Level I Challenges

89 published challenges (in level I), sorted by:

Description
The Wheatstone Cryptograph is a simple device that resembles a clock with two hands. For each hand there is a ring of symbols. Are you able to decrypt the given ciphertext?

Solve this challenge
44 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.

Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given three grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route?

Solve this challenge
19 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given four grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route?

Solve this challenge
22 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.

Description
This series deals with a grid — a basic tool cryptographers use to separate sequences of data into columns and rows. In this challenge you are given two grids where the first grid gives you hints to reveal the plaintext of the second grid. Are you able to find the right route?

Solve this challenge
56 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.

Description
Lattice-based cryptography schemes are relevant for current post-quantum cryptography research. This challenge series accompanies the basic theory from a chapter of the CrypTool Book called "LIGHTWEIGHT INTRODUCTION TO LATTICES". This part of the challenge series uses vectors to hide a famous quote in modern art. Can you reveal it?

Solve this challenge
28 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.

Description
Lattice-based cryptography schemes are relevant for current post-quantum cryptography research. This challenge series accompanies the basic theory from a chapter of the CrypTool Book called "LIGHTWEIGHT INTRODUCTION TO LATTICES". In this part of the challenge series we introduce systems of linear equations to find a hidden message in a picture.

Solve this challenge
40 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.

Description
This part of the challenge series is a warm-up with homophonic substitution. In a homophonic substitution cipher, there are more than one ciphertext symbol for each plaintext symbol. The key is a mapping.

Solve this challenge
33 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.

Description
Solving this challenge is not as hard as finding the needle in a haystack, isn't it?

Solve this challenge
152 users have already solved this challenge, 36 are working on it.
You need to be logged in to solve this challenge.

Description
Three messages were delivered — two encrypted, one in clear. Can you solve the puzzle?

Solve this challenge
26 users have already solved this challenge, 29 are working on it.
You need to be logged in to solve this challenge.

Description
The autokey cipher uses only a short keyword and the plaintext to encrypt messages. Are you able to break the given ciphertext?

Solve this challenge
137 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.

Description
What do you know about modular sequences? Work it out.

Solve this challenge
58 users have already solved this challenge, 28 are working on it.
You need to be logged in to solve this challenge.

Description
How many experience points does Thomas need to reach the 200th level of his new computer game?

Solve this challenge
100 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.

Description
Little Anna has forgotten how to decrypt her ciphertext. Can you come up to her pre-Christmas wish?

Solve this challenge
399 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.

Description
Are you able to crack the password of Radomil and find the missing 5 digits?

Solve this challenge
105 users have already solved this challenge, 57 are working on it.
You need to be logged in to solve this challenge.

Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. This part is the actual challenge and tells you the New Year's greeting of the author.

Solve this challenge
38 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.

Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 3 adds another modification.

Solve this challenge
41 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 2 modifies the encryption of part 1 a little bit.

Solve this challenge
43 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.

Description
This series consists of five parts which are based on each other and that will be getting more and more complicated with each part. Part 4 contains a little New Year's greeting of the author and part 5 teaches us something about the weaknesses of this method. Part 1 is the easiest part of this series.

Solve this challenge
47 users have already solved this challenge, 16 are working on it.
You need to be logged in to solve this challenge.

Description
Both images in this challenge seem to contain no information at all. Or do they trick us? Find the secret message.

Solve this challenge
120 users have already solved this challenge, 22 are working on it.
You need to be logged in to solve this challenge.

Description
The story of the simple bookseller Paul from Eisleben and his beloved from the near Castle Mansfeld will be continued: A second postcard has been found. Can you decipher the encrypted message?

Solve this challenge
52 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.

Description
The challenges for the simplified GRANIT cipher, a method that can be done manually, serve as an exercise and use an intentionally simplified version of GRANIT. Part 1 is a ciphertext-only challenge for which both permutation keys are known.

Solve this challenge
43 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.

Description
How are the numbers interconnected? Can you find the three missing numbers?

Solve this challenge
352 users have already solved this challenge, 23 are working on it.
You need to be logged in to solve this challenge.

Description
A friend of yours has given you the following text which contains only X and Y characters. He claims that this text contains a codeword. Can you find it?

Solve this challenge
99 users have already solved this challenge, 43 are working on it.
You need to be logged in to solve this challenge.

Description
How are the numbers linked? Can you find the two missing numbers?

Solve this challenge
85 users have already solved this challenge, 30 are working on it.
You need to be logged in to solve this challenge.

Description
How are the numbers linked? Can you find the two missing numbers?

Solve this challenge
145 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.

Description
This is the beginner's challenge in a series about M-138, a manual cipher of the US army which has been relatively save at the beginning of world war 2nd. Part 1 of the series is a ciphertext-only challenge whose key is largely known.

Solve this challenge
200 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.

Description
You can find a short encrypted note at the end of the novel "Die achte Offenbarung" by Karl Olsberg. Decrypt the secret message!

Solve this challenge
86 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.

Description
This challenge is based on the Heartbleed bug in OpenSSL discovered in April 2014. Attack a server which is specifically prepared to be vulnerable to the Heartbleed bug. Please note that it is necessary to solve Part 1 first.

Solve this challenge
60 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.

Description
This challenge is based on the Heartbleed Bug in OpenSSL discovered in April 2014. Attack a server provided by the group for Privacy and Compliance with the Research Institute Cyber Defence (CODE) at Bundeswehr University Munich, which is specifically prepared to be vulnerable to the Heartbleed bug.

Solve this challenge
90 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.

Description
In this part of this series of Enigma challenges, a plaintext message consisting of three letters which are repeated several times has been encrypted by the Enigma I. What are the first three letters of the plaintext?

Solve this challenge
74 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.

Description
In this part of this series of Enigma challenges, a plaintext message consisting of three letters which are repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors?

Solve this challenge
69 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
In this part of this series of Enigma challenges, a plaintext message consisting of two letters which are repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors?

Solve this challenge
77 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
In this part of this series of Enigma challenges, a plaintext message consisting of one letter which is repeated several times has been encrypted by the Enigma I. What was the setting of the Enigma rotors?

Solve this challenge
77 users have already solved this challenge, 16 are working on it.
You need to be logged in to solve this challenge.

Description
Two scatterbrained professors exchange messages that have been encrypted with the Trifid cipher. Unfortunately, one of them lost the second of three layers. Will he nevertheless be able to decrypt the message he received from his colleague?

Solve this challenge
117 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.

Description
In this part of this series of Enigma challenges, a plaintext message consisting of one letter which is repeated several times has been encrypted by the Enigma I. What is the letter we are looking for?

Solve this challenge
166 users have already solved this challenge, 23 are working on it.
You need to be logged in to solve this challenge.

Description
You find a note with strange characters and an unsolved Sudoku on your brother's desk. You are curious and would like to find out what your brother is working on. Can you decrypt the note using the Sudoku?

Solve this challenge
88 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
Sarah and Igor are exchange students. Sarah lives in Moscow while Igor is in Berlin. To keep their little secrets confidential, they encrypt their emails. Decrypt the message to find out what Sarah wrote this time.

Solve this challenge
267 users have already solved this challenge, 24 are working on it.
You need to be logged in to solve this challenge.

Description
Nils would like to go on a journey and has given you a note with information about his destination. The note is encrypted. Can you find out where he would like to go?

Solve this challenge
161 users have already solved this challenge, 10 are working on it.
You need to be logged in to solve this challenge.

Description
The seven dwarfs are missing. Snow White however finds a file, which contains useful information steganographically hidden. Help her to find the dwarfs.

Solve this challenge
280 users have already solved this challenge, 69 are working on it.
You need to be logged in to solve this challenge.

Description
The reserve hand procedure has been used as a replacement of the Enigma machine. Can you decrypt the given ciphertext?

Solve this challenge
187 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.

Description
The plaintext consists of English, French, German and Italian words. Can you identify the four sentences after you have solved the monoalphabetic substitution?

Solve this challenge
73 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.

Description
Can you break this cascading encryption that consists of a combination of substitution and transposition? The solution contains important information for the next parts.

Solve this challenge
67 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.

Description
Can you find the plaintext using 26 Engima ciphertexts that have been encrypted with different rotors and different initial settings?

Solve this challenge
74 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.

Description
In this challenge, only fragments of the grid used for a Playfair encryption are given. Are you able to reconstruct the matrix and decrypt the message?

Solve this challenge
104 users have already solved this challenge, 4 are working on it.
You need to be logged in to solve this challenge.

Description
This PDF file is supposed to contain a hidden codeword. Can you find it?

Solve this challenge
786 users have already solved this challenge, 154 are working on it.
You need to be logged in to solve this challenge.

Description
This postcard from Thessaloniki was written in German in 1897. The encrypted text can either be considered as message from the sailor Fritz to his wife at home, or as a note regarding spionage activities. Can you determine the codeword that was used to request secret information?

Solve this challenge
46 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.

Description
Can you decrypt the three military messages?

Solve this challenge
63 users have already solved this challenge, 12 are working on it.
You need to be logged in to solve this challenge.

Description
The Beaver Code is a transposition cipher. Apart from the solution of this challenge, can you find a formula for any given ciphertext length, which generates the permutation needed to decrypt the ciphertext?

Solve this challenge
1142 users have already solved this challenge, 39 are working on it.
You need to be logged in to solve this challenge.

Description
Can you decrypt the second part of the letter to the Templars as effortlessly as the first one?

Solve this challenge
798 users have already solved this challenge, 11 are working on it.
You need to be logged in to solve this challenge.

Description
After the Order of the Templar has become very powerful, enviers try to crush it. The knights receive an encrypted letter but the key does not arrive. Does this letter contain the warning that would have saved the knights from being arrested?

Solve this challenge
996 users have already solved this challenge, 40 are working on it.
You need to be logged in to solve this challenge.

Description
Your friend sent you an audio file that contains only a strange melody. In the email, your friend writes that the file contains a message encoded by a variant of Morse code. Can you find out how you can hear the Morse code? Show details…Hide details…

Solve this challenge
40 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.

Description
You are invited to a job interview for the job of a cryptographer. Can you pass the first selection round?

Solve this challenge
218 users have already solved this challenge, 101 are working on it.
You need to be logged in to solve this challenge.

Description
How are the numbers linked? Can you find the three missing numbers?

Solve this challenge
89 users have already solved this challenge, 123 are working on it.
You need to be logged in to solve this challenge.

Description
Can you find the link between these numbers?

Solve this challenge
785 users have already solved this challenge, 20 are working on it.
You need to be logged in to solve this challenge.

Description
You don't speak Spanish? No Problem! Try to decrypt a ciphertext in a foreign language without knowledge of that language.

Solve this challenge
146 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.

Description
This number sequence is cyclic. Can you find out the fifth and sixth number?

Solve this challenge
953 users have already solved this challenge, 103 are working on it.
You need to be logged in to solve this challenge.

Description
In order to decrypt the intercepted letter addressed to your neighbor, you need to find out which document has been used to encode the message with the book code.

Solve this challenge
141 users have already solved this challenge, 24 are working on it.
You need to be logged in to solve this challenge.

Description
Alice and Bob would like to agree upon a shared key. They use an Elliptic Curve Diffie-Hellman (ECDH) key-exchange protocol. Try to reproduce the steps that are necessary to calculate the key and to decrypt Bob's message.

Solve this challenge
88 users have already solved this challenge, 3 are working on it.
You need to be logged in to solve this challenge.

Description
Alice and Bob use the cipher as it had been described in part 3 of this challenge. Due to an error one message has been encrypted and sent twice. Does this help you to find out the shared key and enables you to decrypt a third message easily?

Solve this challenge
46 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.

Description
It is not difficult to break a monoalphabetic substitution but in this challenge an additional camouflage alphabet causes confusion.

Solve this challenge
60 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.

Description
With the help of 7 pairs of plaintext-ciphertext you have to find out how this factorization cipher works and then decrypt a ciphertext.

Solve this challenge
479 users have already solved this challenge, 10 are working on it.
You need to be logged in to solve this challenge.

Description
You intercepted two ENIGMA I messages. Both are dated from the same day. Use a Turing Bombe to find out the key of the day and decipher the solution.

Solve this challenge
68 users have already solved this challenge, 1 is working on it.
You need to be logged in to solve this challenge.

Description
A friend of yours sent you a file that seems to be empty. Was it just a mistake or is there a secret to reveal?

Solve this challenge
56 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.

Description
You need to reconstruct some fields of the grille to decrypt the message written on an old note.

Solve this challenge
462 users have already solved this challenge, 34 are working on it.
You need to be logged in to solve this challenge.

Description
Asterix and Obelix besiege Rome. They just happened to find an encrypted message but instead of the common Caesar Cipher the Romans used a new method. Can you decrypt the message?

Solve this challenge
106 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.

Description
Two girls want to communicate in a secret way using the „affine cipher“. Transform the encryption rule into the decryption rule and turn in the plaintext of the example.

Solve this challenge
559 users have already solved this challenge, 10 are working on it.
You need to be logged in to solve this challenge.

Description
In this challenge the rotational relationship between the Pigpen symbols are used to create a new cipher. In this part the well-known key squares are used as a warm up.

Solve this challenge
148 users have already solved this challenge, 5 are working on it.
You need to be logged in to solve this challenge.

Description
The Caesar Chiper is rather simple. But in this challenge it is used with a different alphabet and a modified way of shifting the letters.

Solve this challenge
218 users have already solved this challenge, 48 are working on it.
You need to be logged in to solve this challenge.

Description
A pair of plaintext and the corresponding ciphertext encrypted with the ADFGVX cipher ist given. Can you reveal the substitution and transposition key used in this example?

Solve this challenge
114 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.

Description
A small ciphertext encrypted with the ADFGVX cipher, which has been used during World War I, is given. Are you able to reveal the plaintext message?

Solve this challenge
108 users have already solved this challenge, 9 are working on it.
You need to be logged in to solve this challenge.

Description
This sequence is infinite, the first 9 numbers are given. What are the 10th and 11th number?

Solve this challenge
2037 users have already solved this challenge, 458 are working on it.
You need to be logged in to solve this challenge.

Description
A piece of music is given as mp3 file and in music notation. The notes represent a secret message, which was encrypted with two classic methods. In part 1 of this challenge you have to solve the first of these methods. Thereafter, you can set out to solve part 2 (which is in level 2).

Solve this challenge
41 users have already solved this challenge, 28 are working on it.
You need to be logged in to solve this challenge.

Description
By the time quantum computers exist, the actual signing algorithms are not secure anymore. Then one can switch e.g. to so-called "Unbalanced Oil and Vinegar" systems. It is your challenge to break a simplified version of such a system today already.

Solve this challenge
94 users have already solved this challenge, 2 are working on it.
You need to be logged in to solve this challenge.

Description
A friend sends you a cipher designed by him and asks you to discover the used key, using a given plaintext and the corresponding ciphertext.

Solve this challenge
101 users have already solved this challenge, 6 are working on it.
You need to be logged in to solve this challenge.

Description
In this challenge you shall break the Playfair encryption which was used by the British forces in the Crimean War and in World War I, among others.

Solve this challenge
107 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.

Description
In this challenge you shall break the Caesar encryption in its original form.

Solve this challenge
2887 users have already solved this challenge, 132 are working on it.
You need to be logged in to solve this challenge.

Description
The Enigma is an electro-mechanical rotor machine used for encryption and decryption. One main part of the Enigma is changeable rotors. This challenge deals with the calculation of the key space.

Solve this challenge
97 users have already solved this challenge, 63 are working on it.
You need to be logged in to solve this challenge.

Description
The "Three Investigators" heard that it was possible to create truly unbreakable cipher texts if you linked a stream of true random numbers to the plaintext (one-time pad). However this random stream must be incalculable for outsiders. Do you think you can, nevertheless, decrypt an eavesdropped encrypted message from the "Three Investigators"?

Solve this challenge
300 users have already solved this challenge, 17 are working on it.
You need to be logged in to solve this challenge.

Description
This is part 2 of a 3-part challenge regarding the classical transposition. You can solve this challenge with pen and paper as well as with different software programs. To create the ciphertext the plaintext was first encrypted with a classical shift cipher. The result of this encryption was then further encrypted with a columnar transposition with a key length of less than 10 characters.

Solve this challenge
138 users have already solved this challenge, 7 are working on it.
You need to be logged in to solve this challenge.

Description
This is part 1 of a 3-part challenge regarding the classical transposition. You can solve this challenge with pen and paper as well as with adequate software programs (e.g. CrypTool 2). With this irregular columnar tranposition a key length greater than 10 was used.

Solve this challenge
146 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.

Description
Homophonic substitution using 5 ciphertext characters for a binary cleartext alphabet. This challenge can be solved with paper & pencil.

Solve this challenge
324 users have already solved this challenge, 8 are working on it.
You need to be logged in to solve this challenge.

Description
Homophonic substitution using 3 ciphertext characters for a binary cleartext alphabet. This challenge can be solved with paper & pencil.

Solve this challenge
377 users have already solved this challenge, 67 are working on it.
You need to be logged in to solve this challenge.

Description
The Caesar encryption, a very simple example of a monoalphabetic substitution.

Solve this challenge
1378 users have already solved this challenge, 717 are working on it.
You need to be logged in to solve this challenge.

Description
In the late 1960s the so called Zodiac killer used a homophonic substitution encryption to encrypt letters to the police and the press. This challenge is inspired by the solved Zodiac-408 problem and the unsolved Zodiac-340 problem. Hint: Provide the codeword in capital letters.

Solve this challenge
93 users have already solved this challenge, 37 are working on it.
You need to be logged in to solve this challenge.

Description
This is a famous speech of a German soccer star - including a mistake. The codeword consists of 2 words, one after the other with no space. The first is the password used to encrypt the plaintext, and the second is the mistake in the decrypted text. (The plaintext is in German.)

Solve this challenge
532 users have already solved this challenge, 175 are working on it.
You need to be logged in to solve this challenge.

Description
This sequence is infinite, but you may recognize it after just 13 numbers. What is the 14th number? Please type in the numeric expression of the number.

Solve this challenge
4168 users have already solved this challenge, 427 are working on it.
You need to be logged in to solve this challenge.

Description
In 1806, the young countess Julie finds a dress with an old enciphered letter in a pouch. It reveals a secret of one of Julie's ancestors. Can you break the cipher? The codeword for this challenge is the last word of the letter (all uppercase).

Solve this challenge
172 users have already solved this challenge, 18 are working on it.
You need to be logged in to solve this challenge.

Description
In September 1902, a book seller named Paul Winkler received a postcard in cipher. Sent from the nearby Mansfeld castle, it appears that a young lady wants to meet with Paul – secretly. Find the name of the young lady and submit it as the codeword for this challenge. Use only capital letters.

Solve this challenge
122 users have already solved this challenge, 19 are working on it.
You need to be logged in to solve this challenge.

Description
This challenge contains three messages encrypted with classical ciphers. You will need break each of the ciphers and take note of the three codewords. When you have all three codewords, submit them in the form "codeword1-codeword2-codeword3". Please note that the codewords are case sensitive and you have only 5 trials to find the correct solution. The MTC3 team wishes everybody much success and fun in finding the correct solution.

Solve this challenge
170 users have already solved this challenge, 14 are working on it.
You need to be logged in to solve this challenge.

Currently 23 guests and 0 members are online.
Powered by the CrypTool project
© 2009-2021 MysteryTwister team