Powered by the CrypTool project

© 2009-2024 MysteryTwister

Contact | Legal Notice | Privacy

We redesigned MysteryTwister, enjoy! Feedback
 Challenge list
LevelNameSolves
1Classical Ciphers^3192
1A Secret Message from Castle Mansfeld132
2Alice's Birthday Party (Part 1)323
2Alice's Birthday Party (Part 2)309
XD'Agapeyeff0
XDorabella0
XDouble Column Transposition2
XKryptos0
1Letter from the Alleged Countess Julie von Ortenburg181
2Not-so-Secret Message from Malawi — Part I (RSA)211
2Not-so-Secret Message from Malawi — Part II (ECC)44
XNotes of an Italian Soldier4
3RSA with Special d25
XBeale Ciphers1
XUnknown Author2
1Number Sequence4518
1Monoalphabetic Substitution568
XKu Klux Klan42
3World Record Challenge: Break 65 Bits of AES0
2ORYX Stream Cipher Part I81
2ORYX Stream Cipher Part II49
1Zodiac Cipher101
2Enigma Part 1135
2Enigma Part 294
3Sigaba Part 25
2Brute-Force-Attack on Triple-DES with Reduced Key Space218
2Sigaba Part 118
1A modified homophonic cipher with reduced alphabets — Part 1410
1A modified homophonic cipher with reduced alphabets — Part 2356
1Caesar Encryption1512
1Molehunt (Part 1/3)162
1Molehunt (Part 2/3)153
2Molehunt (Part 3/3)84
2Smartcard RSA77
2Purple 121
2Hybrid Encryption I181
1One-Time Pad with Flaws325
1Enigma Combinatorics109
2Akelarre Part 110
2CMEA 147
3CMEA 229
1Original Caesar Cipher3200
1Playfair Encryption133
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme49
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
1Kaskade-S/T — Part 1108
2Kaskade-S/T — Part 253
2Kaskade-S/T — Part 336
2Lattice Part 134
2Cracking SHA1-Hashed Passwords613
XTwelve-Year-Old Murder Case0
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1102
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 212
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
1Music Code — Part 143
2Music Code — Part 242
3Substitution Cipher with Non-Prefix Codes1
1Number Sequence — Part 22231
2Broadcasting and low exponent — RSA Attack248
2RSA: Two different keys — same ciphertext158
1ADFGVX — Part 1125
1ADFGVX — Part 2128
3Digital Signatures: DSA with Medium Fields0
2Unusual encryption using a diophantine equation70
1Modified Caesar Cipher243
1Pigpen with a twist — Part 1161
2Pigpen with a twist — Part 243
2Pigpen with a twist — Part 341
2A really long number sequence123
1Affine Codes / Modulo Arithmetic with N / Extended Euclid622
XThe third ENIGMA M4 message0
1Double Columnar Transposition121
1Grille Cipher515
1An Invisible Message66
1Turing Bombe Enigma I78
1Factorization Cipher — Part 1528
1Monoalphabetic substitution with camouflage — Part 168
2Unconcealed RSA messages53
2Factorization Cipher — Part 2152
2Monoalphabetic substitution with camouflage — Part 255
2Monoalphabetic substitution with camouflage — Part 351
1Monoalphabetic substitution with camouflage — Part 452
2Factorization Cipher — Part 398
2AES key — encoded in the machine readable zone of a European ePassport85
2RSA Factoring Challenge: RSA-21064
2RSA Factoring Challenge: RSA-22047
2RSA Factoring Challenge: RSA-23040
3RSA Factoring Challenge: RSA-23229
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-2600
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-10240
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3300
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4400
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4800
3RSA Factoring Challenge: RSA-4900
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-20480
2Partial Key Exposure with RSA — Part 192
1ECDH-Key Exchange for Beginners102
2Monoalphabetic Substitution with Camouflage — Part 534
1The Book Code: A Challenge for Bookworms157
1Number Sequence — Part 31069
1¿No Hablas Español? No problemo!178
1Number Sequence — Part 4882
1Number Sequence — Part 5111
XConcealed Messages — Vigenère's Night Sky16
2Keyshanc — Part 151
2Keyshanc — Part 242
1How do you become a big cryptographer?237
1An 'unhearable' message44
2Monoalphabetic Substitution with Camouflage — Part 62
1Letter to the Templars — Part 11081
1Letter to the Templars — Part 2862
1Beaver Code1258
2BCR code (Book-Caesar-RSA)75
2Letter to the Templars — Part 3735
1Recycled One-Time Pad73
1Strange Message from Thessaloniki51
1A hidden word893
1Playfair with hints about the grid124
1Enigma Messages87
1Cascading Encryption — Part 1/376
1Multilingual Monoalphabetic Substitution83
2Typex — Part 131
1Reserve Hand Procedure — Part 1201
2Cascading Encryption — Part 2/322
2Cascading Encryption — Part 3/315
2Typex — Part 225
1Snow White and the seven dwarfs306
2ORYX Stream Cipher — Part 3 (revised)31
3ORYX Stream Cipher — Part 4d0
2RSA Factoring Challenge: RSA-70469
1Nils away on travel183
1Hill Cipher with Sudoku Key112
1From Russia with Love306
1Enigma Messages with Repeated Letters — Part 1184
1Trifid Cipher132
1Enigma Messages with Repeated Letters — Part 291
3Double Column Transposition Reloaded — Part 10
3Double Column Transposition Reloaded — Part 20
3Double Column Transposition Reloaded — Part 30
1Enigma Messages with Repeated Letters — Part 392
1Enigma Messages with Repeated Letters — Part 483
1Enigma Messages with Repeated Letters — Part 586
2Spanish Strip Cipher — Part 135
2Spanish Strip Cipher — Part 234
XSpanish Strip Cipher — Part 30
2Double Column Transposition — Part 135
2ORYX Stream Cipher — Part 4a12
3ORYX Stream Cipher — Part 4b2
3ORYX Stream Cipher — Part 4c0
2Double Column Transposition — Part 342
2Double Column Transposition — Part 248
2Double Column Transposition — Part 453
2Double Column Transposition — Part 59
1M-138 — Part 1233
1Heartbleed — Part 190
1Heartbleed — Part 260
2Heartbleed — Part 333
2M-138 — Part 2142
2M-138 — Part 366
1The Last Note107
2M-138 — Part 432
2Handycipher — Part 16
2Handycipher — Part 28
3Handycipher — Part 37
1Number Sequence — Part 6174
1Number Sequence — Part 7100
2Extended Handycipher — Part 13
2Extended Handycipher — Part 23
2Extended Handycipher — Part 33
1A hidden word — Part 2122
2Weakened Handycipher — Part 117
2Weakened Handycipher — Part 215
2Weakened Handycipher — Part 315
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 20
2Double-Column Transposition/Granit — Part 30
2Flawed Usage of a OTP Cipher by the BND20
2Spirale — Part 18
2Spirale — Part 28
2Spirale — Part 36
3Spirale — Part 40
1Number Sequence — Part 8423
1Weakened Granit — Part 152
2Weakened Granit — Part 20
2Weakened Granit — Part 30
1News from Castle Mansfeld60
1Image Noise177
1New Year's Greetings — Part 154
1New Year's Greetings — Part 250
1New Year's Greetings — Part 348
1New Year's Greetings — Part 445
2New Year's Greetings — Part 516
3Handycipher — Part 44
3Handycipher — Part 55
3Handycipher — Part 65
3Extended Handycipher — Part 43
3Extended Handycipher — Part 53
3Extended Handycipher — Part 62
2Weakened Handycipher — Part 46
2Weakened Handycipher — Part 56
2Weakened Handycipher — Part 66
2ASAC — A Strong(er) ADFGVX Cipher — Part 120
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
3Handycipher — Part 72
3Handycipher — Part 83
3Handycipher — Part 93
2Hilly — Part 19
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
3ElsieFour — Part 14
2Weakened ElsieFour — Part 34
2Hilly — Part 21
1Number Sequence — Part 9128
1Advent-Challenge — Part 1530
2Advent-Challenge — Part 259
2AES ECB Wrong Encoding29
2Advent Challenge — Part 350
2Advent Challenge — Part 446
2The Einstein Enigma64
XThe Vatican Challenge — Part 13
XThe Vatican Challenge — Part 23
1Number Sequence — Part 10127
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 21
2Summer Job61
2Fastest in the West41
2Trendy Messenger37
1Modular Sequences86
1Autokey Cipher202
2Breaking a Filter Generator21
1Cryptanalysis Hacking Puzzles — Part 136
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2"The Road" — Part 19
2"The Road" — Part 22
2"The Road" — Part 30
1Cryptanalysis Hacking Puzzles — Part 2222
2Monoalphabetic Substitution with Nostradamus Flavor41
2Handycipher made in love — Part 129
2Homophonic Encryption — Part 147
2Homophonic Encryption — Part 242
2Homophonic Encryption — Part 340
2Homophonic Encryption — Part 440
2Handycipher made in love — Part 223
2Handycipher — Part 101
XThe Vatican Challenge — Part 30
XThe Vatican Challenge — Part 41
XThe Vatican Challenge — Part 50
2The T52 Sturgeon Challenge — Part 121
2The T52 Sturgeon Challenge — Part 220
2The T52 Sturgeon Challenge — Part 316
2The T52 Sturgeon Challenge — Part 414
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 99
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 58
2The T52 Sturgeon Challenge — Part 68
2The T52 Sturgeon Challenge — Part 78
2A Cloaked Substitution Cipher — Part 122
2A Cloaked Substitution Cipher — Part 221
3The Heavy T52 Sturgeon Challenge — Part 12
3The Heavy T52 Sturgeon Challenge — Part 23
3The Heavy T52 Sturgeon Challenge — Part 33
2Cipher ID — Part 118
2Polyphonic Substitution Cipher — Part 125
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Polyphonic Substitution Cipher — Part 223
2Differential Cryptanalysis — Part 25
2The LoRa Cipher: Logic Randomness — Part 129
2The SIGABA Challenge — Part 111
2The SIGABA Challenge — Part 29
3The SIGABA Challenge — Part 36
3The SIGABA Challenge — Part 45
1Polyhomophonic Substitution — Part 158
3The SIGABA Challenge — Part 52
2Polyhomophonic Substitution — Part 231
3The SIGABA Challenge — Part 61
2Polyhomophonic Substitution — Part 319
3The Heavy T52 Sturgeon Challenge — Part 46
3The Heavy T52 Sturgeon Challenge — Part 57
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 78
3The Heavy T52 Sturgeon Challenge — Part 80
3The Heavy T52 Sturgeon Challenge — Part 93
1Lightweight Introduction to Lattices — Part 162
1Lightweight Introduction to Lattices — Part 244
2Lightweight Introduction to Lattices — Part 337
2The SZ42 Challenge — Part 120
2The SZ42 Challenge — Part 220
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 418
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
1Find the right route — Part 1101
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 914
1Find the right route — Part 238
1Find the right route — Part 337
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
1Wheatstone Cryptograph — Part 1112
2Wheatstone Cryptograph — Part 216
2SIGABA CSP-889 — Part 12
2SIGABA CSP-889 — Part 22
3SIGABA CSP-889 — Part 32
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-2900 — Part 22
3SIGABA CSP-2900 — Part 32
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 1310
2Modified Vigenère Cipher11
1Alberti Challenge — Part 1149
2Alberti Challenge — Part 211
2Hill Cipher12
1Merkle-Hellman Knapsack Challenge - Part 175
2Merkle-Hellman Knapsack Challenge — Part 217
1The Syllabary Cipher – Part 1253
2The Syllabary Cipher – Part 231
2The Syllabary Cipher – Part 322
2The Syllabary Cipher – Part 414
2The Syllabary Cipher – Part 514
3A Heavy SZ42 Challenge – Part 140
2The Josse Challenge – Part 117
2The Josse Challenge – Part 217
2The Josse Challenge – Part 314
2The Hutton Cipher – Part 124
2The Hutton Cipher – Part 226
2The Hutton Cipher – Part 34
2The Hutton Cipher – Part 44
2The Hutton Cipher – Part 50
1A disguised code34
2Elliptic Boogaloo – Part 13
3Elliptic Boogaloo – Part 23
3Elliptic Boogaloo – Part 33
2PX-1000 Encryption – Part 111
2The Fialka Challenge – Part 14
2The Fialka Challenge – Part 23