Powered by the CrypTool project

© 2009-2025 MysteryTwister

Contact | Legal Notice | Privacy

We redesigned MysteryTwister, enjoy! Feedback
 Challenge list
LevelNameSolves
1Classical Ciphers^3200
1A Secret Message from Castle Mansfeld136
2Alice's Birthday Party (Part 1)336
2Alice's Birthday Party (Part 2)337
XD'Agapeyeff0
XDorabella0
XDouble Column Transposition2
XKryptos0
1Letter from the Alleged Countess Julie von Ortenburg185
2Not-so-Secret Message from Malawi — Part I (RSA)218
2Not-so-Secret Message from Malawi — Part II (ECC)44
XNotes of an Italian Soldier4
3RSA with Special d25
XBeale Ciphers1
XUnknown Author2
1Number Sequence4693
1Monoalphabetic Substitution583
XKu Klux Klan44
3World Record Challenge: Break 65 Bits of AES0
2ORYX Stream Cipher Part I81
2ORYX Stream Cipher Part II49
1Zodiac Cipher110
2Enigma Part 1136
2Enigma Part 297
3Sigaba Part 25
2Brute-Force-Attack on Triple-DES with Reduced Key Space245
2Sigaba Part 118
1A modified homophonic cipher with reduced alphabets — Part 1424
1A modified homophonic cipher with reduced alphabets — Part 2367
1Caesar Encryption1583
1Molehunt (Part 1/3)169
1Molehunt (Part 2/3)160
2Molehunt (Part 3/3)90
2Smartcard RSA80
2Purple 121
2Hybrid Encryption I187
1One-Time Pad with Flaws331
1Enigma Combinatorics115
2Akelarre Part 111
2CMEA 147
3CMEA 230
1Original Caesar Cipher3346
1Playfair Encryption140
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme49
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
1Kaskade-S/T — Part 1113
2Kaskade-S/T — Part 257
2Kaskade-S/T — Part 338
2Lattice Part 135
2Cracking SHA1-Hashed Passwords655
XTwelve-Year-Old Murder Case0
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1105
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 212
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
1Music Code — Part 144
2Music Code — Part 243
3Substitution Cipher with Non-Prefix Codes1
1Number Sequence — Part 22320
2Broadcasting and low exponent — RSA Attack258
2RSA: Two different keys — same ciphertext163
1ADFGVX — Part 1131
1ADFGVX — Part 2134
3Digital Signatures: DSA with Medium Fields0
2Unusual encryption using a diophantine equation70
1Modified Caesar Cipher256
1Pigpen with a twist — Part 1166
2Pigpen with a twist — Part 247
2Pigpen with a twist — Part 346
2A really long number sequence124
1Affine Codes / Modulo Arithmetic with N / Extended Euclid646
XThe third ENIGMA M4 message0
1Double Columnar Transposition128
1Grille Cipher537
1An Invisible Message71
1Turing Bombe Enigma I83
1Factorization Cipher — Part 1551
1Monoalphabetic substitution with camouflage — Part 172
2Unconcealed RSA messages56
2Factorization Cipher — Part 2158
2Monoalphabetic substitution with camouflage — Part 258
2Monoalphabetic substitution with camouflage — Part 354
1Monoalphabetic substitution with camouflage — Part 454
2Factorization Cipher — Part 3101
2AES key — encoded in the machine readable zone of a European ePassport89
2RSA Factoring Challenge: RSA-21064
2RSA Factoring Challenge: RSA-22047
2RSA Factoring Challenge: RSA-23040
3RSA Factoring Challenge: RSA-23229
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-2600
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-10240
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3300
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4400
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4800
3RSA Factoring Challenge: RSA-4900
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-20480
2Partial Key Exposure with RSA — Part 199
1ECDH-Key Exchange for Beginners108
2Monoalphabetic Substitution with Camouflage — Part 536
1The Book Code: A Challenge for Bookworms163
1Number Sequence — Part 31115
1¿No Hablas Español? No problemo!185
1Number Sequence — Part 4921
1Number Sequence — Part 5117
XConcealed Messages — Vigenère's Night Sky16
2Keyshanc — Part 152
2Keyshanc — Part 243
1How do you become a big cryptographer?250
1An 'unhearable' message45
2Monoalphabetic Substitution with Camouflage — Part 62
1Letter to the Templars — Part 11116
1Letter to the Templars — Part 2893
1Beaver Code1317
2BCR code (Book-Caesar-RSA)79
2Letter to the Templars — Part 3755
1Recycled One-Time Pad78
1Strange Message from Thessaloniki53
1A hidden word943
1Playfair with hints about the grid130
1Enigma Messages93
1Cascading Encryption — Part 1/381
1Multilingual Monoalphabetic Substitution88
2Typex — Part 131
1Reserve Hand Procedure — Part 1205
2Cascading Encryption — Part 2/324
2Cascading Encryption — Part 3/316
2Typex — Part 225
1Snow White and the seven dwarfs318
2ORYX Stream Cipher — Part 3 (revised)31
3ORYX Stream Cipher — Part 4d0
2RSA Factoring Challenge: RSA-70469
1Nils away on travel191
1Hill Cipher with Sudoku Key119
1From Russia with Love320
1Enigma Messages with Repeated Letters — Part 1192
1Trifid Cipher139
1Enigma Messages with Repeated Letters — Part 297
3Double Column Transposition Reloaded — Part 10
3Double Column Transposition Reloaded — Part 20
3Double Column Transposition Reloaded — Part 30
1Enigma Messages with Repeated Letters — Part 398
1Enigma Messages with Repeated Letters — Part 489
1Enigma Messages with Repeated Letters — Part 592
2Spanish Strip Cipher — Part 137
2Spanish Strip Cipher — Part 234
XSpanish Strip Cipher — Part 30
2Double Column Transposition — Part 135
2ORYX Stream Cipher — Part 4a12
3ORYX Stream Cipher — Part 4b2
3ORYX Stream Cipher — Part 4c0
2Double Column Transposition — Part 342
2Double Column Transposition — Part 249
2Double Column Transposition — Part 456
2Double Column Transposition — Part 510
1M-138 — Part 1243
1Heartbleed — Part 190
1Heartbleed — Part 260
2Heartbleed — Part 333
2M-138 — Part 2149
2M-138 — Part 370
1The Last Note114
2M-138 — Part 434
2Handycipher — Part 17
2Handycipher — Part 29
3Handycipher — Part 38
1Number Sequence — Part 6185
1Number Sequence — Part 7107
2Extended Handycipher — Part 13
2Extended Handycipher — Part 23
2Extended Handycipher — Part 33
1A hidden word — Part 2130
2Weakened Handycipher — Part 118
2Weakened Handycipher — Part 216
2Weakened Handycipher — Part 316
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 20
2Double-Column Transposition/Granit — Part 30
2Flawed Usage of a OTP Cipher by the BND20
2Spirale — Part 18
2Spirale — Part 28
2Spirale — Part 36
3Spirale — Part 40
1Number Sequence — Part 8452
1Weakened Granit — Part 153
2Weakened Granit — Part 20
2Weakened Granit — Part 30
1News from Castle Mansfeld63
1Image Noise187
1New Year's Greetings — Part 158
1New Year's Greetings — Part 254
1New Year's Greetings — Part 351
1New Year's Greetings — Part 448
2New Year's Greetings — Part 516
3Handycipher — Part 44
3Handycipher — Part 55
3Handycipher — Part 65
3Extended Handycipher — Part 43
3Extended Handycipher — Part 53
3Extended Handycipher — Part 62
2Weakened Handycipher — Part 47
2Weakened Handycipher — Part 57
2Weakened Handycipher — Part 67
2ASAC — A Strong(er) ADFGVX Cipher — Part 120
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
3Handycipher — Part 72
3Handycipher — Part 83
3Handycipher — Part 93
2Hilly — Part 19
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
3ElsieFour — Part 14
2Weakened ElsieFour — Part 34
2Hilly — Part 21
1Number Sequence — Part 9139
1Advent-Challenge — Part 1575
2Advent-Challenge — Part 261
2AES ECB Wrong Encoding29
2Advent Challenge — Part 351
2Advent Challenge — Part 447
2The Einstein Enigma67
XThe Vatican Challenge — Part 13
XThe Vatican Challenge — Part 23
1Number Sequence — Part 10136
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 21
2Summer Job66
2Fastest in the West41
2Trendy Messenger37
1Modular Sequences96
1Autokey Cipher223
2Breaking a Filter Generator22
1Cryptanalysis Hacking Puzzles — Part 137
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2"The Road" — Part 19
2"The Road" — Part 22
2"The Road" — Part 30
1Cryptanalysis Hacking Puzzles — Part 2239
2Monoalphabetic Substitution with Nostradamus Flavor45
2Handycipher made in love — Part 130
2Homophonic Encryption — Part 152
2Homophonic Encryption — Part 247
2Homophonic Encryption — Part 345
2Homophonic Encryption — Part 444
2Handycipher made in love — Part 224
2Handycipher — Part 101
XThe Vatican Challenge — Part 30
XThe Vatican Challenge — Part 41
XThe Vatican Challenge — Part 50
2The T52 Sturgeon Challenge — Part 121
2The T52 Sturgeon Challenge — Part 220
2The T52 Sturgeon Challenge — Part 316
2The T52 Sturgeon Challenge — Part 414
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 99
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 58
2The T52 Sturgeon Challenge — Part 68
2The T52 Sturgeon Challenge — Part 78
2A Cloaked Substitution Cipher — Part 124
2A Cloaked Substitution Cipher — Part 223
3The Heavy T52 Sturgeon Challenge — Part 12
3The Heavy T52 Sturgeon Challenge — Part 23
3The Heavy T52 Sturgeon Challenge — Part 33
2Cipher ID — Part 119
2Polyphonic Substitution Cipher — Part 126
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Polyphonic Substitution Cipher — Part 224
2Differential Cryptanalysis — Part 25
2The LoRa Cipher: Logic Randomness — Part 129
2The SIGABA Challenge — Part 112
2The SIGABA Challenge — Part 210
3The SIGABA Challenge — Part 36
3The SIGABA Challenge — Part 45
1Polyhomophonic Substitution — Part 162
3The SIGABA Challenge — Part 52
2Polyhomophonic Substitution — Part 234
3The SIGABA Challenge — Part 61
2Polyhomophonic Substitution — Part 320
3The Heavy T52 Sturgeon Challenge — Part 46
3The Heavy T52 Sturgeon Challenge — Part 57
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 78
3The Heavy T52 Sturgeon Challenge — Part 80
3The Heavy T52 Sturgeon Challenge — Part 93
1Lightweight Introduction to Lattices — Part 167
1Lightweight Introduction to Lattices — Part 248
2Lightweight Introduction to Lattices — Part 340
2The SZ42 Challenge — Part 120
2The SZ42 Challenge — Part 220
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 418
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
1Find the right route — Part 1109
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 914
1Find the right route — Part 245
1Find the right route — Part 345
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
1Wheatstone Cryptograph — Part 1122
2Wheatstone Cryptograph — Part 216
2SIGABA CSP-889 — Part 12
2SIGABA CSP-889 — Part 22
3SIGABA CSP-889 — Part 32
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-2900 — Part 22
3SIGABA CSP-2900 — Part 32
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 1310
2Modified Vigenère Cipher14
1Alberti Challenge — Part 1165
2Alberti Challenge — Part 211
2Hill Cipher14
1Merkle-Hellman Knapsack Challenge - Part 187
2Merkle-Hellman Knapsack Challenge — Part 218
1The Syllabary Cipher – Part 1301
2The Syllabary Cipher – Part 234
2The Syllabary Cipher – Part 323
2The Syllabary Cipher – Part 415
2The Syllabary Cipher – Part 515
3A Heavy SZ42 Challenge – Part 140
2The Josse Challenge – Part 117
2The Josse Challenge – Part 217
2The Josse Challenge – Part 314
2The Hutton Cipher – Part 124
2The Hutton Cipher – Part 227
2The Hutton Cipher – Part 34
2The Hutton Cipher – Part 44
2The Hutton Cipher – Part 50
1A disguised code62
2Elliptic Boogaloo – Part 13
3Elliptic Boogaloo – Part 23
3Elliptic Boogaloo – Part 33
2PX-1000 Encryption – Part 111
2The Fialka Challenge – Part 15
2The Fialka Challenge – Part 24
2The Fialka Challenge – Part 34
2The Lady Liz Challenge0