Powered by the CrypTool project

© 2009-2026 MysteryTwister

Contact | Legal Notice | Privacy

 Challenge list
LevelNameSolves
1Classical Ciphers^3208
1A Secret Message from Castle Mansfeld139
2Alice's Birthday Party (Part 1)351
2Alice's Birthday Party (Part 2)350
XD'Agapeyeff0
XDorabella0
XDouble Column Transposition2
XKryptos0
1Letter from the Alleged Countess Julie von Ortenburg189
2Not-so-Secret Message from Malawi — Part I (RSA)224
2Not-so-Secret Message from Malawi — Part II (ECC)45
XNotes of an Italian Soldier4
3RSA with Special d26
XBeale Ciphers1
XUnknown Author2
1Number Sequence4928
1Monoalphabetic Substitution596
XKu Klux Klan44
3World Record Challenge: Break 65 Bits of AES0
2ORYX Stream Cipher Part I83
2ORYX Stream Cipher Part II50
1Zodiac Cipher114
2Enigma Part 1139
2Enigma Part 299
3Sigaba Part 25
2Brute-Force-Attack on Triple-DES with Reduced Key Space252
2Sigaba Part 118
1A modified homophonic cipher with reduced alphabets — Part 1434
1A modified homophonic cipher with reduced alphabets — Part 2377
1Caesar Encryption1667
1Molehunt (Part 1/3)175
1Molehunt (Part 2/3)164
2Molehunt (Part 3/3)92
2Smartcard RSA83
2Purple 122
2Hybrid Encryption I195
1One-Time Pad with Flaws338
1Enigma Combinatorics122
2Akelarre Part 111
2CMEA 148
3CMEA 230
1Original Caesar Cipher3540
1Playfair Encryption145
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme50
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
1Kaskade-S/T — Part 1120
2Kaskade-S/T — Part 259
2Kaskade-S/T — Part 339
2Lattice Part 137
2Cracking SHA1-Hashed Passwords679
XTwelve-Year-Old Murder Case0
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1107
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 213
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
1Music Code — Part 145
2Music Code — Part 244
3Substitution Cipher with Non-Prefix Codes1
1Number Sequence — Part 22423
2Broadcasting and low exponent — RSA Attack266
2RSA: Two different keys — same ciphertext167
1ADFGVX — Part 1137
1ADFGVX — Part 2141
3Digital Signatures: DSA with Medium Fields0
2Unusual encryption using a diophantine equation71
1Modified Caesar Cipher266
1Pigpen with a twist — Part 1170
2Pigpen with a twist — Part 249
2Pigpen with a twist — Part 348
2A really long number sequence129
1Affine Codes / Modulo Arithmetic with N / Extended Euclid669
XThe third ENIGMA M4 message0
1Double Columnar Transposition134
1Grille Cipher556
1An Invisible Message74
1Turing Bombe Enigma I86
1Factorization Cipher — Part 1568
1Monoalphabetic substitution with camouflage — Part 174
2Unconcealed RSA messages57
2Factorization Cipher — Part 2160
2Monoalphabetic substitution with camouflage — Part 259
2Monoalphabetic substitution with camouflage — Part 355
1Monoalphabetic substitution with camouflage — Part 455
2Factorization Cipher — Part 3103
2AES key — encoded in the machine readable zone of a European ePassport94
2RSA Factoring Challenge: RSA-21064
2RSA Factoring Challenge: RSA-22047
2RSA Factoring Challenge: RSA-23040
3RSA Factoring Challenge: RSA-23229
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-2600
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-10240
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3300
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4400
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4800
3RSA Factoring Challenge: RSA-4900
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-20480
2Partial Key Exposure with RSA — Part 1114
1ECDH-Key Exchange for Beginners114
2Monoalphabetic Substitution with Camouflage — Part 536
1The Book Code: A Challenge for Bookworms169
1Number Sequence — Part 31180
1¿No Hablas Español? No problemo!195
1Number Sequence — Part 4970
1Number Sequence — Part 5135
XConcealed Messages — Vigenère's Night Sky16
2Keyshanc — Part 153
2Keyshanc — Part 243
1How do you become a big cryptographer?260
1An 'unhearable' message46
2Monoalphabetic Substitution with Camouflage — Part 62
1Letter to the Templars — Part 11162
1Letter to the Templars — Part 2931
1Beaver Code1389
2BCR code (Book-Caesar-RSA)82
2Letter to the Templars — Part 3777
1Recycled One-Time Pad82
1Strange Message from Thessaloniki55
1A hidden word995
1Playfair with hints about the grid137
1Enigma Messages98
1Cascading Encryption — Part 1/385
1Multilingual Monoalphabetic Substitution90
2Typex — Part 131
1Reserve Hand Procedure — Part 1210
2Cascading Encryption — Part 2/325
2Cascading Encryption — Part 3/316
2Typex — Part 225
1Snow White and the seven dwarfs326
2ORYX Stream Cipher — Part 3 (revised)31
3ORYX Stream Cipher — Part 4d0
2RSA Factoring Challenge: RSA-70469
1Nils away on travel200
1Hill Cipher with Sudoku Key125
1From Russia with Love334
1Enigma Messages with Repeated Letters — Part 1208
1Trifid Cipher145
1Enigma Messages with Repeated Letters — Part 2106
3Double Column Transposition Reloaded — Part 10
3Double Column Transposition Reloaded — Part 20
3Double Column Transposition Reloaded — Part 30
1Enigma Messages with Repeated Letters — Part 3104
1Enigma Messages with Repeated Letters — Part 496
1Enigma Messages with Repeated Letters — Part 596
2Spanish Strip Cipher — Part 138
2Spanish Strip Cipher — Part 235
XSpanish Strip Cipher — Part 30
2Double Column Transposition — Part 135
2ORYX Stream Cipher — Part 4a12
3ORYX Stream Cipher — Part 4b2
3ORYX Stream Cipher — Part 4c0
2Double Column Transposition — Part 342
2Double Column Transposition — Part 250
2Double Column Transposition — Part 457
2Double Column Transposition — Part 511
1M-138 — Part 1254
1Heartbleed — Part 190
1Heartbleed — Part 260
2Heartbleed — Part 333
2M-138 — Part 2153
2M-138 — Part 373
1The Last Note118
2M-138 — Part 435
2Handycipher — Part 17
2Handycipher — Part 29
3Handycipher — Part 38
1Number Sequence — Part 6199
1Number Sequence — Part 7114
2Extended Handycipher — Part 14
2Extended Handycipher — Part 24
2Extended Handycipher — Part 34
1A hidden word — Part 2145
2Weakened Handycipher — Part 118
2Weakened Handycipher — Part 216
2Weakened Handycipher — Part 316
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 20
2Double-Column Transposition/Granit — Part 30
2Flawed Usage of a OTP Cipher by the BND21
2Spirale — Part 18
2Spirale — Part 28
2Spirale — Part 36
3Spirale — Part 40
1Number Sequence — Part 8484
1Weakened Granit — Part 155
2Weakened Granit — Part 20
2Weakened Granit — Part 30
1News from Castle Mansfeld64
1Image Noise205
1New Year's Greetings — Part 168
1New Year's Greetings — Part 257
1New Year's Greetings — Part 353
1New Year's Greetings — Part 451
2New Year's Greetings — Part 518
3Handycipher — Part 45
3Handycipher — Part 56
3Handycipher — Part 66
3Extended Handycipher — Part 44
3Extended Handycipher — Part 54
3Extended Handycipher — Part 63
2Weakened Handycipher — Part 47
2Weakened Handycipher — Part 57
2Weakened Handycipher — Part 67
2ASAC — A Strong(er) ADFGVX Cipher — Part 121
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
3Handycipher — Part 72
3Handycipher — Part 83
3Handycipher — Part 93
2Hilly — Part 19
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
3ElsieFour — Part 14
2Weakened ElsieFour — Part 34
2Hilly — Part 21
1Number Sequence — Part 9154
1Advent-Challenge — Part 1622
2Advent-Challenge — Part 266
2AES ECB Wrong Encoding29
2Advent Challenge — Part 356
2Advent Challenge — Part 452
2The Einstein Enigma69
XThe Vatican Challenge — Part 13
XThe Vatican Challenge — Part 23
1Number Sequence — Part 10153
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 21
2Summer Job69
2Fastest in the West42
2Trendy Messenger40
1Modular Sequences110
1Autokey Cipher245
2Breaking a Filter Generator24
1Cryptanalysis Hacking Puzzles — Part 144
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2"The Road" — Part 19
2"The Road" — Part 22
2"The Road" — Part 30
1Cryptanalysis Hacking Puzzles — Part 2269
2Monoalphabetic Substitution with Nostradamus Flavor45
2Handycipher made in love — Part 131
2Homophonic Encryption — Part 154
2Homophonic Encryption — Part 248
2Homophonic Encryption — Part 346
2Homophonic Encryption — Part 445
2Handycipher made in love — Part 225
2Handycipher — Part 101
XThe Vatican Challenge — Part 30
XThe Vatican Challenge — Part 41
XThe Vatican Challenge — Part 50
2The T52 Sturgeon Challenge — Part 121
2The T52 Sturgeon Challenge — Part 220
2The T52 Sturgeon Challenge — Part 316
2The T52 Sturgeon Challenge — Part 414
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 99
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 58
2The T52 Sturgeon Challenge — Part 68
2The T52 Sturgeon Challenge — Part 78
2A Cloaked Substitution Cipher — Part 124
2A Cloaked Substitution Cipher — Part 223
3The Heavy T52 Sturgeon Challenge — Part 13
3The Heavy T52 Sturgeon Challenge — Part 24
3The Heavy T52 Sturgeon Challenge — Part 33
2Cipher ID — Part 120
2Polyphonic Substitution Cipher — Part 127
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Polyphonic Substitution Cipher — Part 225
2Differential Cryptanalysis — Part 25
2The LoRa Cipher: Logic Randomness — Part 130
2The SIGABA Challenge — Part 113
2The SIGABA Challenge — Part 210
3The SIGABA Challenge — Part 36
3The SIGABA Challenge — Part 45
1Polyhomophonic Substitution — Part 166
3The SIGABA Challenge — Part 52
2Polyhomophonic Substitution — Part 235
3The SIGABA Challenge — Part 61
2Polyhomophonic Substitution — Part 321
3The Heavy T52 Sturgeon Challenge — Part 46
3The Heavy T52 Sturgeon Challenge — Part 57
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 79
3The Heavy T52 Sturgeon Challenge — Part 80
3The Heavy T52 Sturgeon Challenge — Part 93
1Lightweight Introduction to Lattices — Part 172
1Lightweight Introduction to Lattices — Part 252
2Lightweight Introduction to Lattices — Part 341
2The SZ42 Challenge — Part 120
2The SZ42 Challenge — Part 220
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 418
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
1Find the right route — Part 1118
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 914
1Find the right route — Part 248
1Find the right route — Part 346
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
1Wheatstone Cryptograph — Part 1139
2Wheatstone Cryptograph — Part 220
2SIGABA CSP-889 — Part 12
2SIGABA CSP-889 — Part 22
3SIGABA CSP-889 — Part 32
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-2900 — Part 22
3SIGABA CSP-2900 — Part 32
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 1310
2Modified Vigenère Cipher14
1Alberti Challenge — Part 1196
2Alberti Challenge — Part 213
2Hill Cipher15
1Merkle-Hellman Knapsack Challenge - Part 1105
2Merkle-Hellman Knapsack Challenge — Part 218
1The Syllabary Cipher – Part 1359
2The Syllabary Cipher – Part 237
2The Syllabary Cipher – Part 324
2The Syllabary Cipher – Part 415
2The Syllabary Cipher – Part 515
3A Heavy SZ42 Challenge – Part 140
2The Josse Challenge – Part 117
2The Josse Challenge – Part 217
2The Josse Challenge – Part 314
2The Hutton Cipher – Part 128
2The Hutton Cipher – Part 229
2The Hutton Cipher – Part 34
2The Hutton Cipher – Part 44
2The Hutton Cipher – Part 50
1A disguised code95
2Elliptic Boogaloo – Part 15
3Elliptic Boogaloo – Part 24
3Elliptic Boogaloo – Part 34
2PX-1000 Encryption – Part 111
2The Fialka Challenge – Part 17
2The Fialka Challenge – Part 26
2The Fialka Challenge – Part 36
2The Lady Liz Challenge0
3Vinaigrette Signature Scheme4
1Bigram Substitution – Part 1 (Tutorial)70
2Bigram Substitution – Part 27
2Twisting the Rubik's Cube (Xmas Challenge)10