Blog posts

#51

Overview of articles written by the CrypTool team.

Student crypto 2023 in Munich at Youth Science Club

Friday, October 20, 2023

After a long break, our team was finally able to present the topic of cryptology to interested students again. We were guests of the *Youth Science Club*: »The [Youth Science Club](https://teaching.genetik.biologie.uni-muenchen.de/teaching/YSC) gives 27 students from the 8th to 10th grade the opportunity to get to know scientific work in depth as

CrypTool 2 Release 2023.1 published

Friday, June 16, 2023

In June 2023, we released version "2023.1" which is the first release of the year. The previous CT2 version was released in December 2022. Since the December version, we have introduced some interesting new ciphers, such as GRANIT 160, a hand cipher used by GDR spies, as well as the Typex

New Version of CrypTool 1 — CT 1.4.42 released

Tuesday, December 21, 2021

CrypTool 1.4.42 was published on December 21, 2021. Compared to CrypTool 1.4.41, this version contains a range of small bug fixes and improvements for CrypTool 1 (CT1). The open-source project CrypTool (CT) creates the most widespread e-learning programs for cryptography and cryptanalysis. The CT programs are used at many schools and universities

JCrypTool version 1.0 released

Monday, November 30, 2020

import { Button } from "@chakra-ui/react" Version 1.0 of JCrypTool was released today, November 30th, 2020. It is intended for beginners and experts in cryptography alike. JCrypTool is available in English and German. Already bundled are over 100 plugins that cover classical and modern cryptography. [View a full list of included

Article about solving the Double-Transposition Challenge in Cryptologia

Saturday, June 28, 2014

A level X challenge in MysteryTwister by Klaus Schmeh using the [double-column transposition](https://www.mysterytwister.org/en/challenges/level-x/double-column-transposition) cipher withstood a long time against cryptanalysis efforts. Nevertheless, it was solved in November 2013 by George Lasry. The according attack against the double-column transposition cipher was just described in the journal Cryptologia and is now implemented in