MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8086
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2933 100
2 Original Caesar Cipher I 1924 100
3 Number Sequence — Part 2 I 1346 100
4 Caesar Encryption I 986 100
5 Beaver Code I 739 100
6 Letter to the Templars — Part 1 I 666 100
7 Number Sequence — Part 3 I 611 100
8 Letter to the Templars — Part 2 I 533 100
9 Number Sequence — Part 4 I 490 100
10 A hidden word I 476 100
11 Monoalphabetic Substitution I 427 100
12 Letter to the Templars — Part 3 II 417 1102
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 380 100
14 Factorization Cipher — Part 1 I 341 100
15 Grille Cipher I 318 100
16 Homophonic Encryption Part 1 I 303 100
17 Cracking SHA1-Hashed Passwords II 293 1094
18 Homophonic Encryption Part 2 I 260 100
19 One-Time Pad with Flaws I 232 100
20 Snow White and the seven dwarfs I 219 100
21 Alice's Birthday Party (Part 1) II 196 1092
22 Alice's Birthday Party (Part 2) II 187 1092
23 From Russia with Love I 179 100
24 Modified Caesar Cipher I 157 100
25 Reserve Hand Procedure — Part 1 I 155 100
26 How do you become a big cryptographer? I 154 100
27 Broadcasting and low exponent — RSA-Attack II 147 1095
28 Letter from the Alleged Countess Julie von Ortenburg I 143 100
29 Number Sequence — Part 8 I 140 100
30 Classical Ciphers^3 I 138 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 136 1092
32 Enigma Messages with Repeated Letters — Part 1 I 132 100
33 M-138 — Part 1 I 122 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 122 1092
35 Hybrid Encryption I II 117 1093
36 Nils away on travel I 117 100
37 Pigpen with a twist — Part 1 I 116 100
38 The Book Code: A Challenge for Bookworms I 113 100
39 RSA: Two different keys — same ciphertext II 110 1096
40 Molehunt (Part 1/3) I 107 100
41 Enigma Part 1 II 106 1092
42 Factorization Cipher — Part 2 II 105 1097
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 103 100
45 ¿No Hablas Español? No problemo! I 96 100
46 Trifid Cipher I 93 100
47 A really long number sequence II 90 1096
48 ADFGVX — Part 2 I 88 100
49 Kaskade-S/T — Part 1 I 86 100
50 Enigma Combinatorics I 81 100
51 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 79 100
52 ADFGVX — Part 1 I 79 100
53 Heartbleed — Part 1 I 78 100
54 Double Columnar Transposition I 77 100
55 Playfair Encryption I 76 100
56 ECDH-Key Exchange for Beginners I 74 100
57 Playfair with hints about the grid I 73 100
58 M-138 — Part 2 II 72 1121
59 ORYX Stream Cipher Part I II 71 1092
60 Enigma Part 2 II 69 1092
61 Number Sequence — Part 6 I 68 100
62 Zodiac Cipher I 68 100
63 Factorization Cipher — Part 3 II 67 1098
64 Enigma Messages with Repeated Letters — Part 2 I 62 100
65 A hidden word — Part 2 I 62 100
66 Enigma Messages with Repeated Letters — Part 3 I 61 100
67 Molehunt (Part 3/3) II 61 1092
68 Hill Cipher with Sudoku Key I 60 100
69 The Last Note I 60 100
70 Partial Key Exposure with RSA — Part 1 II 58 1098
71 Enigma Messages with Repeated Letters — Part 5 I 57 100
72 Smartcard RSA II 57 1092
73 Turing Bombe Enigma I I 55 100
74 BCR code (Book-Caesar-RSA) II 55 1101
75 Number Sequence — Part 5 I 55 100
76 Enigma Messages I 55 100
77 Cascading Encryption — Part 1/3 I 54 100
78 Image Noise I 54 100
79 Enigma Messages with Repeated Letters — Part 4 I 53 100
80 Heartbleed — Part 2 I 52 100
81 Multilingual Monoalphabetic Substitution I 51 100
82 Recycled One-Time Pad I 46 100
83 AES key — encoded in the machine readable zone of a European ePassport II 46 1098
84 An Invisible Message I 45 100
85 Unusual encryption using a diophantine equation II 43 1096
86 Kaskade-S/T — Part 2 II 42 1094
87 Monoalphabetic substitution with camouflage — Part 1 I 42 100
88 ORYX Stream Cipher Part II II 39 1092
89 Strange Message from Thessaloniki I 37 100
90 Keyshanc — Part 1 II 37 1099
91 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 37 1093
92 News from Castle Mansfeld I 36 100
93 Unconcealed RSA messages II 35 1097
94 Monoalphabetic substitution with camouflage — Part 4 I 35 100
95 Music Code — Part 2 II 34 1095
96 Number Sequence — Part 7 I 34 100
97 Music Code — Part 1 I 34 100
98 Monoalphabetic substitution with camouflage — Part 2 II 33 1097
99 Weakened Granit — Part 1 I 33 100
100 An 'unhearable' message I 32 100
101 CMEA 1 II 32 1093
102 Ku Klux Klan X 32 var
103 Monoalphabetic substitution with camouflage — Part 3 II 31 1097
104 New Year's Greetings — Part 1 I 31 100
105 Pigpen with a twist — Part 2 II 31 1096
106 RSA Factoring Challenge: RSA-704 II 30 0
107 M-138 — Part 3 II 30 1121
108 Double Column Transposition — Part 2 II 30 1114
109 Keyshanc — Part 2 II 29 1099
110 Double Column Transposition — Part 4 II 29 1114
111 Not-so-Secret Message from Malawi — Part II (ECC) II 28 1092
112 Pigpen with a twist — Part 3 II 27 1096
113 New Year's Greetings — Part 2 I 27 100
114 New Year's Greetings — Part 3 I 26 100
115 Heartbleed — Part 3 II 26 1117
116 Double Column Transposition — Part 3 II 26 1114
117 Kaskade-S/T — Part 3 II 25 1094
118 New Year's Greetings — Part 4 I 25 100
119 ORYX Stream Cipher — Part 3 (revised) II 23 1106
120 RSA Factoring Challenge: RSA-210 II 22 0
121 CMEA 2 III 21 13264
122 Monoalphabetic Substitution with Camouflage — Part 5 II 19 1098
123 Spanish Strip Cipher — Part 1 II 19 1113
124 Typex — Part 1 II 19 1104
125 Double Column Transposition — Part 1 II 19 1113
126 Lattice Part 1 II 18 1094
127 RSA with Special d III 16 13255
128 Spanish Strip Cipher — Part 2 II 16 1113
129 Typex — Part 2 II 16 1105
130 Concealed Messages — Vigenère's Night Sky X 15 var
131 Purple 1 II 13 1092
132 New Year's Greetings — Part 5 II 12 1147
133 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 11 1159
134 Sigaba Part 1 II 11 1092
135 M-138 — Part 4 II 11 1121
136 Cascading Encryption — Part 3/3 II 10 1105
137 Cascading Encryption — Part 2/3 II 10 1105
138 Weakened Handycipher — Part 3 II 9 1127
139 Weakened Handycipher — Part 1 II 9 1127
140 Flawed Usage of a OTP Cipher by the BND II 9 1132
141 Kaskade-S/T — Part 5 II 9 1095
142 ORYX Stream Cipher — Part 4a II 9 1113
143 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 8 1094
144 Weakened Handycipher — Part 2 II 8 1127
145 Akelarre Part 1 II 7 1093
146 RSA Factoring Challenge: RSA-220 II 6 0
147 Double Column Transposition — Part 5 II 5 1115
148 Handycipher — Part 2 II 4 1124
149 Handycipher — Part 3 III 4 13756
150 Notes of an Italian Soldier X 4 var
151 Weakened Handycipher — Part 5 II 3 1157
152 Handycipher — Part 1 II 3 1124
153 Handycipher — Part 6 III 3 14226
154 Weakened Handycipher — Part 6 II 3 1157
155 Weakened Handycipher — Part 4 II 3 1157
156 Handycipher — Part 5 III 3 14226
157 Extended Handycipher — Part 1 II 2 1125
158 Extended Handycipher — Part 2 II 2 1125
159 Extended Handycipher — Part 4 III 2 14226
160 Unknown Author X 2 var
161 Spirale — Part 2 II 2 1132
162 Handycipher — Part 4 III 2 14226
163 Extended Handycipher — Part 5 III 2 14226
164 Extended Handycipher — Part 3 II 2 1125
165 Spirale — Part 1 II 2 1132
166 Spirale — Part 3 II 2 1132
167 Double Column Transposition X 2 var
168 Sigaba Part 2 III 2 13255
169 Holographic Encryption — Part 1 II 2 1246
170 Holographic Encryption — Part 2 II 2 1246
171 Handycipher — Part 8 III 1 14771
172 Handycipher — Part 7 III 1 14771
173 Handycipher — Part 9 III 1 14771
174 Substitution Cipher with Non-Prefix Codes III 1 13301
175 Beale Ciphers X 1 var
176 Hilly — Part 1 II 1 1203
177 Extended Handycipher — Part 6 III 1 14226
178 ORYX Stream Cipher — Part 4b III 1 13594
179 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1100
180 Double-Column Transposition/Granit — Part 3 II 0 1129
181 Double-Column Transposition/Granit — Part 1 II 0 1129
182 Spirale — Part 4 II 0 1132
183 Double-Column Transposition/Granit — Part 2 II 0 1129
184 Weakened Granit — Part 3 II 0 1134
185 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1159
186 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1159
187 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1159
188 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1159
189 Weakened Granit — Part 2 II 0 1134
190 RSA Factoring Challenge: RSA-500 III 0 13351
191 RSA Factoring Challenge: RSA-896 III 0 13351
192 RSA Factoring Challenge: RSA-280 III 0 13351
193 RSA Factoring Challenge: RSA-270 III 0 13351
194 RSA Factoring Challenge: RSA-260 III 0 13351
195 RSA Factoring Challenge: RSA-250 III 0 13351
196 RSA Factoring Challenge: RSA-290 III 0 13351
197 RSA Factoring Challenge: RSA-300 III 0 13351
198 RSA Factoring Challenge: RSA-320 III 0 13351
199 RSA Factoring Challenge: RSA-310 III 0 13351
200 RSA Factoring Challenge: RSA-1024 III 0 13351
201 RSA Factoring Challenge: RSA-309 III 0 13351
202 RSA Factoring Challenge: RSA-240 III 0 13351
203 RSA Factoring Challenge: RSA-232 III 0 13351
204 World Record Challenge: Break 65 Bits of AES III 0 13255
205 Kryptos X 0 var
206 Dorabella X 0 var
207 D'Agapeyeff X 0 var
208 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13272
209 Twelve-Year-Old Murder Case X 0 var
210 RSA Factoring Challenge: RSA-230 II 0 1098
211 The third ENIGMA M4 message X 0 var
212 Digital Signatures: DSA with Medium Fields III 0 13317
213 Kaskade-S/T — Part 4 II 0 1095
214 RSA Factoring Challenge: RSA-330 III 0 13351
215 RSA Factoring Challenge: RSA-340 III 0 13351
216 RSA Factoring Challenge: RSA-490 III 0 13351
217 RSA Factoring Challenge: RSA-617 III 0 13351
218 RSA Factoring Challenge: RSA-480 III 0 13351
219 RSA Factoring Challenge: RSA-470 III 0 13351
220 RSA Factoring Challenge: RSA-1536 III 0 13351
221 RSA Factoring Challenge: RSA-2048 III 0 13351
222 ORYX Stream Cipher — Part 4d III 0 13487
223 Spanish Strip Cipher — Part 3 X 0 var
224 Double Column Transposition Reloaded — Part 3 III 0 13545
225 Double Column Transposition Reloaded — Part 2 III 0 13545
226 Double Column Transposition Reloaded — Part 1 III 0 13545
227 RSA Factoring Challenge: RSA-460 III 0 13351
228 RSA Factoring Challenge: RSA-450 III 0 13351
229 RSA Factoring Challenge: RSA-380 III 0 13351
230 RSA Factoring Challenge: RSA-370 III 0 13351
231 RSA Factoring Challenge: RSA-360 III 0 13351
232 RSA Factoring Challenge: RSA-350 III 0 13351
233 RSA Factoring Challenge: RSA-390 III 0 13351
234 RSA Factoring Challenge: RSA-400 III 0 13351
235 RSA Factoring Challenge: RSA-440 III 0 13351
236 RSA Factoring Challenge: RSA-430 III 0 13351
237 RSA Factoring Challenge: RSA-420 III 0 13351
238 RSA Factoring Challenge: RSA-410 III 0 13351
239 ORYX Stream Cipher — Part 4c III 0 13594
 
 
powered by the CrypTool project  CrypTool

 

   +++    [20:18 - 26.06.2017] george4096 solved the Level II challenge 'ORYX Stream Cipher — Part 4a'    +++    [19:43 - 26.06.2017] D3d4lu5 solved the Level I challenge 'Zodiac Cipher'    +++    [19:41 - 26.06.2017] D3d4lu5 solved the Level I challenge 'Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1'    +++    [21:32 - 25.06.2017] kasia-tutej solved the Level II challenge 'Brute-Force-Attack on Triple-DES with Reduced Key Space'    +++    [10:46 - 25.06.2017] kynguyenngoc solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++