- What is CryptoLeague?
- Who are the developers of CryptoLeague?
- Who can use CryptoLeague/Why Register?
- What is the current development status of CryptoLeague?
- What languages does CryptoLeague Support?
- What Ciphers does CryptoLeague support?
- What does "Good SHA Match" mean?
1. What is CryptoLeague?
CryptoLeague is a website offering cryptographic puzzles and tools for solving them.
2. Who are the developers of CryptoLeague?
CryptoLeague is developed by Chris Cracknell and Open Mind Software Ltd. The website administrator can be contacted via
This e-mail address is being protected from spambots. You need JavaScript enabled to view it
3. Who can use CryptoLeague/Why Register?
Anyone can use the webiste or try to solve the first 100 puzzles. Only registered users may use the full functionality on the rest of the puzzles, especially the saving of solutions and access to the hints on the puzzles. There will also be a forum for users to discuss anything to do with the site.
Registration is free and your details will not be used for any purpose other than the running of this site.
4. What is the current development status of CryptoLeague?
CryptoLeague is currently (7/10/2010) at the start of a beta test phase. More functionality will be added over the next few months. User registrations and solutions will be migrated from the beta to the final version.
5. What Languages does CryptoLeague Support?
CryptoLeague is developed in English and will add German support soon. Even after German support is added, it will take some time before the whole website can be translated into German.
6. What Ciphers does CryptoLeague support?
CryptoLeague currently only supports simple monoalphabetic substitution ciphers. This will be enhanced with support for non-1-to1 mappings and polyaphabetic ciphers. Machine ciphers will not be used - it is our intention that the puzzles should be solvable - and solved - by hand.
7.What does "Good SHA Match" mean.
SHA stands for Secure Hash Algorithm. It is a way of verifying some information: The data is used to produce a has function, a number derived from the data. To be useful as a form of authentication, iIt must be impossible to derive the data from the hash and it must be infeasible to find alternative data which will produce the same hash. I use this to pass a proposed solution back to the server for checking without actually having the solution data going over the network.
|