Powered by the CrypTool project

© 2009-2026 MysteryTwister

Contact | Legal Notice | Privacy

 Challenge list
LevelNameSolves
1ADFGVX — Part 1152
XConcealed Messages — Vigenère's Night Sky16
1A disguised code101
1A hidden word — Part 2147
1Alberti Challenge — Part 1200
1A Secret Message from Castle Mansfeld139
1An Invisible Message74
1An 'unhearable' message46
1Autokey Cipher249
1Number Sequence — Part 9156
1Caesar Encryption1673
1ADFGVX — Part 2142
1Cryptanalysis Hacking Puzzles — Part 145
1Assembly Point – Part 119
1Cryptanalysis Hacking Puzzles — Part 2270
1Bigram Substitution – Part 1 (Tutorial)77
1ECDH-Key Exchange for Beginners115
1Enigma Messages102
1Enigma Messages with Repeated Letters — Part 497
1Enigma Messages with Repeated Letters — Part 597
1Factorization Cipher — Part 1569
1Heartbleed — Part 260
1Grille Cipher557
1Image Noise206
3RSA Factoring Challenge: RSA-3300
1Music Code — Part 145
1Kaskade-S/T — Part 1122
1Letter to the Templars — Part 2933
1Merkle-Hellman Knapsack Challenge - Part 1107
1Modular Sequences112
1Monoalphabetic Substitution597
1Molehunt (Part 2/3)164
1Monoalphabetic substitution with camouflage — Part 174
1Monoalphabetic substitution with camouflage — Part 455
1¿No Hablas Español? No problemo!196
1New Year's Greetings — Part 452
1New Year's Greetings — Part 172
1New Year's Greetings — Part 260
1New Year's Greetings — Part 356
1News from Castle Mansfeld65
1Number Sequence — Part 4973
1Number Sequence — Part 7114
1Number Sequence — Part 5136
1Number Sequence — Part 6203
1Number Sequence — Part 31184
1Number Sequence — Part 22435
1Pigpen with a twist — Part 1171
1Playfair Encryption147
1The Syllabary Cipher – Part 1363
1Snow White and the seven dwarfs327
1The Book Code: A Challenge for Bookworms169
1Polyhomophonic Substitution — Part 166
1Turing Bombe Enigma I88
1Zodiac Cipher115
2A really long number sequence129
2A Cloaked Substitution Cipher — Part 126
2Advent Challenge — Part 454
2Advent Challenge — Part 358
2AES ECB Wrong Encoding33
2ASAC — A Strong(er) ADFGVX Cipher — Part 122
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4800
3Substitution Cipher with Non-Prefix Codes1
2BCR code (Book-Caesar-RSA)83
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Broadcasting and low exponent — RSA Attack266
2Cascading Encryption — Part 2/325
2Cipher ID — Part 120
2Differential Cryptanalysis — Part 25
2Double Column Transposition — Part 345
3The SIGABA Challenge — Part 38
2CMEA 148
2Double-Column Transposition/Granit — Part 20
2Double Column Transposition — Part 252
2Extended Handycipher — Part 14
2Elliptic Boogaloo – Part 16
2Double Column Transposition — Part 512
2Extended Handycipher — Part 24
2Enigma Part 2101
2Extended Handycipher — Part 34
2Factorization Cipher — Part 3104
2Flawed Usage of a OTP Cipher by the BND22
2Handycipher made in love — Part 131
2Handycipher — Part 101
2Handycipher — Part 29
2The Hutton Cipher – Part 34
2Hilly — Part 110
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2RSA Factoring Challenge: RSA-22047
2Twisting the Rubik's Cube11
2Homophonic Encryption — Part 347
2Polyhomophonic Substitution — Part 321
2Kaskade-S/T — Part 510
2Kaskade-S/T — Part 40
2Keyshanc — Part 153
2Keyshanc — Part 243
2Kaskade-S/T — Part 339
2Kaskade-S/T — Part 259
2Homophonic Encryption — Part 446
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)7
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme50
2Monoalphabetic substitution with camouflage — Part 259
2Monoalphabetic substitution with camouflage — Part 355
2Monoalphabetic Substitution with Camouflage — Part 537
2M-138 — Part 435
2Lightweight Introduction to Lattices — Part 348
2Monoalphabetic Substitution with Nostradamus Flavor46
2ORYX Stream Cipher Part II51
2Merkle-Hellman Knapsack Challenge — Part 220
2Not-so-Secret Message from Malawi — Part II (ECC)46
2Pigpen with a twist — Part 250
2Smartcard RSA83
2Polyhomophonic Substitution — Part 235
2Purple 122
2"The Road" — Part 19
2RSA Factoring Challenge: RSA-23040
2RSA Factoring Challenge: RSA-70469
2RSA Factoring Challenge: RSA-21064
2RSA: Two different keys — same ciphertext168
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-889 — Part 22
2Sigaba Part 118
2SIGABA CSP-2900 — Part 22
2Summer Job70
2The Hutton Cipher – Part 50
2Spirale — Part 28
2Spirale — Part 36
2The Fialka Challenge – Part 36
2The Hutton Cipher – Part 231
2The Einstein Enigma71
2The Fialka Challenge – Part 18
2The Fialka Challenge – Part 26
2The Josse Challenge – Part 219
3Elliptic Boogaloo – Part 25
2Hilly — Part 21
2The Hutton Cipher – Part 44
2"The Road" — Part 30
2The SIGABA Challenge — Part 113
2"The Road" — Part 22
2The Syllabary Cipher – Part 415
2The SZ42 Challenge — Part 120
2The SIGABA Challenge — Part 212
2Weakened Handycipher — Part 316
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
2The SZ42 Challenge — Part 1310
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 79
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 34
2The T52 Sturgeon Challenge — Part 910
2Typex — Part 131
2Typex — Part 225
2Unconcealed RSA messages58
2Weakened ElsieFour — Part 21
2Enigma Part 1141
2The Syllabary Cipher – Part 324
2Weakened Granit — Part 30
2Weakened Handycipher — Part 47
2Homophonic Encryption — Part 155
2Weakened Handycipher — Part 216
2Wheatstone Cryptograph — Part 221
2Weakened Handycipher — Part 57
3Double Column Transposition Reloaded — Part 30
3Digital Signatures: DSA with Medium Fields0
3World Record Challenge: Break 65 Bits of AES0
3Elliptic Boogaloo – Part 35
3Double Column Transposition Reloaded — Part 10
3ElsieFour — Part 14
3Extended Handycipher — Part 54
3Handycipher — Part 56
3Extended Handycipher — Part 63
3Handycipher — Part 45
3Handycipher — Part 66
1A hidden word999
3Handycipher — Part 83
3Double Column Transposition Reloaded — Part 20
3ORYX Stream Cipher — Part 4c0
3RSA Factoring Challenge: RSA-20480
3Handycipher — Part 93
3RSA Factoring Challenge: RSA-15360
3ORYX Stream Cipher — Part 4d0
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-4900
3Sigaba Part 25
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4400
3RSA with Special d26
3SIGABA CSP-889 — Part 32
3The Heavy T52 Sturgeon Challenge — Part 79
3The Heavy T52 Sturgeon Challenge — Part 93
3Vinaigrette Signature Scheme6
3The SIGABA Challenge — Part 53
3The SIGABA Challenge — Part 61
XDorabella0
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
XD'Agapeyeff0
XDouble Column Transposition2
1Beaver Code1393
XKu Klux Klan45
XSpanish Strip Cipher — Part 30
XThe Vatican Challenge — Part 13
3The Heavy T52 Sturgeon Challenge — Part 66
XNotes of an Italian Soldier4
3The SIGABA Challenge — Part 46
XThe Vatican Challenge — Part 30
3The Heavy T52 Sturgeon Challenge — Part 80
XTwelve-Year-Old Murder Case0
1Original Caesar Cipher3555
1Playfair with hints about the grid139
2Cracking SHA1-Hashed Passwords702
1Multilingual Monoalphabetic Substitution91
1Nils away on travel200
1Number Sequence4947
1Number Sequence — Part 8490
2Factorization Cipher — Part 2161
XThe Vatican Challenge — Part 23
1From Russia with Love334
2Hybrid Encryption I196
2Letter to the Templars — Part 3779
3Extended Handycipher — Part 44
2Hill Cipher16
1Classical Ciphers^3208
1Enigma Messages with Repeated Letters — Part 1209
2Advent-Challenge — Part 268
2The Syllabary Cipher – Part 238
1Find the right route — Part 346
XKryptos0
1Letter to the Templars — Part 11166
1M-138 — Part 1255
2Brute-Force-Attack on Triple-DES with Reduced Key Space252
2M-138 — Part 374
2Spanish Strip Cipher — Part 236
1Molehunt (Part 1/3)176
2Not-so-Secret Message from Malawi — Part I (RSA)224
2AES key — encoded in the machine readable zone of a European ePassport99
2Cascading Encryption — Part 3/316
1A modified homophonic cipher with reduced alphabets — Part 2377
1Hill Cipher with Sudoku Key126
1Trifid Cipher146
1Recycled One-Time Pad83
2Homophonic Encryption — Part 249
2Polyphonic Substitution Cipher — Part 226
1Affine Codes / Modulo Arithmetic with N / Extended Euclid670
1Enigma Combinatorics123
2Unusual encryption using a diophantine equation71
3ORYX Stream Cipher — Part 4b2
1The Last Note118
2ORYX Stream Cipher Part I83
1Enigma Messages with Repeated Letters — Part 3106
1Enigma Messages with Repeated Letters — Part 2107
1Find the right route — Part 248
2Music Code — Part 244
2Polyphonic Substitution Cipher — Part 128
2Trendy Messenger41
2The Josse Challenge – Part 316
2Akelarre Part 111
1Heartbleed — Part 190
2The SZ42 Challenge — Part 220
2The T52 Sturgeon Challenge — Part 221
2The SZ42 Challenge — Part 914
1Letter from the Alleged Countess Julie von Ortenburg189
1Modified Caesar Cipher266
2ASAC — A Strong(er) ADFGVX Cipher — Part 22
1Lightweight Introduction to Lattices — Part 176
1Weakened Granit — Part 155
3CMEA 231
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1108
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-23229
1Wheatstone Cryptograph — Part 1141
2Bigram Substitution – Part 28
2The T52 Sturgeon Challenge — Part 610
3The Heavy T52 Sturgeon Challenge — Part 58
2A Cloaked Substitution Cipher — Part 224
2Alice's Birthday Party (Part 2)351
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
2Lattice Part 139
2Double Column Transposition — Part 459
1Cascading Encryption — Part 1/385
3Handycipher — Part 38
1A modified homophonic cipher with reduced alphabets — Part 1434
1Advent-Challenge — Part 1628
1Double Columnar Transposition134
1Find the right route — Part 1120
1How do you become a big cryptographer?260
2Fastest in the West45
1Lightweight Introduction to Lattices — Part 255
2M-138 — Part 2154
2Modified Vigenère Cipher14
2Molehunt (Part 3/3)93
1Reserve Hand Procedure — Part 1211
1Number Sequence — Part 10154
1One-Time Pad with Flaws339
1Strange Message from Thessaloniki55
2ASAC — A Strong(er) ADFGVX Cipher — Part 31
2Breaking a Filter Generator25
2Alberti Challenge — Part 214
2Alice's Birthday Party (Part 1)352
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 30
2Double Column Transposition — Part 138
2The Lady Liz Challenge0
2Heartbleed — Part 333
2Monoalphabetic Substitution with Camouflage — Part 62
2Pigpen with a twist — Part 349
2PX-1000 Encryption – Part 111
2Spanish Strip Cipher — Part 138
2The Hutton Cipher – Part 129
2Spirale — Part 18
2Partial Key Exposure with RSA — Part 1114
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 418
2Weakened Granit — Part 20
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 213
2SIGABA CSP-889 — Part 12
2The Josse Challenge – Part 119
3Handycipher — Part 72
2The LoRa Cipher: Logic Randomness — Part 130
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3800
2The Syllabary Cipher – Part 515
3SIGABA CSP-2900 — Part 32
2The T52 Sturgeon Challenge — Part 122
3Spirale — Part 40
3The Heavy T52 Sturgeon Challenge — Part 13
XThe Vatican Challenge — Part 50
XUnknown Author2
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 510
3RSA Factoring Challenge: RSA-10240
2Handycipher made in love — Part 225
2Handycipher — Part 17
2ORYX Stream Cipher — Part 4a12
2New Year's Greetings — Part 518
2ORYX Stream Cipher — Part 3 (revised)31
2The T52 Sturgeon Challenge — Part 317
2The T52 Sturgeon Challenge — Part 415
2Weakened Handycipher — Part 67
3A Heavy SZ42 Challenge – Part 140
XBeale Ciphers1
2Weakened Handycipher — Part 118
3The Heavy T52 Sturgeon Challenge — Part 24
3The Heavy T52 Sturgeon Challenge — Part 33
3The Heavy T52 Sturgeon Challenge — Part 47
3RSA Factoring Challenge: RSA-2600
XThe third ENIGMA M4 message0
XThe Vatican Challenge — Part 41