Explore Challenges
About MysteryTwister
Contributors and partners
Links
Community
Discord Server
Hall of Fame
Account
Powered by the
CrypTool
project
© 2009-2024 MysteryTwister
Contact
|
Legal Notice
|
Privacy
We redesigned MysteryTwister, enjoy!
Feedback
Challenge list
Level
Name
Solves
1
Classical Ciphers^3
192
1
A Secret Message from Castle Mansfeld
132
2
Alice's Birthday Party (Part 1)
325
2
Alice's Birthday Party (Part 2)
310
X
D'Agapeyeff
0
X
Dorabella
0
X
Double Column Transposition
2
X
Kryptos
0
1
Letter from the Alleged Countess Julie von Ortenburg
181
2
Not-so-Secret Message from Malawi — Part I (RSA)
212
2
Not-so-Secret Message from Malawi — Part II (ECC)
44
X
Notes of an Italian Soldier
4
3
RSA with Special d
25
X
Beale Ciphers
1
X
Unknown Author
2
1
Number Sequence
4576
1
Monoalphabetic Substitution
569
X
Ku Klux Klan
42
3
World Record Challenge: Break 65 Bits of AES
0
2
ORYX Stream Cipher Part I
81
2
ORYX Stream Cipher Part II
49
1
Zodiac Cipher
104
2
Enigma Part 1
135
2
Enigma Part 2
94
3
Sigaba Part 2
5
2
Brute-Force-Attack on Triple-DES with Reduced Key Space
218
2
Sigaba Part 1
18
1
A modified homophonic cipher with reduced alphabets — Part 1
410
1
A modified homophonic cipher with reduced alphabets — Part 2
356
1
Caesar Encryption
1542
1
Molehunt (Part 1/3)
162
1
Molehunt (Part 2/3)
153
2
Molehunt (Part 3/3)
84
2
Smartcard RSA
77
2
Purple 1
21
2
Hybrid Encryption I
182
1
One-Time Pad with Flaws
324
1
Enigma Combinatorics
109
2
Akelarre Part 1
11
2
CMEA 1
47
3
CMEA 2
30
1
Original Caesar Cipher
3256
1
Playfair Encryption
133
2
Lunchtime Attack on the Fully Homomorphic Encryption Scheme
49
3
Recovering the Private Key in the Fully Homomorphic Encryption Scheme
0
1
Kaskade-S/T — Part 1
108
2
Kaskade-S/T — Part 2
53
2
Kaskade-S/T — Part 3
36
2
Lattice Part 1
35
2
Cracking SHA1-Hashed Passwords
618
X
Twelve-Year-Old Murder Case
0
1
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1
102
2
Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2
12
2
Kaskade-S/T — Part 4
0
2
Kaskade-S/T — Part 5
10
1
Music Code — Part 1
43
2
Music Code — Part 2
42
3
Substitution Cipher with Non-Prefix Codes
1
1
Number Sequence — Part 2
2256
2
Broadcasting and low exponent — RSA Attack
249
2
RSA: Two different keys — same ciphertext
159
1
ADFGVX — Part 1
125
1
ADFGVX — Part 2
128
3
Digital Signatures: DSA with Medium Fields
0
2
Unusual encryption using a diophantine equation
70
1
Modified Caesar Cipher
246
1
Pigpen with a twist — Part 1
161
2
Pigpen with a twist — Part 2
44
2
Pigpen with a twist — Part 3
42
2
A really long number sequence
123
1
Affine Codes / Modulo Arithmetic with N / Extended Euclid
627
X
The third ENIGMA M4 message
0
1
Double Columnar Transposition
122
1
Grille Cipher
519
1
An Invisible Message
66
1
Turing Bombe Enigma I
79
1
Factorization Cipher — Part 1
531
1
Monoalphabetic substitution with camouflage — Part 1
68
2
Unconcealed RSA messages
53
2
Factorization Cipher — Part 2
152
2
Monoalphabetic substitution with camouflage — Part 2
55
2
Monoalphabetic substitution with camouflage — Part 3
51
1
Monoalphabetic substitution with camouflage — Part 4
52
2
Factorization Cipher — Part 3
98
2
AES key — encoded in the machine readable zone of a European ePassport
85
2
RSA Factoring Challenge: RSA-210
64
2
RSA Factoring Challenge: RSA-220
47
2
RSA Factoring Challenge: RSA-230
40
3
RSA Factoring Challenge: RSA-232
29
3
RSA Factoring Challenge: RSA-240
29
3
RSA Factoring Challenge: RSA-250
28
3
RSA Factoring Challenge: RSA-260
0
3
RSA Factoring Challenge: RSA-270
0
3
RSA Factoring Challenge: RSA-896
0
3
RSA Factoring Challenge: RSA-280
0
3
RSA Factoring Challenge: RSA-290
0
3
RSA Factoring Challenge: RSA-300
0
3
RSA Factoring Challenge: RSA-309
0
3
RSA Factoring Challenge: RSA-1024
0
3
RSA Factoring Challenge: RSA-310
0
3
RSA Factoring Challenge: RSA-320
0
3
RSA Factoring Challenge: RSA-330
0
3
RSA Factoring Challenge: RSA-340
0
3
RSA Factoring Challenge: RSA-350
0
3
RSA Factoring Challenge: RSA-360
0
3
RSA Factoring Challenge: RSA-370
0
3
RSA Factoring Challenge: RSA-380
0
3
RSA Factoring Challenge: RSA-390
0
3
RSA Factoring Challenge: RSA-400
0
3
RSA Factoring Challenge: RSA-410
0
3
RSA Factoring Challenge: RSA-420
0
3
RSA Factoring Challenge: RSA-430
0
3
RSA Factoring Challenge: RSA-440
0
3
RSA Factoring Challenge: RSA-450
0
3
RSA Factoring Challenge: RSA-460
0
3
RSA Factoring Challenge: RSA-1536
0
3
RSA Factoring Challenge: RSA-470
0
3
RSA Factoring Challenge: RSA-480
0
3
RSA Factoring Challenge: RSA-490
0
3
RSA Factoring Challenge: RSA-500
0
3
RSA Factoring Challenge: RSA-617
0
3
RSA Factoring Challenge: RSA-2048
0
2
Partial Key Exposure with RSA — Part 1
95
1
ECDH-Key Exchange for Beginners
103
2
Monoalphabetic Substitution with Camouflage — Part 5
34
1
The Book Code: A Challenge for Bookworms
157
1
Number Sequence — Part 3
1080
1
¿No Hablas Español? No problemo!
179
1
Number Sequence — Part 4
893
1
Number Sequence — Part 5
112
X
Concealed Messages — Vigenère's Night Sky
16
2
Keyshanc — Part 1
51
2
Keyshanc — Part 2
42
1
How do you become a big cryptographer?
238
1
An 'unhearable' message
44
2
Monoalphabetic Substitution with Camouflage — Part 6
2
1
Letter to the Templars — Part 1
1091
1
Letter to the Templars — Part 2
871
1
Beaver Code
1274
2
BCR code (Book-Caesar-RSA)
76
2
Letter to the Templars — Part 3
743
1
Recycled One-Time Pad
73
1
Strange Message from Thessaloniki
51
1
A hidden word
907
1
Playfair with hints about the grid
125
1
Enigma Messages
88
1
Cascading Encryption — Part 1/3
76
1
Multilingual Monoalphabetic Substitution
83
2
Typex — Part 1
31
1
Reserve Hand Procedure — Part 1
201
2
Cascading Encryption — Part 2/3
22
2
Cascading Encryption — Part 3/3
15
2
Typex — Part 2
25
1
Snow White and the seven dwarfs
308
2
ORYX Stream Cipher — Part 3 (revised)
31
3
ORYX Stream Cipher — Part 4d
0
2
RSA Factoring Challenge: RSA-704
69
1
Nils away on travel
183
1
Hill Cipher with Sudoku Key
113
1
From Russia with Love
308
1
Enigma Messages with Repeated Letters — Part 1
186
1
Trifid Cipher
133
1
Enigma Messages with Repeated Letters — Part 2
92
3
Double Column Transposition Reloaded — Part 1
0
3
Double Column Transposition Reloaded — Part 2
0
3
Double Column Transposition Reloaded — Part 3
0
1
Enigma Messages with Repeated Letters — Part 3
93
1
Enigma Messages with Repeated Letters — Part 4
84
1
Enigma Messages with Repeated Letters — Part 5
87
2
Spanish Strip Cipher — Part 1
35
2
Spanish Strip Cipher — Part 2
34
X
Spanish Strip Cipher — Part 3
0
2
Double Column Transposition — Part 1
35
2
ORYX Stream Cipher — Part 4a
12
3
ORYX Stream Cipher — Part 4b
2
3
ORYX Stream Cipher — Part 4c
0
2
Double Column Transposition — Part 3
42
2
Double Column Transposition — Part 2
48
2
Double Column Transposition — Part 4
53
2
Double Column Transposition — Part 5
9
1
M-138 — Part 1
235
1
Heartbleed — Part 1
90
1
Heartbleed — Part 2
60
2
Heartbleed — Part 3
33
2
M-138 — Part 2
144
2
M-138 — Part 3
66
1
The Last Note
108
2
M-138 — Part 4
32
2
Handycipher — Part 1
6
2
Handycipher — Part 2
8
3
Handycipher — Part 3
7
1
Number Sequence — Part 6
177
1
Number Sequence — Part 7
100
2
Extended Handycipher — Part 1
3
2
Extended Handycipher — Part 2
3
2
Extended Handycipher — Part 3
3
1
A hidden word — Part 2
124
2
Weakened Handycipher — Part 1
17
2
Weakened Handycipher — Part 2
15
2
Weakened Handycipher — Part 3
15
2
Double-Column Transposition/Granit — Part 1
0
2
Double-Column Transposition/Granit — Part 2
0
2
Double-Column Transposition/Granit — Part 3
0
2
Flawed Usage of a OTP Cipher by the BND
20
2
Spirale — Part 1
8
2
Spirale — Part 2
8
2
Spirale — Part 3
6
3
Spirale — Part 4
0
1
Number Sequence — Part 8
431
1
Weakened Granit — Part 1
52
2
Weakened Granit — Part 2
0
2
Weakened Granit — Part 3
0
1
News from Castle Mansfeld
60
1
Image Noise
179
1
New Year's Greetings — Part 1
54
1
New Year's Greetings — Part 2
50
1
New Year's Greetings — Part 3
48
1
New Year's Greetings — Part 4
45
2
New Year's Greetings — Part 5
16
3
Handycipher — Part 4
4
3
Handycipher — Part 5
5
3
Handycipher — Part 6
5
3
Extended Handycipher — Part 4
3
3
Extended Handycipher — Part 5
3
3
Extended Handycipher — Part 6
2
2
Weakened Handycipher — Part 4
6
2
Weakened Handycipher — Part 5
6
2
Weakened Handycipher — Part 6
6
2
ASAC — A Strong(er) ADFGVX Cipher — Part 1
20
2
ASAC — A Strong(er) ADFGVX Cipher — Part 2
1
2
ASAC — A Strong(er) ADFGVX Cipher — Part 3
0
2
ASAC — A Strong(er) ADFGVX Cipher — Part 4
0
2
ASAC — A Strong(er) ADFGVX Cipher — Part 5
0
3
Handycipher — Part 7
2
3
Handycipher — Part 8
3
3
Handycipher — Part 9
3
2
Hilly — Part 1
9
2
Holographic Encryption — Part 1
8
2
Holographic Encryption — Part 2
3
2
Kaskade-S/T — Part 6 (RansomKaskade Part 1)
6
3
ElsieFour — Part 1
4
2
Weakened ElsieFour — Part 3
4
2
Hilly — Part 2
1
1
Number Sequence — Part 9
130
1
Advent-Challenge — Part 1
539
2
Advent-Challenge — Part 2
59
2
AES ECB Wrong Encoding
29
2
Advent Challenge — Part 3
50
2
Advent Challenge — Part 4
46
2
The Einstein Enigma
64
X
The Vatican Challenge — Part 1
3
X
The Vatican Challenge — Part 2
3
1
Number Sequence — Part 10
129
2
Weakened ElsieFour — Part 1
6
2
Weakened ElsieFour — Part 2
1
2
Summer Job
63
2
Fastest in the West
41
2
Trendy Messenger
37
1
Modular Sequences
89
1
Autokey Cipher
208
2
Breaking a Filter Generator
21
1
Cryptanalysis Hacking Puzzles — Part 1
37
X
Catherine of Aragon's Letter to King Ferdinand, her Father (1509)
2
2
"The Road" — Part 1
9
2
"The Road" — Part 2
2
2
"The Road" — Part 3
0
1
Cryptanalysis Hacking Puzzles — Part 2
224
2
Monoalphabetic Substitution with Nostradamus Flavor
41
2
Handycipher made in love — Part 1
29
2
Homophonic Encryption — Part 1
47
2
Homophonic Encryption — Part 2
42
2
Homophonic Encryption — Part 3
41
2
Homophonic Encryption — Part 4
40
2
Handycipher made in love — Part 2
23
2
Handycipher — Part 10
1
X
The Vatican Challenge — Part 3
0
X
The Vatican Challenge — Part 4
1
X
The Vatican Challenge — Part 5
0
2
The T52 Sturgeon Challenge — Part 1
21
2
The T52 Sturgeon Challenge — Part 2
20
2
The T52 Sturgeon Challenge — Part 3
16
2
The T52 Sturgeon Challenge — Part 4
14
2
The T52 Sturgeon Challenge — Part 8
11
2
The T52 Sturgeon Challenge — Part 9
9
2
The T52 Sturgeon Challenge — Part 10
9
2
The T52 Sturgeon Challenge — Part 11
10
2
The T52 Sturgeon Challenge — Part 12
10
2
The T52 Sturgeon Challenge — Part 5
8
2
The T52 Sturgeon Challenge — Part 6
8
2
The T52 Sturgeon Challenge — Part 7
8
2
A Cloaked Substitution Cipher — Part 1
22
2
A Cloaked Substitution Cipher — Part 2
21
3
The Heavy T52 Sturgeon Challenge — Part 1
2
3
The Heavy T52 Sturgeon Challenge — Part 2
3
3
The Heavy T52 Sturgeon Challenge — Part 3
3
2
Cipher ID — Part 1
18
2
Polyphonic Substitution Cipher — Part 1
25
2
Christmas Challenge 2019: Differential Cryptanalysis — Part 1
5
2
Polyphonic Substitution Cipher — Part 2
23
2
Differential Cryptanalysis — Part 2
5
2
The LoRa Cipher: Logic Randomness — Part 1
29
2
The SIGABA Challenge — Part 1
11
2
The SIGABA Challenge — Part 2
10
3
The SIGABA Challenge — Part 3
6
3
The SIGABA Challenge — Part 4
5
1
Polyhomophonic Substitution — Part 1
59
3
The SIGABA Challenge — Part 5
2
2
Polyhomophonic Substitution — Part 2
32
3
The SIGABA Challenge — Part 6
1
2
Polyhomophonic Substitution — Part 3
19
3
The Heavy T52 Sturgeon Challenge — Part 4
6
3
The Heavy T52 Sturgeon Challenge — Part 5
7
3
The Heavy T52 Sturgeon Challenge — Part 6
5
3
The Heavy T52 Sturgeon Challenge — Part 7
8
3
The Heavy T52 Sturgeon Challenge — Part 8
0
3
The Heavy T52 Sturgeon Challenge — Part 9
3
1
Lightweight Introduction to Lattices — Part 1
64
1
Lightweight Introduction to Lattices — Part 2
45
2
Lightweight Introduction to Lattices — Part 3
38
2
The SZ42 Challenge — Part 1
20
2
The SZ42 Challenge — Part 2
20
2
The SZ42 Challenge — Part 3
17
2
The SZ42 Challenge — Part 4
18
2
The SZ42 Challenge — Part 5
17
2
The SZ42 Challenge — Part 6
15
2
The SZ42 Challenge — Part 7
14
1
Find the right route — Part 1
103
2
The SZ42 Challenge — Part 8
15
2
The SZ42 Challenge — Part 9
14
1
Find the right route — Part 2
38
1
Find the right route — Part 3
38
2
The SZ42 Challenge — Part 10
7
2
The SZ42 Challenge — Part 11
4
1
Wheatstone Cryptograph — Part 1
115
2
Wheatstone Cryptograph — Part 2
16
2
SIGABA CSP-889 — Part 1
2
2
SIGABA CSP-889 — Part 2
2
3
SIGABA CSP-889 — Part 3
2
2
SIGABA CSP-2900 — Part 1
2
2
SIGABA CSP-2900 — Part 2
2
3
SIGABA CSP-2900 — Part 3
2
2
The SZ42 Challenge — Part 12
11
2
The SZ42 Challenge — Part 13
10
2
Modified Vigenère Cipher
12
1
Alberti Challenge — Part 1
152
2
Alberti Challenge — Part 2
11
2
Hill Cipher
13
1
Merkle-Hellman Knapsack Challenge - Part 1
78
2
Merkle-Hellman Knapsack Challenge — Part 2
17
1
The Syllabary Cipher – Part 1
264
2
The Syllabary Cipher – Part 2
31
2
The Syllabary Cipher – Part 3
22
2
The Syllabary Cipher – Part 4
14
2
The Syllabary Cipher – Part 5
14
3
A Heavy SZ42 Challenge – Part 14
0
2
The Josse Challenge – Part 1
17
2
The Josse Challenge – Part 2
17
2
The Josse Challenge – Part 3
14
2
The Hutton Cipher – Part 1
24
2
The Hutton Cipher – Part 2
26
2
The Hutton Cipher – Part 3
4
2
The Hutton Cipher – Part 4
4
2
The Hutton Cipher – Part 5
0
1
A disguised code
45
2
Elliptic Boogaloo – Part 1
3
3
Elliptic Boogaloo – Part 2
3
3
Elliptic Boogaloo – Part 3
3
2
PX-1000 Encryption – Part 1
11
2
The Fialka Challenge – Part 1
5
2
The Fialka Challenge – Part 2
4
2
The Fialka Challenge – Part 3
4