Powered by the CrypTool project

© 2009-2025 MysteryTwister

Contact | Legal Notice | Privacy

We redesigned MysteryTwister, enjoy! Feedback
 Challenge list
LevelNameSolves
1Classical Ciphers^3195
1A Secret Message from Castle Mansfeld132
2Alice's Birthday Party (Part 1)325
2Alice's Birthday Party (Part 2)311
XD'Agapeyeff0
XDorabella0
XDouble Column Transposition2
XKryptos0
1Letter from the Alleged Countess Julie von Ortenburg182
2Not-so-Secret Message from Malawi — Part I (RSA)212
2Not-so-Secret Message from Malawi — Part II (ECC)44
XNotes of an Italian Soldier4
3RSA with Special d25
XBeale Ciphers1
XUnknown Author2
1Number Sequence4594
1Monoalphabetic Substitution572
XKu Klux Klan43
3World Record Challenge: Break 65 Bits of AES0
2ORYX Stream Cipher Part I81
2ORYX Stream Cipher Part II49
1Zodiac Cipher104
2Enigma Part 1136
2Enigma Part 295
3Sigaba Part 25
2Brute-Force-Attack on Triple-DES with Reduced Key Space218
2Sigaba Part 118
1A modified homophonic cipher with reduced alphabets — Part 1413
1A modified homophonic cipher with reduced alphabets — Part 2359
1Caesar Encryption1547
1Molehunt (Part 1/3)164
1Molehunt (Part 2/3)155
2Molehunt (Part 3/3)85
2Smartcard RSA77
2Purple 121
2Hybrid Encryption I182
1One-Time Pad with Flaws325
1Enigma Combinatorics110
2Akelarre Part 111
2CMEA 147
3CMEA 230
1Original Caesar Cipher3276
1Playfair Encryption137
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme49
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
1Kaskade-S/T — Part 1108
2Kaskade-S/T — Part 253
2Kaskade-S/T — Part 336
2Lattice Part 135
2Cracking SHA1-Hashed Passwords620
XTwelve-Year-Old Murder Case0
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1102
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 212
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
1Music Code — Part 143
2Music Code — Part 242
3Substitution Cipher with Non-Prefix Codes1
1Number Sequence — Part 22264
2Broadcasting and low exponent — RSA Attack250
2RSA: Two different keys — same ciphertext159
1ADFGVX — Part 1126
1ADFGVX — Part 2129
3Digital Signatures: DSA with Medium Fields0
2Unusual encryption using a diophantine equation70
1Modified Caesar Cipher247
1Pigpen with a twist — Part 1162
2Pigpen with a twist — Part 245
2Pigpen with a twist — Part 343
2A really long number sequence123
1Affine Codes / Modulo Arithmetic with N / Extended Euclid630
XThe third ENIGMA M4 message0
1Double Columnar Transposition126
1Grille Cipher523
1An Invisible Message66
1Turing Bombe Enigma I80
1Factorization Cipher — Part 1534
1Monoalphabetic substitution with camouflage — Part 168
2Unconcealed RSA messages53
2Factorization Cipher — Part 2153
2Monoalphabetic substitution with camouflage — Part 255
2Monoalphabetic substitution with camouflage — Part 351
1Monoalphabetic substitution with camouflage — Part 452
2Factorization Cipher — Part 399
2AES key — encoded in the machine readable zone of a European ePassport85
2RSA Factoring Challenge: RSA-21064
2RSA Factoring Challenge: RSA-22047
2RSA Factoring Challenge: RSA-23040
3RSA Factoring Challenge: RSA-23229
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-2600
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-10240
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3300
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4400
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4800
3RSA Factoring Challenge: RSA-4900
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-20480
2Partial Key Exposure with RSA — Part 195
1ECDH-Key Exchange for Beginners103
2Monoalphabetic Substitution with Camouflage — Part 534
1The Book Code: A Challenge for Bookworms158
1Number Sequence — Part 31084
1¿No Hablas Español? No problemo!181
1Number Sequence — Part 4897
1Number Sequence — Part 5113
XConcealed Messages — Vigenère's Night Sky16
2Keyshanc — Part 151
2Keyshanc — Part 242
1How do you become a big cryptographer?240
1An 'unhearable' message44
2Monoalphabetic Substitution with Camouflage — Part 62
1Letter to the Templars — Part 11095
1Letter to the Templars — Part 2875
1Beaver Code1284
2BCR code (Book-Caesar-RSA)76
2Letter to the Templars — Part 3746
1Recycled One-Time Pad73
1Strange Message from Thessaloniki51
1A hidden word912
1Playfair with hints about the grid125
1Enigma Messages89
1Cascading Encryption — Part 1/376
1Multilingual Monoalphabetic Substitution84
2Typex — Part 131
1Reserve Hand Procedure — Part 1202
2Cascading Encryption — Part 2/322
2Cascading Encryption — Part 3/315
2Typex — Part 225
1Snow White and the seven dwarfs310
2ORYX Stream Cipher — Part 3 (revised)31
3ORYX Stream Cipher — Part 4d0
2RSA Factoring Challenge: RSA-70469
1Nils away on travel185
1Hill Cipher with Sudoku Key114
1From Russia with Love311
1Enigma Messages with Repeated Letters — Part 1188
1Trifid Cipher135
1Enigma Messages with Repeated Letters — Part 293
3Double Column Transposition Reloaded — Part 10
3Double Column Transposition Reloaded — Part 20
3Double Column Transposition Reloaded — Part 30
1Enigma Messages with Repeated Letters — Part 394
1Enigma Messages with Repeated Letters — Part 485
1Enigma Messages with Repeated Letters — Part 588
2Spanish Strip Cipher — Part 136
2Spanish Strip Cipher — Part 234
XSpanish Strip Cipher — Part 30
2Double Column Transposition — Part 135
2ORYX Stream Cipher — Part 4a12
3ORYX Stream Cipher — Part 4b2
3ORYX Stream Cipher — Part 4c0
2Double Column Transposition — Part 342
2Double Column Transposition — Part 249
2Double Column Transposition — Part 453
2Double Column Transposition — Part 59
1M-138 — Part 1237
1Heartbleed — Part 190
1Heartbleed — Part 260
2Heartbleed — Part 333
2M-138 — Part 2146
2M-138 — Part 368
1The Last Note111
2M-138 — Part 432
2Handycipher — Part 16
2Handycipher — Part 28
3Handycipher — Part 37
1Number Sequence — Part 6180
1Number Sequence — Part 7102
2Extended Handycipher — Part 13
2Extended Handycipher — Part 23
2Extended Handycipher — Part 33
1A hidden word — Part 2125
2Weakened Handycipher — Part 117
2Weakened Handycipher — Part 215
2Weakened Handycipher — Part 315
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 20
2Double-Column Transposition/Granit — Part 30
2Flawed Usage of a OTP Cipher by the BND20
2Spirale — Part 18
2Spirale — Part 28
2Spirale — Part 36
3Spirale — Part 40
1Number Sequence — Part 8434
1Weakened Granit — Part 152
2Weakened Granit — Part 20
2Weakened Granit — Part 30
1News from Castle Mansfeld60
1Image Noise180
1New Year's Greetings — Part 154
1New Year's Greetings — Part 250
1New Year's Greetings — Part 348
1New Year's Greetings — Part 445
2New Year's Greetings — Part 516
3Handycipher — Part 44
3Handycipher — Part 55
3Handycipher — Part 65
3Extended Handycipher — Part 43
3Extended Handycipher — Part 53
3Extended Handycipher — Part 62
2Weakened Handycipher — Part 46
2Weakened Handycipher — Part 56
2Weakened Handycipher — Part 66
2ASAC — A Strong(er) ADFGVX Cipher — Part 120
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
3Handycipher — Part 72
3Handycipher — Part 83
3Handycipher — Part 93
2Hilly — Part 19
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
3ElsieFour — Part 14
2Weakened ElsieFour — Part 34
2Hilly — Part 21
1Number Sequence — Part 9132
1Advent-Challenge — Part 1543
2Advent-Challenge — Part 259
2AES ECB Wrong Encoding29
2Advent Challenge — Part 350
2Advent Challenge — Part 446
2The Einstein Enigma65
XThe Vatican Challenge — Part 13
XThe Vatican Challenge — Part 23
1Number Sequence — Part 10132
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 21
2Summer Job63
2Fastest in the West41
2Trendy Messenger37
1Modular Sequences90
1Autokey Cipher210
2Breaking a Filter Generator21
1Cryptanalysis Hacking Puzzles — Part 137
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2"The Road" — Part 19
2"The Road" — Part 22
2"The Road" — Part 30
1Cryptanalysis Hacking Puzzles — Part 2228
2Monoalphabetic Substitution with Nostradamus Flavor43
2Handycipher made in love — Part 129
2Homophonic Encryption — Part 148
2Homophonic Encryption — Part 243
2Homophonic Encryption — Part 342
2Homophonic Encryption — Part 441
2Handycipher made in love — Part 223
2Handycipher — Part 101
XThe Vatican Challenge — Part 30
XThe Vatican Challenge — Part 41
XThe Vatican Challenge — Part 50
2The T52 Sturgeon Challenge — Part 121
2The T52 Sturgeon Challenge — Part 220
2The T52 Sturgeon Challenge — Part 316
2The T52 Sturgeon Challenge — Part 414
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 99
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 58
2The T52 Sturgeon Challenge — Part 68
2The T52 Sturgeon Challenge — Part 78
2A Cloaked Substitution Cipher — Part 122
2A Cloaked Substitution Cipher — Part 221
3The Heavy T52 Sturgeon Challenge — Part 12
3The Heavy T52 Sturgeon Challenge — Part 23
3The Heavy T52 Sturgeon Challenge — Part 33
2Cipher ID — Part 118
2Polyphonic Substitution Cipher — Part 125
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Polyphonic Substitution Cipher — Part 223
2Differential Cryptanalysis — Part 25
2The LoRa Cipher: Logic Randomness — Part 129
2The SIGABA Challenge — Part 111
2The SIGABA Challenge — Part 210
3The SIGABA Challenge — Part 36
3The SIGABA Challenge — Part 45
1Polyhomophonic Substitution — Part 159
3The SIGABA Challenge — Part 52
2Polyhomophonic Substitution — Part 232
3The SIGABA Challenge — Part 61
2Polyhomophonic Substitution — Part 319
3The Heavy T52 Sturgeon Challenge — Part 46
3The Heavy T52 Sturgeon Challenge — Part 57
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 78
3The Heavy T52 Sturgeon Challenge — Part 80
3The Heavy T52 Sturgeon Challenge — Part 93
1Lightweight Introduction to Lattices — Part 164
1Lightweight Introduction to Lattices — Part 245
2Lightweight Introduction to Lattices — Part 338
2The SZ42 Challenge — Part 120
2The SZ42 Challenge — Part 220
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 418
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
1Find the right route — Part 1104
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 914
1Find the right route — Part 239
1Find the right route — Part 338
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
1Wheatstone Cryptograph — Part 1115
2Wheatstone Cryptograph — Part 216
2SIGABA CSP-889 — Part 12
2SIGABA CSP-889 — Part 22
3SIGABA CSP-889 — Part 32
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-2900 — Part 22
3SIGABA CSP-2900 — Part 32
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 1310
2Modified Vigenère Cipher12
1Alberti Challenge — Part 1153
2Alberti Challenge — Part 211
2Hill Cipher13
1Merkle-Hellman Knapsack Challenge - Part 178
2Merkle-Hellman Knapsack Challenge — Part 217
1The Syllabary Cipher – Part 1267
2The Syllabary Cipher – Part 232
2The Syllabary Cipher – Part 323
2The Syllabary Cipher – Part 415
2The Syllabary Cipher – Part 515
3A Heavy SZ42 Challenge – Part 140
2The Josse Challenge – Part 117
2The Josse Challenge – Part 217
2The Josse Challenge – Part 314
2The Hutton Cipher – Part 124
2The Hutton Cipher – Part 227
2The Hutton Cipher – Part 34
2The Hutton Cipher – Part 44
2The Hutton Cipher – Part 50
1A disguised code46
2Elliptic Boogaloo – Part 13
3Elliptic Boogaloo – Part 23
3Elliptic Boogaloo – Part 33
2PX-1000 Encryption – Part 111
2The Fialka Challenge – Part 15
2The Fialka Challenge – Part 24
2The Fialka Challenge – Part 34
2The Lady Liz Challenge0