Powered by the CrypTool project

© 2009-2025 MysteryTwister

Contact | Legal Notice | Privacy

We redesigned MysteryTwister, enjoy! Feedback
 Challenge list
LevelNameSolves
1Classical Ciphers^3196
1A Secret Message from Castle Mansfeld135
2Alice's Birthday Party (Part 1)330
2Alice's Birthday Party (Part 2)316
XD'Agapeyeff0
XDorabella0
XDouble Column Transposition2
XKryptos0
1Letter from the Alleged Countess Julie von Ortenburg183
2Not-so-Secret Message from Malawi — Part I (RSA)216
2Not-so-Secret Message from Malawi — Part II (ECC)44
XNotes of an Italian Soldier4
3RSA with Special d25
XBeale Ciphers1
XUnknown Author2
1Number Sequence4639
1Monoalphabetic Substitution576
XKu Klux Klan43
3World Record Challenge: Break 65 Bits of AES0
2ORYX Stream Cipher Part I81
2ORYX Stream Cipher Part II49
1Zodiac Cipher108
2Enigma Part 1136
2Enigma Part 296
3Sigaba Part 25
2Brute-Force-Attack on Triple-DES with Reduced Key Space221
2Sigaba Part 118
1A modified homophonic cipher with reduced alphabets — Part 1419
1A modified homophonic cipher with reduced alphabets — Part 2363
1Caesar Encryption1569
1Molehunt (Part 1/3)166
1Molehunt (Part 2/3)157
2Molehunt (Part 3/3)87
2Smartcard RSA79
2Purple 121
2Hybrid Encryption I185
1One-Time Pad with Flaws330
1Enigma Combinatorics112
2Akelarre Part 111
2CMEA 147
3CMEA 230
1Original Caesar Cipher3310
1Playfair Encryption138
2Lunchtime Attack on the Fully Homomorphic Encryption Scheme49
3Recovering the Private Key in the Fully Homomorphic Encryption Scheme0
1Kaskade-S/T — Part 1111
2Kaskade-S/T — Part 255
2Kaskade-S/T — Part 338
2Lattice Part 135
2Cracking SHA1-Hashed Passwords644
XTwelve-Year-Old Murder Case0
1Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1104
2Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 212
2Kaskade-S/T — Part 40
2Kaskade-S/T — Part 510
1Music Code — Part 144
2Music Code — Part 243
3Substitution Cipher with Non-Prefix Codes1
1Number Sequence — Part 22295
2Broadcasting and low exponent — RSA Attack254
2RSA: Two different keys — same ciphertext162
1ADFGVX — Part 1128
1ADFGVX — Part 2131
3Digital Signatures: DSA with Medium Fields0
2Unusual encryption using a diophantine equation70
1Modified Caesar Cipher256
1Pigpen with a twist — Part 1165
2Pigpen with a twist — Part 247
2Pigpen with a twist — Part 344
2A really long number sequence124
1Affine Codes / Modulo Arithmetic with N / Extended Euclid640
XThe third ENIGMA M4 message0
1Double Columnar Transposition127
1Grille Cipher533
1An Invisible Message67
1Turing Bombe Enigma I83
1Factorization Cipher — Part 1544
1Monoalphabetic substitution with camouflage — Part 171
2Unconcealed RSA messages55
2Factorization Cipher — Part 2156
2Monoalphabetic substitution with camouflage — Part 258
2Monoalphabetic substitution with camouflage — Part 354
1Monoalphabetic substitution with camouflage — Part 454
2Factorization Cipher — Part 3100
2AES key — encoded in the machine readable zone of a European ePassport87
2RSA Factoring Challenge: RSA-21064
2RSA Factoring Challenge: RSA-22047
2RSA Factoring Challenge: RSA-23040
3RSA Factoring Challenge: RSA-23229
3RSA Factoring Challenge: RSA-24029
3RSA Factoring Challenge: RSA-25028
3RSA Factoring Challenge: RSA-2600
3RSA Factoring Challenge: RSA-2700
3RSA Factoring Challenge: RSA-8960
3RSA Factoring Challenge: RSA-2800
3RSA Factoring Challenge: RSA-2900
3RSA Factoring Challenge: RSA-3000
3RSA Factoring Challenge: RSA-3090
3RSA Factoring Challenge: RSA-10240
3RSA Factoring Challenge: RSA-3100
3RSA Factoring Challenge: RSA-3200
3RSA Factoring Challenge: RSA-3300
3RSA Factoring Challenge: RSA-3400
3RSA Factoring Challenge: RSA-3500
3RSA Factoring Challenge: RSA-3600
3RSA Factoring Challenge: RSA-3700
3RSA Factoring Challenge: RSA-3800
3RSA Factoring Challenge: RSA-3900
3RSA Factoring Challenge: RSA-4000
3RSA Factoring Challenge: RSA-4100
3RSA Factoring Challenge: RSA-4200
3RSA Factoring Challenge: RSA-4300
3RSA Factoring Challenge: RSA-4400
3RSA Factoring Challenge: RSA-4500
3RSA Factoring Challenge: RSA-4600
3RSA Factoring Challenge: RSA-15360
3RSA Factoring Challenge: RSA-4700
3RSA Factoring Challenge: RSA-4800
3RSA Factoring Challenge: RSA-4900
3RSA Factoring Challenge: RSA-5000
3RSA Factoring Challenge: RSA-6170
3RSA Factoring Challenge: RSA-20480
2Partial Key Exposure with RSA — Part 197
1ECDH-Key Exchange for Beginners105
2Monoalphabetic Substitution with Camouflage — Part 536
1The Book Code: A Challenge for Bookworms161
1Number Sequence — Part 31103
1¿No Hablas Español? No problemo!184
1Number Sequence — Part 4914
1Number Sequence — Part 5115
XConcealed Messages — Vigenère's Night Sky16
2Keyshanc — Part 151
2Keyshanc — Part 242
1How do you become a big cryptographer?249
1An 'unhearable' message45
2Monoalphabetic Substitution with Camouflage — Part 62
1Letter to the Templars — Part 11104
1Letter to the Templars — Part 2883
1Beaver Code1300
2BCR code (Book-Caesar-RSA)77
2Letter to the Templars — Part 3748
1Recycled One-Time Pad77
1Strange Message from Thessaloniki53
1A hidden word927
1Playfair with hints about the grid127
1Enigma Messages89
1Cascading Encryption — Part 1/379
1Multilingual Monoalphabetic Substitution88
2Typex — Part 131
1Reserve Hand Procedure — Part 1205
2Cascading Encryption — Part 2/324
2Cascading Encryption — Part 3/316
2Typex — Part 225
1Snow White and the seven dwarfs316
2ORYX Stream Cipher — Part 3 (revised)31
3ORYX Stream Cipher — Part 4d0
2RSA Factoring Challenge: RSA-70469
1Nils away on travel190
1Hill Cipher with Sudoku Key116
1From Russia with Love316
1Enigma Messages with Repeated Letters — Part 1191
1Trifid Cipher138
1Enigma Messages with Repeated Letters — Part 296
3Double Column Transposition Reloaded — Part 10
3Double Column Transposition Reloaded — Part 20
3Double Column Transposition Reloaded — Part 30
1Enigma Messages with Repeated Letters — Part 397
1Enigma Messages with Repeated Letters — Part 488
1Enigma Messages with Repeated Letters — Part 590
2Spanish Strip Cipher — Part 137
2Spanish Strip Cipher — Part 234
XSpanish Strip Cipher — Part 30
2Double Column Transposition — Part 135
2ORYX Stream Cipher — Part 4a12
3ORYX Stream Cipher — Part 4b2
3ORYX Stream Cipher — Part 4c0
2Double Column Transposition — Part 342
2Double Column Transposition — Part 249
2Double Column Transposition — Part 454
2Double Column Transposition — Part 59
1M-138 — Part 1243
1Heartbleed — Part 190
1Heartbleed — Part 260
2Heartbleed — Part 333
2M-138 — Part 2148
2M-138 — Part 369
1The Last Note113
2M-138 — Part 433
2Handycipher — Part 16
2Handycipher — Part 28
3Handycipher — Part 37
1Number Sequence — Part 6185
1Number Sequence — Part 7107
2Extended Handycipher — Part 13
2Extended Handycipher — Part 23
2Extended Handycipher — Part 33
1A hidden word — Part 2127
2Weakened Handycipher — Part 117
2Weakened Handycipher — Part 215
2Weakened Handycipher — Part 315
2Double-Column Transposition/Granit — Part 10
2Double-Column Transposition/Granit — Part 20
2Double-Column Transposition/Granit — Part 30
2Flawed Usage of a OTP Cipher by the BND20
2Spirale — Part 18
2Spirale — Part 28
2Spirale — Part 36
3Spirale — Part 40
1Number Sequence — Part 8447
1Weakened Granit — Part 152
2Weakened Granit — Part 20
2Weakened Granit — Part 30
1News from Castle Mansfeld62
1Image Noise184
1New Year's Greetings — Part 155
1New Year's Greetings — Part 251
1New Year's Greetings — Part 349
1New Year's Greetings — Part 446
2New Year's Greetings — Part 516
3Handycipher — Part 44
3Handycipher — Part 55
3Handycipher — Part 65
3Extended Handycipher — Part 43
3Extended Handycipher — Part 53
3Extended Handycipher — Part 62
2Weakened Handycipher — Part 46
2Weakened Handycipher — Part 56
2Weakened Handycipher — Part 66
2ASAC — A Strong(er) ADFGVX Cipher — Part 120
2ASAC — A Strong(er) ADFGVX Cipher — Part 21
2ASAC — A Strong(er) ADFGVX Cipher — Part 30
2ASAC — A Strong(er) ADFGVX Cipher — Part 40
2ASAC — A Strong(er) ADFGVX Cipher — Part 50
3Handycipher — Part 72
3Handycipher — Part 83
3Handycipher — Part 93
2Hilly — Part 19
2Holographic Encryption — Part 18
2Holographic Encryption — Part 23
2Kaskade-S/T — Part 6 (RansomKaskade Part 1)6
3ElsieFour — Part 14
2Weakened ElsieFour — Part 34
2Hilly — Part 21
1Number Sequence — Part 9139
1Advent-Challenge — Part 1561
2Advent-Challenge — Part 260
2AES ECB Wrong Encoding29
2Advent Challenge — Part 351
2Advent Challenge — Part 447
2The Einstein Enigma66
XThe Vatican Challenge — Part 13
XThe Vatican Challenge — Part 23
1Number Sequence — Part 10134
2Weakened ElsieFour — Part 16
2Weakened ElsieFour — Part 21
2Summer Job63
2Fastest in the West41
2Trendy Messenger37
1Modular Sequences95
1Autokey Cipher221
2Breaking a Filter Generator22
1Cryptanalysis Hacking Puzzles — Part 137
XCatherine of Aragon's Letter to King Ferdinand, her Father (1509)2
2"The Road" — Part 19
2"The Road" — Part 22
2"The Road" — Part 30
1Cryptanalysis Hacking Puzzles — Part 2236
2Monoalphabetic Substitution with Nostradamus Flavor44
2Handycipher made in love — Part 129
2Homophonic Encryption — Part 151
2Homophonic Encryption — Part 246
2Homophonic Encryption — Part 344
2Homophonic Encryption — Part 443
2Handycipher made in love — Part 223
2Handycipher — Part 101
XThe Vatican Challenge — Part 30
XThe Vatican Challenge — Part 41
XThe Vatican Challenge — Part 50
2The T52 Sturgeon Challenge — Part 121
2The T52 Sturgeon Challenge — Part 220
2The T52 Sturgeon Challenge — Part 316
2The T52 Sturgeon Challenge — Part 414
2The T52 Sturgeon Challenge — Part 811
2The T52 Sturgeon Challenge — Part 99
2The T52 Sturgeon Challenge — Part 109
2The T52 Sturgeon Challenge — Part 1110
2The T52 Sturgeon Challenge — Part 1210
2The T52 Sturgeon Challenge — Part 58
2The T52 Sturgeon Challenge — Part 68
2The T52 Sturgeon Challenge — Part 78
2A Cloaked Substitution Cipher — Part 124
2A Cloaked Substitution Cipher — Part 223
3The Heavy T52 Sturgeon Challenge — Part 12
3The Heavy T52 Sturgeon Challenge — Part 23
3The Heavy T52 Sturgeon Challenge — Part 33
2Cipher ID — Part 119
2Polyphonic Substitution Cipher — Part 126
2Christmas Challenge 2019: Differential Cryptanalysis — Part 15
2Polyphonic Substitution Cipher — Part 224
2Differential Cryptanalysis — Part 25
2The LoRa Cipher: Logic Randomness — Part 129
2The SIGABA Challenge — Part 111
2The SIGABA Challenge — Part 210
3The SIGABA Challenge — Part 36
3The SIGABA Challenge — Part 45
1Polyhomophonic Substitution — Part 162
3The SIGABA Challenge — Part 52
2Polyhomophonic Substitution — Part 234
3The SIGABA Challenge — Part 61
2Polyhomophonic Substitution — Part 320
3The Heavy T52 Sturgeon Challenge — Part 46
3The Heavy T52 Sturgeon Challenge — Part 57
3The Heavy T52 Sturgeon Challenge — Part 65
3The Heavy T52 Sturgeon Challenge — Part 78
3The Heavy T52 Sturgeon Challenge — Part 80
3The Heavy T52 Sturgeon Challenge — Part 93
1Lightweight Introduction to Lattices — Part 165
1Lightweight Introduction to Lattices — Part 246
2Lightweight Introduction to Lattices — Part 339
2The SZ42 Challenge — Part 120
2The SZ42 Challenge — Part 220
2The SZ42 Challenge — Part 317
2The SZ42 Challenge — Part 418
2The SZ42 Challenge — Part 517
2The SZ42 Challenge — Part 615
2The SZ42 Challenge — Part 714
1Find the right route — Part 1107
2The SZ42 Challenge — Part 815
2The SZ42 Challenge — Part 914
1Find the right route — Part 241
1Find the right route — Part 340
2The SZ42 Challenge — Part 107
2The SZ42 Challenge — Part 114
1Wheatstone Cryptograph — Part 1119
2Wheatstone Cryptograph — Part 216
2SIGABA CSP-889 — Part 12
2SIGABA CSP-889 — Part 22
3SIGABA CSP-889 — Part 32
2SIGABA CSP-2900 — Part 12
2SIGABA CSP-2900 — Part 22
3SIGABA CSP-2900 — Part 32
2The SZ42 Challenge — Part 1211
2The SZ42 Challenge — Part 1310
2Modified Vigenère Cipher12
1Alberti Challenge — Part 1158
2Alberti Challenge — Part 211
2Hill Cipher13
1Merkle-Hellman Knapsack Challenge - Part 181
2Merkle-Hellman Knapsack Challenge — Part 218
1The Syllabary Cipher – Part 1284
2The Syllabary Cipher – Part 233
2The Syllabary Cipher – Part 323
2The Syllabary Cipher – Part 415
2The Syllabary Cipher – Part 515
3A Heavy SZ42 Challenge – Part 140
2The Josse Challenge – Part 117
2The Josse Challenge – Part 217
2The Josse Challenge – Part 314
2The Hutton Cipher – Part 124
2The Hutton Cipher – Part 227
2The Hutton Cipher – Part 34
2The Hutton Cipher – Part 44
2The Hutton Cipher – Part 50
1A disguised code50
2Elliptic Boogaloo – Part 13
3Elliptic Boogaloo – Part 23
3Elliptic Boogaloo – Part 33
2PX-1000 Encryption – Part 111
2The Fialka Challenge – Part 15
2The Fialka Challenge – Part 24
2The Fialka Challenge – Part 34
2The Lady Liz Challenge0