and within a sandbox. !!! Show details…Hide details…
Author
A. Wacker
Publication
Aug. 28, 2014, 2:34 p.m.
loading…
Loading the list of solvers has failed. Please try again.
60 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on May 17, 2022, 6:32 p.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge is based on the Heartbleed Bug in OpenSSL discovered in April 2014. Attack a server provided by the group for Privacy and Compliance with the Research Institute Cyber Defence (CODE) at Bundeswehr University Munich, which is specifically prepared to be vulnerable to the Heartbleed bug.
!!! We had to take off this challenge, as our firewall doesn't allow flawed servers any more -- even if this flaw was offered by will for training and within a sandbox. !!! Show details…Hide details…
Author
A. Wacker
Publication
Aug. 28, 2014, 2:32 p.m.
loading…
Loading the list of solvers has failed. Please try again.
90 users have already solved this challenge, 21 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on May 17, 2022, 6:32 p.m., and thus it is no longer possible to get points for this challenge.
Description
In the last part of a series of mid-level Double Column Transposition challenges, you have to find the two keys. Each of it is 19 characters long and has been derived from an English phrase. Show details…Hide details…
Author
George Lasry
Publication
June 23, 2014, 3:56 p.m.
9 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of a series of mid-level Double Column Transposition challenges, the keys that has been used for both transposition are given. Find out from which phrases they have been derived! Show details…Hide details…
Author
George Lasry
Publication
May 19, 2014, 10:06 p.m.
loading…
Loading the list of solvers has failed. Please try again.
52 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In this part of a series of mid-level Double Column Transposition challenges, the same key has been used for both transposition. This allows you to attack this simple, yet strong cipher. Show details…Hide details…
Author
George Lasry
Publication
May 2, 2014, 11:44 a.m.
loading…
Loading the list of solvers has failed. Please try again.
41 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
In this part of a series of mid-level Double Column Transposition challenges, a large part of the beginning of the plaintext is known. This partial crib allows you to attack this simple, yet strong cipher. Show details…Hide details…
Author
George Lasry
Publication
May 2, 2014, 11:30 a.m.
loading…
Loading the list of solvers has failed. Please try again.
47 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods! Show details…Hide details…
Authors
Mark Stamp,
Richard M. Low
Publication
April 14, 2014, 8:39 p.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods! Show details…Hide details…
Authors
Mark Stamp,
Richard M. Low
Publication
April 14, 2014, 8:38 p.m.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods! Show details…Hide details…
Authors
Mark Stamp,
Richard M. Low
Publication
April 14, 2014, 8:37 p.m.
12 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In this part of a series of mid-level Double Column Transposition challenges keys shorter than 20 allow you to attack this simple, yet secure cipher. Show details…Hide details…
Author
George Lasry
Publication
April 4, 2014, 5:36 p.m.
loading…
Loading the list of solvers has failed. Please try again.
34 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Many telegrams that date from the Spanish Civil War (1936 - 1939) still remain undisclosed. It is assumed that these telegrams were encrypted using the Spanish Strip Cipher. Try to find the plaintext of this original telegram. Show details…Hide details…
Author
Luis Alberto Benthin Sanguino
Publication
March 27, 2014, 2:45 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
An English telegram was encrypted using the Spanish Strip Cipher, a popular algorithm during the Spanish Civil War. It is your task to find the plaintext. Show details…Hide details…
Author
Luis Alberto Benthin Sanguino
Publication
March 27, 2014, 2:44 p.m.
loading…
Loading the list of solvers has failed. Please try again.
33 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
A Spanish telegram was encrypted using the Spanish Strip Cipher, a popular algorithm during the Spanish Civil War. It is your task to find the plaintext. Show details…Hide details…
Author
Luis Alberto Benthin Sanguino
Publication
March 27, 2014, 2:43 p.m.
loading…
Loading the list of solvers has failed. Please try again.
34 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of this series of Enigma challenges, a plaintext message consisting of three letters which are repeated several times has been encrypted by the Enigma I. What are the first three letters of the plaintext? Show details…Hide details…
Author
George Lasry
Publication
March 5, 2014, 4:04 p.m.
83 users have already solved this challenge, 10 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of this series of Enigma challenges, a plaintext message consisting of three letters which are repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors? Show details…Hide details…
Author
George Lasry
Publication
March 5, 2014, 4:03 p.m.
80 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of this series of Enigma challenges, a plaintext message consisting of two letters which are repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors? Show details…Hide details…
Author
George Lasry
Publication
March 5, 2014, 4:02 p.m.
89 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the third part a German plaintext has been encrypted with random keys. Show details…Hide details…
Authors
A. Wacker,
Bernhard Esslinger,
K. Schmeh
Publication
Dec. 11, 2013, 8:11 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the second part two interleaved English texts have been encrypted with random keys. Show details…Hide details…
Authors
A. Wacker,
Bernhard Esslinger,
K. Schmeh
Publication
Dec. 11, 2013, 8:11 p.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The double columnar transposition is considered to be one of the best manual encryption systems. This sequence considers vulnerabilities that have been used to solve the corresponding level X challenge. The three challenges of the sequence have an increasing difficulty. In the first part an English plaintext has been encrypted with keys derived from English sentences. Show details…Hide details…
Authors
A. Wacker,
Bernhard Esslinger,
K. Schmeh
Publication
Dec. 11, 2013, 8:09 p.m.
0 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of this series of Enigma challenges, a plaintext message consisting of one letter which is repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors? Show details…Hide details…
Author
George Lasry
Publication
Oct. 28, 2013, 8:53 p.m.
88 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.
Description
Two scatterbrained professors exchange messages that have been encrypted with the Trifid cipher. Unfortunately, one of them lost the second of three layers. Will he nevertheless be able to decrypt the message he received from his colleague? Show details…Hide details…
Author
Sansibar
Publication
Oct. 28, 2013, 8:49 p.m.
loading…
Loading the list of solvers has failed. Please try again.
131 users have already solved this challenge, 9 are working on it.
You need to be logged in to solve this challenge.
Description
In this part of this series of Enigma challenges, a plaintext message consisting of one letter which is repeated several times has been encrypted by the Enigma I. What is the letter we are looking for? Show details…Hide details…
Author
George Lasry
Publication
Sept. 26, 2013, 3:05 p.m.
183 users have already solved this challenge, 34 are working on it.
You need to be logged in to solve this challenge.
Description
You find a note with strange characters and an unsolved Sudoku on your brother's desk. You are curious and would like to find out what your brother is working on. Can you decrypt the note using the Sudoku? Show details…Hide details…
Author
Emmanouil Doulgerakis
Publication
Sept. 4, 2013, 4:27 p.m.
109 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
Sarah and Igor are exchange students. Sarah lives in Moscow while Igor is in Berlin. To keep their little secrets confidential, they encrypt their emails. Decrypt the message to find out what Sarah wrote this time. Show details…Hide details…
Author
Sansibar
Publication
Sept. 4, 2013, 2:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
300 users have already solved this challenge, 33 are working on it.
You need to be logged in to solve this challenge.
Description
Nils would like to go on a journey and has given you a note with information about his destination. The note is encrypted. Can you find out where he would like to go? Show details…Hide details…
Authors
Nils Griese,
Nathalie Hänig
Publication
Aug. 8, 2013, 1 p.m.
loading…
Loading the list of solvers has failed. Please try again.
181 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 212 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
July 31, 2013, 4:34 p.m.
loading…
Loading the list of solvers has failed. Please try again.
69 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on July 31, 2013, 4:34 p.m., and thus it is no longer possible to get points for this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods! Show details…Hide details…
Authors
Mark Stamp,
Richard M. Low
Publication
June 27, 2013, 11:38 a.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods! Show details…Hide details…
Authors
Mark Stamp,
Richard M. Low
Publication
June 6, 2013, 8:39 p.m.
loading…
Loading the list of solvers has failed. Please try again.
31 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The seven dwarfs are missing. Snow White however finds a file, which contains useful information steganographically hidden. Help her to find the dwarfs. Show details…Hide details…
Author
Lena Meier
Publication
April 20, 2013, 11:23 a.m.
302 users have already solved this challenge, 86 are working on it.
You need to be logged in to solve this challenge.
Description
A new and unknown rotor has been added to the Typex machine. Use a known-plaintext attack to determine the wiring of the new rotor. Show details…Hide details…
Authors
Kelly Chang,
Richard M. Low,
Mark Stamp
Publication
April 3, 2013, 2:40 p.m.
25 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Use the hints from the first and second part of this challenge to decrypt this message that has been encrypted using an ENIGMA. Show details…Hide details…
Author
A. Wacker
Publication
March 29, 2013, 12:52 p.m.
loading…
Loading the list of solvers has failed. Please try again.
14 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
After solving the first part of this challenge, you can use the hints you found to decrypt the two ciphertexts that have been encrypted using the ADFGVX cipher. Show details…Hide details…
Author
A. Wacker
Publication
March 25, 2013, 3:05 p.m.
loading…
Loading the list of solvers has failed. Please try again.
21 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The reserve hand procedure has been used as a replacement of the Enigma machine. Can you decrypt the given ciphertext? Show details…Hide details…
Author
Michael Hörenberg
Publication
March 6, 2013, 9:14 p.m.
198 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.
Description
The Typex cipher has been used in World War 2 as an alternative to the Enigma cipher. Find the key that was used in this challenge. Show details…Hide details…
Authors
Kelly Chang,
Richard M. Low,
Mark Stamp
Publication
Feb. 28, 2013, 2:02 p.m.
31 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The plaintext consists of English, French, German and Italian words. Can you identify the four sentences after you have solved the monoalphabetic substitution? Show details…Hide details…
Author
George Theofanidis
Publication
Jan. 30, 2013, 2:27 p.m.
loading…
Loading the list of solvers has failed. Please try again.
82 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.
Description
Can you break this cascading encryption that consists of a combination of substitution and transposition? The solution contains important information for the next parts. Show details…Hide details…
Author
A. Wacker
Publication
Jan. 25, 2013, 3 p.m.
loading…
Loading the list of solvers has failed. Please try again.
75 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
Can you find the plaintext using 26 Engima ciphertexts that have been encrypted with different rotors and different initial settings? Show details…Hide details…
Author
George Theofanidis
Publication
Jan. 23, 2013, 3:32 p.m.
loading…
Loading the list of solvers has failed. Please try again.
84 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge, only fragments of the grid used for a Playfair encryption are given. Are you able to reconstruct the matrix and decrypt the message? Show details…Hide details…
Author
George Theofanidis
Publication
Jan. 16, 2013, noon
loading…
Loading the list of solvers has failed. Please try again.
122 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
This PDF file is supposed to contain a hidden codeword. Can you find it? Show details…Hide details…
Author
George Theofanidis
Publication
Jan. 6, 2013, 2:32 p.m.
868 users have already solved this challenge, 166 are working on it.
You need to be logged in to solve this challenge.
Description
This postcard from Thessaloniki was written in German in 1897. The encrypted text can either be considered as message from the sailor Fritz to his wife at home, or as a note regarding spionage activities. Can you determine the codeword that was used to request secret information? Show details…Hide details…
Author
T. Schroedel
Publication
Dec. 10, 2012, 3:10 p.m.
loading…
Loading the list of solvers has failed. Please try again.
51 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
Can you decrypt the three military messages? Show details…Hide details…
Author
George Ho
Publication
Nov. 20, 2012, 4:48 p.m.
loading…
Loading the list of solvers has failed. Please try again.
71 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.
Description
Can you decrypt the last part of the letter and read the friend's advice? Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 9, 2012, 3 p.m.
721 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.
Description
Help Alice and Bob to find a treasure on the island Mallorca. For this purpose, a three-stage cipher needs to be broken. Show details…Hide details…
Author
George Theofanidis
Publication
Sept. 12, 2012, 6:35 p.m.
75 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
The Beaver Code is a transposition cipher. Apart from the solution of this challenge, can you find a formula for any given ciphertext length, which generates the permutation needed to decrypt the ciphertext? Show details…Hide details…
Author
Lena Meier
Publication
Aug. 13, 2012, 8:12 p.m.
loading…
Loading the list of solvers has failed. Please try again.
1228 users have already solved this challenge, 46 are working on it.
You need to be logged in to solve this challenge.
Description
Can you decrypt the second part of the letter to the Templars as effortlessly as the first one? Show details…Hide details…
Author
Bernhard Esslinger
Publication
July 30, 2012, 8:10 p.m.
845 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.
Description
After the Order of the Templar has become very powerful, enviers try to crush it. The knights receive an encrypted letter but the key does not arrive. Does this letter contain the warning that would have saved the knights from being arrested? Show details…Hide details…
Author
Bernhard Esslinger
Publication
July 16, 2012, 9:08 p.m.
1055 users have already solved this challenge, 45 are working on it.
You need to be logged in to solve this challenge.
Description
In the previous parts, you broke a monoalphabetic substitution with one camouflage alphabet. Can you find the plaintext even if nine camouflage alphabets have been used? Show details…Hide details…
Author
Viktor Veselovsky
Publication
June 30, 2012, 12:57 p.m.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Your friend sent you an audio file that contains only a strange melody. In the email, your friend writes that the file contains a message encoded by a variant of Morse code. Can you find out how you can hear the Morse code? Show details…Hide details…
Author
Viktor Veselovsky
Publication
June 5, 2012, 7:56 p.m.
44 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.
Description
You are invited to a job interview for the job of a cryptographer. Can you pass the first selection round? Show details…Hide details…
Author
Viktor Veselovsky
Publication
May 28, 2012, 5:07 p.m.
loading…
Loading the list of solvers has failed. Please try again.
234 users have already solved this challenge, 106 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge a plaintext has been encrypted using the KeyshancRT version of Keyshanc. The plaintext is an excerpt from one of William Shakespeare's plays. Show details…Hide details…
Author
Andrew C. Reed
Publication
May 21, 2012, 8:50 p.m.
41 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
In this challenge an excerpt from a novel has been encrypted using the "Keyshanc" cipher. Keyshanc is a special kind of monoalphabetic substitution using a 95-character alphabet. Show details…Hide details…
Author
Andrew C. Reed
Publication
May 21, 2012, 8:46 p.m.
50 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In 1586 the famous French mathematician Blaise de Vigenère published a picture of the night sky and claimed that a message was concealed in it. Can you find out how to decipher this message? Show details…Hide details…
Author
K. Schmeh
Publication
May 1, 2012, 10:31 a.m.
16 users have already solved this challenge.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on July 15, 2016, 12:39 p.m., and thus it is no longer possible to get points for this challenge.
Description
How are the numbers linked? Can you find the three missing numbers? Show details…Hide details…
Author
River Edis-Smith
Publication
April 18, 2012, 7:27 p.m.
loading…
Loading the list of solvers has failed. Please try again.
108 users have already solved this challenge, 132 are working on it.
You need to be logged in to solve this challenge.
Description
Can you find the link between these numbers? Show details…Hide details…
Author
River Edis-Smith
Publication
April 18, 2012, 7:25 p.m.
loading…
Loading the list of solvers has failed. Please try again.
865 users have already solved this challenge, 27 are working on it.
You need to be logged in to solve this challenge.
Description
You don't speak Spanish? No Problem!
Try to decrypt a ciphertext in a foreign language without knowledge of that language. Show details…Hide details…
Author
Bart den Hartog
Publication
April 18, 2012, 7:19 p.m.
loading…
Loading the list of solvers has failed. Please try again.
176 users have already solved this challenge, 22 are working on it.
You need to be logged in to solve this challenge.
Description
This number sequence is cyclic. Can you find out the fifth and sixth number? Show details…Hide details…
Author
River Edis-Smith
Publication
March 30, 2012, 10:49 p.m.
loading…
Loading the list of solvers has failed. Please try again.
1048 users have already solved this challenge, 112 are working on it.
You need to be logged in to solve this challenge.
Description
In order to decrypt the intercepted letter addressed to your neighbor, you need to find out which document has been used to encode the message with the book code. Show details…Hide details…
Author
Lena Meier
Publication
March 21, 2012, 11:02 a.m.
loading…
Loading the list of solvers has failed. Please try again.
156 users have already solved this challenge, 27 are working on it.
You need to be logged in to solve this challenge.
Description
In the fifth part the same variant of the cipher already introduced in Part 3 and 4 of this challenge has been used here, too. The only difference is that spaces were removed previously to the encryption process. Show details…Hide details…
Author
Viktor Veselovsky
Publication
March 9, 2012, 9:49 p.m.
loading…
Loading the list of solvers has failed. Please try again.
34 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Alice and Bob would like to agree upon a shared key. They use an Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol. Try to reproduce the steps that are necessary to calculate the key and to decrypt Bob's message. Show details…Hide details…
Author
Lena Meier
Publication
Feb. 24, 2012, midnight
loading…
Loading the list of solvers has failed. Please try again.
102 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
With RSA keys, the private key d must remain private. If the public key e is very small, this is not completely possible. This exercise demonstrates how simple it is to compute a portion of the secret key d. Show details…Hide details…
Authors
H. Koy,
B. Esslinger
Publication
Feb. 11, 2012, 1:20 p.m.
loading…
Loading the list of solvers has failed. Please try again.
89 users have already solved this challenge, 16 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 617 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:13 p.m.
0 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 617 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:13 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 500 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:11 p.m.
0 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 490 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:10 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 480 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:09 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 470 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:08 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 463 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:07 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 460 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:06 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 450 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:05 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 440 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:04 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 430 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:03 p.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 420 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:02 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 410 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 12:01 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 400 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, noon
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 390 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:59 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 380 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:58 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 370 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:57 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 360 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:55 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 350 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:21 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 340 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:19 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 330 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:18 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 320 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:16 a.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 310 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:15 a.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 309 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:13 a.m.
0 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 309 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:11 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 300 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:09 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 290 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:07 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 280 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:05 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 270 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:04 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 270 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 11:02 a.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 260 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:50 a.m.
0 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 250 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:48 a.m.
loading…
Loading the list of solvers has failed. Please try again.
28 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Feb. 28, 2020, 4:48 p.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 240 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:47 a.m.
loading…
Loading the list of solvers has failed. Please try again.
29 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Dec. 2, 2019, 1:52 p.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 232 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:45 a.m.
loading…
Loading the list of solvers has failed. Please try again.
29 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Feb. 17, 2020, noon, and thus it is no longer possible to get points for this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 230 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:43 a.m.
loading…
Loading the list of solvers has failed. Please try again.
40 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Aug. 15, 2018, 12:05 p.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 220 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:42 a.m.
loading…
Loading the list of solvers has failed. Please try again.
47 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on May 13, 2016, 10 a.m., and thus it is no longer possible to get points for this challenge.
Description
This challenge descends from the RSA Laboratories contest to encourage research into the practical difficulty of factoring large integers of different length (between 330 and 2048 bit) and cracking RSA keys used in cryptography. This challenge is about factoring a number with 210 decimal digits. Show details…Hide details…
Author
RSA Inc
Publication
Feb. 7, 2012, 10:30 a.m.
loading…
Loading the list of solvers has failed. Please try again.
64 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Sept. 26, 2013, 3:48 p.m., and thus it is no longer possible to get points for this challenge.
Description
An AES encrypted message has been forwarded to you. Additionally, you have received the corresponding key - unfortunately not quite complete - in a form like a machine readable zone on an identity document as it is used e.g. with ePassports in Europe. Show details…Hide details…
Author
S. Hick
Publication
Jan. 16, 2012, 7:03 p.m.
loading…
Loading the list of solvers has failed. Please try again.
84 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.
Description
In the third part of this challenge the cipher has been used to encrypt a plaintext but the spaces have not been removed before. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Jan. 6, 2012, 1:10 p.m.
98 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.
Description
Alice and Bob use the cipher as it had been described in part 3 of this challenge. Due to an error one message has been encrypted and sent twice. Does this help you to find out the shared key and enables you to decrypt a third message easily? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 21, 2011, 1:50 p.m.
loading…
Loading the list of solvers has failed. Please try again.
51 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge a variant has been used that allows to benefit from the camouflage effect and get a ciphertext not longer than the plaintext. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 7, 2011, 3:10 p.m.
loading…
Loading the list of solvers has failed. Please try again.
50 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge it is to test whether a monoalphabetic substitution with camouflage provides more security even though spaces were not removed prior to the encryption. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 7, 2011, 3 p.m.
54 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
After making yourself familiar with the idea of this cipher in part 1 it is now time to attack a larger plaintext. The monoalphabetic cipher that has been applied on the plaintext before should be the least problem. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Dec. 1, 2011, 9 p.m.
150 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
A strange effect might occur if you encrypt a message using the RSA cipher: The encrypted message has got the same value as the plaintext. Can you find all of these unconcealed messages for the given public key? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Nov. 2, 2011, 8:15 a.m.
loading…
Loading the list of solvers has failed. Please try again.
52 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
It is not difficult to break a monoalphabetic substitution but in this challenge an additional camouflage alphabet causes confusion. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Oct. 27, 2011, 9:40 a.m.
loading…
Loading the list of solvers has failed. Please try again.
66 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
With the help of 7 pairs of plaintext-ciphertext you have to find out how this factorization cipher works and then decrypt a ciphertext. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Oct. 17, 2011, 6:42 p.m.
loading…
Loading the list of solvers has failed. Please try again.
519 users have already solved this challenge, 18 are working on it.
You need to be logged in to solve this challenge.
Description
You intercepted two ENIGMA I messages. Both are dated from the same day. Use a Turing Bombe to find out the key of the day and decipher the solution. Show details…Hide details…
Author
Michael Hörenberg
Publication
Oct. 17, 2011, 6:36 p.m.
loading…
Loading the list of solvers has failed. Please try again.
75 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
A friend of yours sent you a file that seems to be empty. Was it just a mistake or is there a secret to reveal? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Oct. 17, 2011, 6:25 p.m.
63 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.
Description
You need to reconstruct some fields of the grille to decrypt the message written on an old note. Show details…Hide details…
Author
Lena Meier
Publication
Oct. 14, 2011, 6 p.m.
loading…
Loading the list of solvers has failed. Please try again.
507 users have already solved this challenge, 42 are working on it.
You need to be logged in to solve this challenge.
Description
Asterix and Obelix besiege Rome. They just happened to find an encrypted message but instead of the common Caesar Cipher the Romans used a new method. Can you decrypt the message? Show details…Hide details…
Author
Dano
Publication
Oct. 12, 2011, 2:03 p.m.
loading…
Loading the list of solvers has failed. Please try again.
119 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
In 2006 the distributed "M4 Message Breaking Project" under the lead of Stefan Krah aimed at decrypting three ENIGMA M4 messages from the time of World War II. Two of the three messages where decrypted within the first weeks. However, the third message withstood despite all efforts and remained unbroken.
Today, the M4 project has been discontinued with the last message still unbroken. The task of this challenge is to break this very last message - after all, a few years have past since the project was discontinued and cryptanalysis and computational power also advanced during this time.
Note: The solution was published here: http://www.enigma.hoerenberg.com/. You can't get points for solving it any more, but you can still use it as a good training experience. Show details…Hide details…
Author
Michael Hörenberg
Publication
Sept. 21, 2011, 6:45 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Two girls want to communicate in a secret way using the „affine cipher“. Transform the encryption rule into the decryption rule and turn in the plaintext of the example. Show details…Hide details…
Authors
Tanja Lange,
Andreas Grüner,
Bernhard Esslinger
Publication
Sept. 9, 2011, 11:24 a.m.
610 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.
Description
This is already a really long number sequence. Can you find the 10001st element? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Sept. 5, 2011, 10:37 p.m.
loading…
Loading the list of solvers has failed. Please try again.
123 users have already solved this challenge, 31 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge the rotational relationship between the Pigpen symbols are used to create a new cipher. In this part the well-known key squares are used as a warm up. Show details…Hide details…
Author
Daniel Fretwell
Publication
Sept. 5, 2011, 10:17 p.m.
loading…
Loading the list of solvers has failed. Please try again.
158 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
A random, non-periodic key, an unknown substitution - can you find out the 12th word? Show details…Hide details…
Author
Daniel Fretwell
Publication
Sept. 2, 2011, 1:15 p.m.
loading…
Loading the list of solvers has failed. Please try again.
41 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
Can you break the cipher without knowing the substitution? But in return you know that a periodic rotation key has been used. Show details…Hide details…
Author
Daniel Fretwell
Publication
Sept. 2, 2011, 1:11 p.m.
loading…
Loading the list of solvers has failed. Please try again.
43 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
The Caesar Chiper is rather simple. But in this challenge it is used with a different alphabet and a modified way of shifting the letters. Show details…Hide details…
Author
Viktor Veselovsky
Publication
Sept. 2, 2011, 1:02 p.m.
loading…
Loading the list of solvers has failed. Please try again.
236 users have already solved this challenge, 62 are working on it.
You need to be logged in to solve this challenge.
Description
In order to calculate the private keys of the RSA algorithm, it is necessary to factorize large numbers. How difficult is it if we replace x*y by some diophantine equation? Show details…Hide details…
Author
Viktor Veselovsky
Publication
Sept. 2, 2011, 12:57 p.m.
loading…
Loading the list of solvers has failed. Please try again.
69 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge concerns the Discrete Logarithm Problem (DLP) in a "medium" field.
For powers of very small primes and for large prime fields the function-field sieve and the number-field sieve are highly optimized; for intermediate fields algorithms with the same asymptotic behavior exist but the actual running times are slower. Are you able to solve the DLP in such a field anyway? Show details…Hide details…
Author
Tanja Lange
Publication
Sept. 2, 2011, 12:23 p.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
A pair of plaintext and the corresponding ciphertext encrypted with the ADFGVX cipher ist given. Can you reveal the substitution and transposition key used in this example? Show details…Hide details…
Author
Volker Simon
Publication
Aug. 15, 2011, 5:14 p.m.
loading…
Loading the list of solvers has failed. Please try again.
127 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
A small ciphertext encrypted with the ADFGVX cipher, which has been used during World War I, is given. Are you able to reveal the plaintext message? Show details…Hide details…
Author
Volker Simon
Publication
Aug. 15, 2011, 5:11 p.m.
loading…
Loading the list of solvers has failed. Please try again.
124 users have already solved this challenge, 18 are working on it.
You need to be logged in to solve this challenge.
Description
You found out that a message encrypted with two different public keys but same modulus yield to the same ciphertexts. Are you able to name the smallest private key to decrypt ciphertexts that were generated with this parameters? Show details…Hide details…
Authors
Verena Brunner,
Bernhard Esslinger
Publication
Aug. 15, 2011, 5:03 p.m.
loading…
Loading the list of solvers has failed. Please try again.
158 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.
Description
A message was encrypted with three different moduli but the same public exponent.
Fortunately, you were able to catch the three different ciphertexts.
Are you able to recover the secret message? Show details…Hide details…
Authors
Verena Brunner,
Bernhard Esslinger,
Joerg-Cornelius Schneider
Publication
July 22, 2011, 8 p.m.
243 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
This sequence is infinite, the first 9 numbers are given. What are the 10th and 11th number? Show details…Hide details…
Author
Bernhard Esslinger
Publication
July 11, 2011, 2:34 p.m.
loading…
Loading the list of solvers has failed. Please try again.
2165 users have already solved this challenge, 490 are working on it.
You need to be logged in to solve this challenge.
Description
Usually prefix-free codes are used for encryption because it makes the decryption process easier at the receiver's end. However, this challenge deals with a substitution cipher with non-prefix codes. This should be broken by performing a "ciphertext-only attack". Show details…Hide details…
Authors
Rashmi Bangalore Muralidhar,
Mark Stamp
Publication
June 15, 2011, 11 a.m.
loading…
Loading the list of solvers has failed. Please try again.
1 user has already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
A piece of music is given as mp3 file and in music notation. The notes represent a secret message, which was encrypted with two classic methods. To solve this challenge you first have to solve part 1 (which is in level 1). Show details…Hide details…
Author
Henning Wolter
Publication
May 17, 2011, 10 a.m.
42 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
A piece of music is given as mp3 file and in music notation. The notes represent a secret message, which was encrypted with two classic methods. In part 1 of this challenge you have to solve the first of these methods. Thereafter, you can set out to solve part 2 (which is in level 2). Show details…Hide details…
Author
Henning Wolter
Publication
May 17, 2011, 10 a.m.
loading…
Loading the list of solvers has failed. Please try again.
43 users have already solved this challenge, 31 are working on it.
You need to be logged in to solve this challenge.
Description
This time your friend encrypted his plaintext within several iterations (rounds). Are you able to decrypt the ciphertext anyway? Show details…Hide details…
Author
Bernhard Esslinger
Publication
May 5, 2011, 10:34 a.m.
10 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
This time your friend packed the plaintext in a ZIP archive before encrypting it. Are you able to get the archive from the given ciphertext file, and then reveal the wanted plaintext? Show details…Hide details…
Author
Bernhard Esslinger
Publication
May 5, 2011, 10:30 a.m.
0 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
By the time quantum computers exist, the actual signing algorithms are not secure anymore. Then one can switch e.g. to so-called "Unbalanced Oil and Vinegar" systems. It is your challenge to break such a system, with realistic parameters, today already. Show details…Hide details…
Authors
Marc Kleffmann,
Enrico Thomae,
Christopher Wolf
Publication
April 13, 2011, 5:17 p.m.
12 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.
Description
By the time quantum computers exist, the actual signing algorithms are not secure anymore. Then one can switch e.g. to so-called "Unbalanced Oil and Vinegar" systems. It is your challenge to break a simplified version of such a system today already. Show details…Hide details…
Authors
Marc Kleffmann,
Enrico Thomae,
Christopher Wolf
Publication
April 7, 2011, midnight
loading…
Loading the list of solvers has failed. Please try again.
101 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
An unsolved FBI case: In 1999, an encrypted message was found in the pockets of a murder victim. No one was able to decrypt it so far. Show details…Hide details…
Author
Dennis Grunert
Publication
April 7, 2011, midnight
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Password-based authentication means that a user sends a plaintext password to a server, and the server calculates the hash value of the received password and compares it with a stored hash value. Goal of this challenge is to reveal the plaintext password given its SHA1 hash value. There is some information known about the original password. Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
April 4, 2011, 9:38 p.m.
loading…
Loading the list of solvers has failed. Please try again.
583 users have already solved this challenge, 16 are working on it.
You need to be logged in to solve this challenge.
Description
Your challenge is, to find a shortest nonzero lattice vector for a given lattice basis. Show details…Hide details…
Authors
Richard Lindner,
Markus Rueckert,
Paul Baumann,
Leo Nobach
Publication
March 11, 2011, 1:15 p.m.
34 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
This time your friend only sends you a ciphertext, which has been encrypted using his cipher (see Kaskade-S/T Part 1 and Part 2). He wants you to figure out the title of the decrypted text. Show details…Hide details…
Author
Bernhard Esslinger
Publication
March 4, 2011, midnight
36 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
Your friend calls you again and wants you to “test” his cipher (see Kaskade-S/T Part 1) with a longer key. He sends you a plaintext and the corresponding ciphertext and asks, if you could discover the key used for encryption. Show details…Hide details…
Author
Bernhard Esslinger
Publication
March 4, 2011, midnight
53 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
A friend sends you a cipher designed by him and asks you to discover the used key, using a given plaintext and the corresponding ciphertext. Show details…Hide details…
Author
Bernhard Esslinger
Publication
March 4, 2011, midnight
108 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
In the Fully Homomorphic Encryption scheme by Gentry and Halevi the private key is included in the public key. So, theoretically it is possible to recover the secret key. Show details…Hide details…
Author
Coen Ramaekers
Publication
Jan. 14, 2011, midnight
0 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
The Fully Homomorphic Encryption Scheme by Gentry and Halevi turns out to be vulnerable to so called lunchtime attacks. In this challenge you have to perform such an attack. Show details…Hide details…
Author
Coen Ramaekers
Publication
Jan. 14, 2011, midnight
49 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In this challenge you shall break the Playfair encryption which was used by the British forces in the Crimean War and in World War I, among others. Show details…Hide details…
Author
Pascal Schöttle
Publication
Dec. 22, 2010, midnight
loading…
Loading the list of solvers has failed. Please try again.
129 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.
Description
In this challenge you shall break the Caesar encryption in its original form. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Dec. 15, 2010, midnight
loading…
Loading the list of solvers has failed. Please try again.
3099 users have already solved this challenge, 147 are working on it.
You need to be logged in to solve this challenge.
Description
CMEA is a block cipher and was one of the 4 cryptographic primitives of the mobile communications network in the US. It is your challenge to perform a known-plaintext attack on CMEA with 40 known plaintext blocks given. Show details…Hide details…
Author
Mark Stamp
Publication
Dec. 6, 2010, midnight
29 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
CMEA is a block cipher and was one of the 4 cryptographic primitives of the mobile communications network in the US. It is your challenge to perform a known-plaintext attack on CMEA with 100 known plaintext blocks given.
Show details…Hide details…
Author
Mark Stamp
Publication
Dec. 6, 2010, midnight
45 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
Akelarre is a combination of IDEA and RC5. However, Akelarre is not as strong as those two ciphers. Perform a known plaintext attack on Akelarre. Show details…Hide details…
Author
Mark Stamp
Publication
Nov. 24, 2010, 2:40 p.m.
10 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The Enigma is an electro-mechanical rotor machine used for encryption and decryption. One main part of the Enigma is changeable rotors. This challenge deals with the calculation of the key space. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Nov. 12, 2010, 3:31 p.m.
loading…
Loading the list of solvers has failed. Please try again.
107 users have already solved this challenge, 68 are working on it.
You need to be logged in to solve this challenge.
Description
The "Three Investigators" heard that it was possible to create truly unbreakable cipher texts if you linked a stream of true random numbers to the plaintext (one-time pad). However this random stream must be incalculable for outsiders. Do you think you can, nevertheless, decrypt an eavesdropped encrypted message from the "Three Investigators"? Show details…Hide details…
Author
Bernhard Esslinger
Publication
Nov. 12, 2010, 3:30 p.m.
320 users have already solved this challenge, 23 are working on it.
You need to be logged in to solve this challenge.
Description
Hybrid encryption is widely used in practice. However, when using hybrid
encryption you should take care of certain details... Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
Nov. 2, 2010, midnight
180 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
The Purple machine was the Japanese counterpart of the German Enigma machine.
Decrypt the given ciphertext which was encrypted with the Purple machine. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 27, 2010, midnight
21 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
To achieve a very fast decryption in RSA, one might choose the secret key to be rather small. It should, however, not be too small, since then it might be possible to mount brute-force attacks. The same holds for variants like RSA-CRT. Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
Oct. 25, 2010, 5 p.m.
77 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
This is the final part of a 3-part challenge regarding the classical transposition. You can solve this challenge with pen and paper or by writing a small computer program. In this challenge, the plaintext was first encrypted with a monoalphabetic substitution cipher. After that, the result was encrypted a second time with the irregular columnar transposition to create the final ciphertext. The used key length for the columnar tranposition has less than 10 characters. Show details…Hide details…
Author
A. Wacker
Publication
Oct. 23, 2010, 8 p.m.
loading…
Loading the list of solvers has failed. Please try again.
83 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.
Description
This is part 2 of a 3-part challenge regarding the classical transposition. You can solve this challenge with pen and paper as well as with different software programs. To create the ciphertext the plaintext was first encrypted with a classical shift cipher. The result of this encryption was then further encrypted with a columnar transposition with a key length of less than 10 characters. Show details…Hide details…
Author
A. Wacker
Publication
Oct. 23, 2010, 3 p.m.
loading…
Loading the list of solvers has failed. Please try again.
152 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
This is part 1 of a 3-part challenge regarding the classical transposition. You can solve this challenge with pen and paper as well as with adequate software programs (e.g. CrypTool 2). With this irregular columnar tranposition a key length greater than 10 was used. Show details…Hide details…
Author
A. Wacker
Publication
Oct. 23, 2010, 10 a.m.
loading…
Loading the list of solvers has failed. Please try again.
161 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.
Description
Homophonic substitution using 5 ciphertext characters for a binary cleartext alphabet. This challenge can be solved with paper & pencil. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 21, 2010, 7:51 p.m.
loading…
Loading the list of solvers has failed. Please try again.
350 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.
Description
Homophonic substitution using 3 ciphertext characters for a binary cleartext alphabet. This challenge can be solved with paper & pencil. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 21, 2010, 7:50 p.m.
loading…
Loading the list of solvers has failed. Please try again.
404 users have already solved this challenge, 75 are working on it.
You need to be logged in to solve this challenge.
Description
The Caesar encryption, a very simple example of a monoalphabetic substitution. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 21, 2010, 7:49 p.m.
1475 users have already solved this challenge, 800 are working on it.
You need to be logged in to solve this challenge.
Description
The encryption with the Sigaba machine was the American counterpart to the German Enigma. But due to the much larger key space of the Sigaba, even today, it is only feasible to break the code if parts of the key are known. This is what this challenge is about. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
18 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In present-days knowledge Triple-DES is secure if a really random key is used. If the key is not random and a part of the key may be guessed, it is possible to get knowledge of the rest of the key with a feasible bruteforce attack. Show details…Hide details…
Author
Nina Schöllhammer
Publication
Oct. 14, 2010, 1:30 p.m.
208 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
Decrypt the given ciphertext which is encrypted with the Sigaba machine.
Please give the letters in the key as capital letters.
This challenge has solutions that cannot be automatically checked. If you find such a solution and want to receive your points please write us an E-Mail. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
5 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Decrypt the given ciphertext which is encrypted with the Enigma chiper. The key conists of the configuration of the stecker and the initial setting of the three rotors. Please give the letters in the key as capital letters. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
92 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
Decrypt the given ciphertext which is encrypted with the Enigma chiper. The wanted key conists of the configuration of the Enigma. Please give the letters in the key as capital letters. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
132 users have already solved this challenge, 25 are working on it.
You need to be logged in to solve this challenge.
Description
In the late 1960s the so called Zodiac killer used a homophonic substitution encryption to encrypt letters to the police and the press. This challenge is inspired by the solved Zodiac-408 problem and the unsolved Zodiac-340 problem.
Hint: Provide the codeword in capital letters. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
101 users have already solved this challenge, 40 are working on it.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods!
Hint: Enter the codeword in hex with non-capital letters and a leading zero. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
48 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.
Description
The ORYX stream cipher consists of three 32-bit LFSRs X, A, B which are shifted differently depending on some bits in the LFSR X. The key stream is a combination of the highest 8 bits of each of the three LFSRs. It is neither feasible nor necessary to search the whole 96-bit key space, there are more efficient methods!
Hint: Enter the codeword in hex with non-capital letters. Show details…Hide details…
Author
Mark Stamp
Publication
Oct. 14, 2010, 1:30 p.m.
80 users have already solved this challenge, 9 are working on it.
You need to be logged in to solve this challenge.
Description
The longest key that has ever been publicly cracked by exhaustive key search was 64 bits long. The purpose of this challenge is to improve this world record by one bit. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
0 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
In 1923, a member of the Ku Klux Klan sent an encrypted telegram to one of his colleagues. This telegram could be preserved.
More than 60 years later, the US mathematician Cipher Deavours examined the telegram and was able to decipher it. In 1989, he published some of the details about the solution in the magazine Cryptologia („A Ku Klux Klan Cipher“, edition 3/1989). However, he didn‘t tell the complete solution – the last part was left to the reader as an exercise. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
42 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
This is a famous speech of a German soccer star - including a mistake. The codeword consists of 2 words, one after the other with no space. The first is the password used to encrypt the plaintext, and the second is the mistake in the decrypted text. (The plaintext is in German.) Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
562 users have already solved this challenge, 187 are working on it.
You need to be logged in to solve this challenge.
Description
This sequence is infinite, but you may recognize it after just 13 numbers. What is the 14th number?
Please type in the numeric expression of the number. Show details…Hide details…
Author
Bernhard Esslinger
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
4390 users have already solved this challenge, 431 are working on it.
You need to be logged in to solve this challenge.
Description
The author of the German book "The Art of Deciphering", written 1808 remains unknown. However, the editor signs the preface with a cipher (Semicolon Plus One Triangle Plus Circle Period). Is this the encrypted name of the author? Show details…Hide details…
Author
T. Schroedel
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
2 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.
Description
In 1885, the US businessman James Ward published a booklet about an allegedly true story of a hidden treasure. According to the story, in 1823, a man named Thomas Beale hid several tons of gold and silver in a secret place and described the location of it in three encrypted messages. One of these messages was cracked, but it doesn't contain enough information to locate the treasure.
The two other messages are unsolved. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
1 user has already solved this challenge.
You need to be logged in to solve this challenge.
Description
It is well known that RSA with a small private key is insecure. The company, Smart, Inc. has decided to try using special private keys that are large but have a small Hamming weight in order to speed up decryptions and signature generation. The question is whether these keys are safe. Try to reconstruct the private key d from the public parameters.
The codeword for this challenge is the private key d in decimal notation. Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
Oct. 14, 2010, 1:30 p.m.
24 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.
Description
During World War II, the Italian solider Antonio Marzi worked as a radio operator. He created more than 230 pages full of enciphered notes about his experiences. Unfortunately, he forgot one step of his enciphering method. Still today, his records have never been decrypted. Show details…Hide details…
Author
T. Schroedel
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
4 users have already solved this challenge.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on Jan. 25, 2014, 8:34 p.m., and thus it is no longer possible to get points for this challenge.
Description
It is also important to choose the parameters of an elliptic curve cryptosystem wisely. This was not done in this example, which should enable you to decrypt another ciphertext message from Malawi. The plaintext reveals the codeword, although this time it is not as closely related to the photo. Show details…Hide details…
Author
Ed Schaefer
Publication
Oct. 14, 2010, 1:30 p.m.
44 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.
Description
When creating RSA keys, it is important to choose the n and e parameters wisely. This was not done in this example, and thus you should be able to decipher this ciphertext message sent from Malawi. The plaintext gives the codeword, which is related to the photo. Show details…Hide details…
Author
Ed Schaefer
Publication
Oct. 14, 2010, 1:30 p.m.
207 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.
Description
In 1806, the young countess Julie finds a dress with an old enciphered letter in a pouch. It reveals a secret of one of Julie's ancestors. Can you break the cipher?
The codeword for this challenge is the last word of the letter (all uppercase). Show details…Hide details…
Author
T. Schroedel
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
181 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.
Description
Kryptos is a sculpture made by the US artist Jim Sanborn. It is located next to the headquarters of the CIA in Langley, VA. An encrypted message was written on the sculpture. The message consists of four independent parts.
The first three parts have been solved, but the fourth one has so far withstood every attempt at decryption. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
The double columnar transposition is considered one of the best manual encryption systems. Many secret organizations have made use of it or still use it today. As there are only a few publications on this method, it is not clear if and how a well-constructed double transposition cipher can be broken. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
2 users have already solved this challenge.
You need to be logged in to solve this challenge.
The solution for this challenge was made public on June 13, 2014, 9 a.m., and thus it is no longer possible to get points for this challenge.
Description
In 1897, the English composer Edward Elgar sent an encrypted message to a lover. So far, nobody has been able to decrypt it. This message is known today as the "Dorabella Cipher". Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
In 1939, the Russian-born Briton Alexander D'Agapeyeff published a book named "Codes and Ciphers". This book contains a ciphertext that was meant as an exercise. So far, nobody has been able to decrypt this ciphertext. In later editions of his book, this exercise was omitted – possibly because he had forgotten the solution himself. D'Agapeyeff may have made a mistake during the encryption procedure, which makes it now difficult to find the cleartext. Show details…Hide details…
Author
K. Schmeh
Publication
Oct. 14, 2010, 1:30 p.m.
0 users have already solved this challenge.
You need to be logged in to solve this challenge.
Description
Alice has learned from her mistake from last year. This year, she makes sure that the friends to whom she sends invitations for her birthday party all use unique RSA N parameters. However, this time she still makes another mistake that allows an adversary, Eve, to reconstruct the message.
Can you again decrypt this year's invitation? The codeword for this challenge is the location of Alice's party. Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
Oct. 14, 2010, 1:30 p.m.
298 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.
Description
Alice sends encrypted invitations for her birthday party to her friends. As it turns out, two of her friends use the same RSA parameter N. This fact allows an adversary Eve to decrypt the encrypted message without knowing the corresponding secret key.
Where does Alice's party take place? The codeword for this challenge is the location of Alice's party. Show details…Hide details…
Author
Lehrstuhl für Kryptologie u. IT-Sicherheit, Ruhr-Universität Bochum
Publication
Oct. 14, 2010, 1:30 p.m.
313 users have already solved this challenge, 25 are working on it.
You need to be logged in to solve this challenge.
Description
In September 1902, a book seller named Paul Winkler received a postcard in cipher. Sent from the nearby Mansfeld castle, it appears that a young lady wants to meet with Paul – secretly.
Find the name of the young lady and submit it as the codeword for this challenge. Use only capital letters. Show details…Hide details…
Author
T. Schroedel
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
132 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.
Description
This challenge contains three messages encrypted with classical ciphers. You will need break each of the ciphers and take note of the three codewords. When you have all three codewords, submit them in the form "codeword1-codeword2-codeword3". Please note that the codewords are case sensitive and you have only 5 trials to find the correct solution.
The MTC3 team wishes everybody much success and fun in finding the correct solution. Show details…Hide details…
Author
A. Wacker
Publication
Oct. 14, 2010, 1:30 p.m.
loading…
Loading the list of solvers has failed. Please try again.
191 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.