Powered by the CrypTool project

© 2009-2026 MysteryTwister

Contact | Legal Notice | Privacy

 Challenge list
LevelNameSolves
1ADFGVX — Part 1153
XConcealed Messages — Vigenère's Night Sky16
1A disguised code103
1A hidden word — Part 2147
1Alberti Challenge — Part 1202
1A Secret Message from Castle Mansfeld139
1An Invisible Message74
1An 'unhearable' message46
1Autokey Cipher252
1Number Sequence — Part 9156
1Caesar Encryption1678
1ADFGVX — Part 2143
1Cryptanalysis Hacking Puzzles — Part 147
1Assembly Point – Part 127
1Cryptanalysis Hacking Puzzles — Part 2271
1Bigram Substitution – Part 1 (Tutorial)77
1ECDH-Key Exchange for Beginners115
1Enigma Messages102
1Enigma Messages with Repeated Letters — Part 497
1Enigma Messages with Repeated Letters — Part 597
1Factorization Cipher — Part 1571
1Heartbleed — Part 260
1Grille Cipher558
1Image Noise206
3RSA Factoring Challenge: RSA-3300
1Music Code — Part 145
1Kaskade-S/T — Part 1122
1Letter to the Templars — Part 2935
1Merkle-Hellman Knapsack Challenge - Part 1107
1Modular Sequences112
1Monoalphabetic Substitution597
1Molehunt (Part 2/3)164
1Monoalphabetic substitution with camouflage — Part 175
1Monoalphabetic substitution with camouflage — Part 455
1¿No Hablas Español? No problemo!196
1New Year's Greetings — Part 452
1New Year's Greetings — Part 172
1New Year's Greetings — Part 260
1New Year's Greetings — Part 356
1News from Castle Mansfeld65
1Number Sequence — Part 4976
1Number Sequence — Part 7114
1Number Sequence — Part 5136
1Number Sequence — Part 6203
1Number Sequence — Part 31187
1Number Sequence — Part 22440
1Pigpen with a twist — Part 1171
1Playfair Encryption149
1The Syllabary Cipher – Part 1365
1Snow White and the seven dwarfs327
1The Book Code: A Challenge for Bookworms169
1Polyhomophonic Substitution — Part 166
1Turing Bombe Enigma I88
1Zodiac Cipher115
2A really long number sequence129
2A Cloaked Substitution Cipher — Part 126
2Advent Challenge — Part 454
2Advent Challenge — Part 358
2AES ECB Wrong Encoding33
2ASAC — A Strong(er) ADFGVX Cipher — Part 123
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4800
3Substitution Cipher with Non-Prefix Codes1
2BCR code (Book-Caesar-RSA)83
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Broadcasting and low exponent — RSA Attack267
2Cascading Encryption — Part 2/325
2Cipher ID — Part 121
2Differential Cryptanalysis — Part 25
2Double Column Transposition — Part 345
3The SIGABA Challenge — Part 38
2CMEA 148
2Double-Column Transposition/Granit — Part 20
2Double Column Transposition — Part 252
2Extended Handycipher — Part 14
2Elliptic Boogaloo – Part 16
2Double Column Transposition — Part 512
2Extended Handycipher — Part 24
2Enigma Part 2101
2Extended Handycipher — Part 34
2Factorization Cipher — Part 3104
2Flawed Usage of a OTP Cipher by the BND22
2Handycipher made in love — Part 131
2Handycipher — Part 101
2Handycipher — Part 29
2The Hutton Cipher – Part 34
2Hilly — Part 110
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2RSA Factoring Challenge: RSA-22047
2Twisting the Rubik's Cube11
2Homophonic Encryption — Part 347
2Polyhomophonic Substitution — Part 321
2Kaskade-S/T — Part 510
2Kaskade-S/T — Part 40
2Keyshanc — Part 153
2Keyshanc — Part 244
2Kaskade-S/T — Part 339
2Kaskade-S/T — Part 259
2Homophonic Encryption — Part 446
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)7
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme50
2Monoalphabetic substitution with camouflage — Part 259
2Monoalphabetic substitution with camouflage — Part 355
2Monoalphabetic Substitution with Camouflage — Part 538
2M-138 — Part 436
2Lightweight Introduction to Lattices — Part 348
2Monoalphabetic Substitution with Nostradamus Flavor46
2ORYX Stream Cipher Part II51
2Merkle-Hellman Knapsack Challenge — Part 220
2Not-so-Secret Message from Malawi — Part II (ECC)47
2Pigpen with a twist — Part 250
2Smartcard RSA83
2Polyhomophonic Substitution — Part 236
2Purple 122
2"The Road" — Part 19
2RSA Factoring Challenge: RSA-23040
2RSA Factoring Challenge: RSA-70469
2RSA Factoring Challenge: RSA-21064
2RSA: Two different keys — same ciphertext168
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-889 — Part 22
2Sigaba Part 118
2SIGABA CSP-2900 — Part 22
2Summer Job70
2The Hutton Cipher – Part 50
2Spirale — Part 28
2Spirale — Part 36
2The Fialka Challenge – Part 36
2The Hutton Cipher – Part 231
2The Einstein Enigma71
2The Fialka Challenge – Part 18
2The Fialka Challenge – Part 26
2The Josse Challenge – Part 219
3Elliptic Boogaloo – Part 25
2Hilly — Part 21
2The Hutton Cipher – Part 44
2"The Road" — Part 30
2The SIGABA Challenge — Part 114
2"The Road" — Part 22
2The Syllabary Cipher – Part 415
2The SZ42 Challenge — Part 122
2The SIGABA Challenge — Part 212
2Weakened Handycipher — Part 316
2The SZ42 Challenge — Part 318
2The SZ42 Challenge — Part 108
2The SZ42 Challenge — Part 114
2The SZ42 Challenge — Part 1310
2The SZ42 Challenge — Part 816
2The SZ42 Challenge — Part 518
2The SZ42 Challenge — Part 616
2The SZ42 Challenge — Part 715
2The T52 Sturgeon Challenge — Part 1111
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 812
2The T52 Sturgeon Challenge — Part 79
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 34
2The T52 Sturgeon Challenge — Part 910
2Typex — Part 131
2Typex — Part 225
2Unconcealed RSA messages58
2Weakened ElsieFour — Part 21
2Enigma Part 1141
2The Syllabary Cipher – Part 325
2Weakened Granit — Part 30
2Weakened Handycipher — Part 47
2Homophonic Encryption — Part 155
2Weakened Handycipher — Part 216
2Wheatstone Cryptograph — Part 222
2Weakened Handycipher — Part 57
3Double Column Transposition Reloaded — Part 30
3Digital Signatures: DSA with Medium Fields0
3World Record Challenge: Break 65 Bits of AES0
3Elliptic Boogaloo – Part 35
3Double Column Transposition Reloaded — Part 10
3ElsieFour — Part 14
3Extended Handycipher — Part 54
3Handycipher — Part 56
3Extended Handycipher — Part 63
3Handycipher — Part 45
3Handycipher — Part 66
1A hidden word1001
3Handycipher — Part 83
3Double Column Transposition Reloaded — Part 20
3ORYX Stream Cipher — Part 4c0
3RSA Factoring Challenge: RSA-20480
3Handycipher — Part 93
3RSA Factoring Challenge: RSA-15360
3ORYX Stream Cipher — Part 4d0
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-4900
3Sigaba Part 25
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4400
3RSA with Special d26
3SIGABA CSP-889 — Part 32
3The Heavy T52 Sturgeon Challenge — Part 79
3The Heavy T52 Sturgeon Challenge — Part 93
3Vinaigrette Signature Scheme6
3The SIGABA Challenge — Part 53
3The SIGABA Challenge — Part 61
XDorabella0
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
XD'Agapeyeff0
XDouble Column Transposition2
1Beaver Code1398
XKu Klux Klan45
XSpanish Strip Cipher — Part 30
XThe Vatican Challenge — Part 13
3The Heavy T52 Sturgeon Challenge — Part 66
XNotes of an Italian Soldier4
3The SIGABA Challenge — Part 46
XThe Vatican Challenge — Part 30
3The Heavy T52 Sturgeon Challenge — Part 80
XTwelve-Year-Old Murder Case0
1Original Caesar Cipher3564
1Playfair with hints about the grid140
2Cracking SHA1-Hashed Passwords704
1Multilingual Monoalphabetic Substitution91
1Nils away on travel201
1Number Sequence4957
1Number Sequence — Part 8491
2Factorization Cipher — Part 2162
XThe Vatican Challenge — Part 23
1From Russia with Love335
2Hybrid Encryption I196
2Letter to the Templars — Part 3782
3Extended Handycipher — Part 44
2Hill Cipher16
1Classical Ciphers^3208
1Enigma Messages with Repeated Letters — Part 1210
2Advent-Challenge — Part 268
2The Syllabary Cipher – Part 238
1Find the right route — Part 346
XKryptos0
1Letter to the Templars — Part 11170
1M-138 — Part 1256
2Brute-Force-Attack on Triple-DES with Reduced Key Space262
2M-138 — Part 374
2Spanish Strip Cipher — Part 237
1Molehunt (Part 1/3)176
2Not-so-Secret Message from Malawi — Part I (RSA)225
2AES key — encoded in the machine readable zone of a European ePassport108
2Cascading Encryption — Part 3/316
1A modified homophonic cipher with reduced alphabets — Part 2378
1Hill Cipher with Sudoku Key126
1Trifid Cipher146
1Recycled One-Time Pad83
2Homophonic Encryption — Part 249
2Polyphonic Substitution Cipher — Part 226
1Affine Codes / Modulo Arithmetic with N / Extended Euclid672
1Enigma Combinatorics123
2Unusual encryption using a diophantine equation71
3ORYX Stream Cipher — Part 4b2
1The Last Note118
2ORYX Stream Cipher Part I83
1Enigma Messages with Repeated Letters — Part 3106
1Enigma Messages with Repeated Letters — Part 2107
1Find the right route — Part 248
2Music Code — Part 244
2Polyphonic Substitution Cipher — Part 129
2Trendy Messenger41
2The Josse Challenge – Part 316
2Akelarre Part 111
1Heartbleed — Part 190
2The SZ42 Challenge — Part 222
2The T52 Sturgeon Challenge — Part 222
2The SZ42 Challenge — Part 915
1Letter from the Alleged Countess Julie von Ortenburg189
1Modified Caesar Cipher267
2ASAC — A Strong(er) ADFGVX Cipher — Part 22
1Lightweight Introduction to Lattices — Part 176
1Weakened Granit — Part 155
3CMEA 231
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1108
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-23229
1Wheatstone Cryptograph — Part 1141
2Bigram Substitution – Part 29
2The T52 Sturgeon Challenge — Part 610
3The Heavy T52 Sturgeon Challenge — Part 58
2A Cloaked Substitution Cipher — Part 224
2Alice's Birthday Party (Part 2)352
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
2Lattice Part 139
2Double Column Transposition — Part 459
1Cascading Encryption — Part 1/385
3Handycipher — Part 38
1A modified homophonic cipher with reduced alphabets — Part 1435
1Advent-Challenge — Part 1630
1Double Columnar Transposition134
1Find the right route — Part 1121
1How do you become a big cryptographer?261
2Fastest in the West45
1Lightweight Introduction to Lattices — Part 255
2M-138 — Part 2154
2Modified Vigenère Cipher15
2Molehunt (Part 3/3)93
1Reserve Hand Procedure — Part 1212
1Number Sequence — Part 10154
1One-Time Pad with Flaws340
1Strange Message from Thessaloniki55
2ASAC — A Strong(er) ADFGVX Cipher — Part 31
2Breaking a Filter Generator26
2Alberti Challenge — Part 214
2Alice's Birthday Party (Part 1)353
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 30
2Double Column Transposition — Part 138
2The Lady Liz Challenge0
2Heartbleed — Part 333
2Monoalphabetic Substitution with Camouflage — Part 62
2Pigpen with a twist — Part 349
2PX-1000 Encryption – Part 111
2Spanish Strip Cipher — Part 138
2The Hutton Cipher – Part 129
2Spirale — Part 18
2Partial Key Exposure with RSA — Part 1115
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 419
2Weakened Granit — Part 20
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 213
2SIGABA CSP-889 — Part 12
2The Josse Challenge – Part 119
3Handycipher — Part 72
2The LoRa Cipher: Logic Randomness — Part 130
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3800
2The Syllabary Cipher – Part 515
3SIGABA CSP-2900 — Part 32
2The T52 Sturgeon Challenge — Part 123
3Spirale — Part 40
3The Heavy T52 Sturgeon Challenge — Part 13
XThe Vatican Challenge — Part 50
XUnknown Author2
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 510
3RSA Factoring Challenge: RSA-10240
2Handycipher made in love — Part 225
2Handycipher — Part 17
2ORYX Stream Cipher — Part 4a12
2New Year's Greetings — Part 519
2ORYX Stream Cipher — Part 3 (revised)31
2The T52 Sturgeon Challenge — Part 318
2The T52 Sturgeon Challenge — Part 416
2Weakened Handycipher — Part 67
3A Heavy SZ42 Challenge – Part 140
XBeale Ciphers1
2Weakened Handycipher — Part 118
3The Heavy T52 Sturgeon Challenge — Part 24
3The Heavy T52 Sturgeon Challenge — Part 33
3The Heavy T52 Sturgeon Challenge — Part 47
3RSA Factoring Challenge: RSA-2600
XThe third ENIGMA M4 message0
XThe Vatican Challenge — Part 41