MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9465
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3487 100
2 Original Caesar Cipher I 2358 100
3 Number Sequence — Part 2 I 1666 100
4 Caesar Encryption I 1161 100
5 Beaver Code I 924 100
6 Letter to the Templars — Part 1 I 805 100
7 Number Sequence — Part 3 I 778 100
8 Letter to the Templars — Part 2 I 641 100
9 Number Sequence — Part 4 I 630 100
10 A hidden word I 613 100
11 Letter to the Templars — Part 3 II 531 1093
12 Monoalphabetic Substitution I 465 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 448 100
14 Factorization Cipher — Part 1 I 399 100
15 Cracking SHA1-Hashed Passwords II 395 1088
16 Grille Cipher I 375 100
17 Homophonic Encryption Part 1 I 337 100
18 Homophonic Encryption Part 2 I 290 100
19 Advent-Challenge — Part 1 I 255 100
20 One-Time Pad with Flaws I 255 100
21 Number Sequence — Part 8 I 242 100
22 Snow White and the seven dwarfs I 240 100
23 Alice's Birthday Party (Part 1) II 232 1087
24 From Russia with Love I 222 100
25 Alice's Birthday Party (Part 2) II 219 1087
26 How do you become a big cryptographer? I 181 100
27 Broadcasting and low exponent — RSA-Attack II 179 1089
28 Modified Caesar Cipher I 176 100
29 Reserve Hand Procedure — Part 1 I 166 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 155 1087
31 Letter from the Alleged Countess Julie von Ortenburg I 154 100
32 M-138 — Part 1 I 151 100
33 Classical Ciphers^3 I 149 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 145 1087
35 Enigma Messages with Repeated Letters — Part 1 I 145 100
36 Hybrid Encryption I II 133 1087
37 Nils away on travel I 132 100
38 Pigpen with a twist — Part 1 I 129 100
39 RSA: Two different keys — same ciphertext II 126 1089
40 The Book Code: A Challenge for Bookworms I 123 100
41 Factorization Cipher — Part 2 II 119 1090
42 Molehunt (Part 1/3) I 118 100
43 Enigma Part 1 II 116 1087
44 Molehunt (Part 2/3) I 115 100
45 ¿No Hablas Español? No problemo! I 115 100
46 A Secret Message from Castle Mansfeld I 110 100
47 A really long number sequence II 102 1089
48 Trifid Cipher I 102 100
49 ADFGVX — Part 2 I 99 100
50 Number Sequence — Part 6 I 95 100
51 Image Noise I 94 100
52 Kaskade-S/T — Part 1 I 94 100
53 M-138 — Part 2 II 91 1105
54 ADFGVX — Part 1 I 90 100
55 Playfair Encryption I 89 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 87 100
58 Double Columnar Transposition I 86 100
59 Heartbleed — Part 1 I 86 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
61 ECDH-Key Exchange for Beginners I 78 100
62 Zodiac Cipher I 74 100
63 Enigma Part 2 II 74 1087
64 ORYX Stream Cipher Part I II 74 1087
65 The Last Note I 74 100
66 Factorization Cipher — Part 3 II 74 1091
67 A hidden word — Part 2 I 73 100
68 Molehunt (Part 3/3) II 67 1087
69 Hill Cipher with Sudoku Key I 67 100
70 Partial Key Exposure with RSA — Part 1 II 66 1091
71 Enigma Messages with Repeated Letters — Part 3 I 66 100
72 Enigma Messages I 65 100
73 Enigma Messages with Repeated Letters — Part 2 I 65 100
74 Number Sequence — Part 5 I 64 100
75 Enigma Messages with Repeated Letters — Part 5 I 62 100
76 Number Sequence — Part 10 I 61 100
77 Multilingual Monoalphabetic Substitution I 61 100
78 Number Sequence — Part 9 I 60 100
79 Cascading Encryption — Part 1/3 I 60 100
80 Smartcard RSA II 60 1087
81 BCR code (Book-Caesar-RSA) II 60 1093
82 Autokey Cipher I 59 101
83 Turing Bombe Enigma I I 58 100
84 Heartbleed — Part 2 I 58 100
85 Enigma Messages with Repeated Letters — Part 4 I 57 100
86 AES key — encoded in the machine readable zone of a European ePassport II 57 1091
87 Number Sequence — Part 7 I 53 100
88 An Invisible Message I 51 100
89 Recycled One-Time Pad I 51 100
90 Monoalphabetic substitution with camouflage — Part 1 I 51 100
91 Unusual encryption using a diophantine equation II 50 1089
92 Kaskade-S/T — Part 2 II 45 1088
93 ORYX Stream Cipher Part II II 42 1087
94 The Einstein Enigma II 42 1152
95 News from Castle Mansfeld I 41 100
96 M-138 — Part 3 II 41 1105
97 Keyshanc — Part 1 II 41 1092
98 New Year's Greetings — Part 1 I 41 100
99 Strange Message from Thessaloniki I 40 100
100 Unconcealed RSA messages II 40 1090
101 Monoalphabetic substitution with camouflage — Part 4 I 40 100
102 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1087
103 Monoalphabetic substitution with camouflage — Part 2 II 39 1090
104 New Year's Greetings — Part 2 I 38 100
105 Weakened Granit — Part 1 I 38 100
106 Monoalphabetic substitution with camouflage — Part 3 II 38 1090
107 Music Code — Part 1 I 37 100
108 Music Code — Part 2 II 37 1088
109 RSA Factoring Challenge: RSA-704 II 36 0
110 New Year's Greetings — Part 3 I 36 100
111 An 'unhearable' message I 36 100
112 Ku Klux Klan X 36 var
113 Pigpen with a twist — Part 2 II 35 1089
114 New Year's Greetings — Part 4 I 35 100
115 Double Column Transposition — Part 4 II 35 1101
116 CMEA 1 II 34 1087
117 Double Column Transposition — Part 2 II 34 1101
118 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1087
119 Pigpen with a twist — Part 3 II 32 1089
120 Keyshanc — Part 2 II 32 1092
121 Advent-Challenge — Part 2 II 30 1147
122 Double Column Transposition — Part 3 II 30 1101
123 Summer Job II 30 1169
124 Kaskade-S/T — Part 3 II 29 1088
125 RSA Factoring Challenge: RSA-210 II 29 0
126 Cryptanalysis Hacking Puzzles — Part 2 I 28 101
127 Heartbleed — Part 3 II 28 1103
128 Advent Challenge — Part 4 II 27 1147
129 ORYX Stream Cipher — Part 3 (revised) II 27 1096
130 Modular Sequences I 26 101
131 Trendy Messenger II 25 1169
132 Advent Challenge — Part 3 II 25 1148
133 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1091
134 Lattice Part 1 II 24 1088
135 Fastest in the West II 23 1169
136 CMEA 2 III 23 13165
137 Double Column Transposition — Part 1 II 22 1100
138 Typex — Part 1 II 21 1095
139 RSA with Special d III 20 13158
140 Spanish Strip Cipher — Part 1 II 20 1100
141 Spanish Strip Cipher — Part 2 II 18 1100
142 Typex — Part 2 II 18 1095
143 Cryptanalysis Hacking Puzzles — Part 1 I 16 101
144 Concealed Messages — Vigenère's Night Sky X 16 var
145 Monoalphabetic Substitution with Nostradamus Flavor II 15 1321
146 RSA Factoring Challenge: RSA-220 II 15 0
147 Purple 1 II 15 1087
148 M-138 — Part 4 II 15 1105
149 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1119
150 New Year's Greetings — Part 5 II 13 1115
151 AES ECB Wrong Encoding II 13 1147
152 Weakened Handycipher — Part 1 II 13 1107
153 Sigaba Part 1 II 12 1087
154 Weakened Handycipher — Part 3 II 12 1107
155 Flawed Usage of a OTP Cipher by the BND II 12 1110
156 ORYX Stream Cipher — Part 4a II 11 1100
157 Weakened Handycipher — Part 2 II 11 1107
158 RSA Factoring Challenge: RSA-230 II 11 0
159 Breaking a Filter Generator II 11 1194
160 Cascading Encryption — Part 2/3 II 11 1095
161 Cascading Encryption — Part 3/3 II 11 1095
162 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1088
163 Handycipher made in love II 10 1321
164 Akelarre Part 1 II 9 1087
165 Kaskade-S/T — Part 5 II 9 1088
166 Handycipher — Part 3 III 6 13481
167 Hilly — Part 1 II 6 1126
168 Handycipher — Part 2 II 6 1106
169 Double Column Transposition — Part 5 II 5 1101
170 Weakened Handycipher — Part 4 II 5 1118
171 Handycipher — Part 6 III 5 13673
172 Handycipher — Part 5 III 5 13673
173 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 5 1135
174 Weakened Handycipher — Part 5 II 5 1118
175 Handycipher — Part 1 II 5 1106
176 Weakened Handycipher — Part 6 II 5 1118
177 Notes of an Italian Soldier X 4 var
178 Handycipher — Part 4 III 4 13673
179 The Vatikan Challenge — Part 2 X 3 var
180 Handycipher — Part 9 III 3 13792
181 Sigaba Part 2 III 3 13158
182 The Vatican Challenge — Part 1 X 3 var
183 Extended Handycipher — Part 1 II 3 1106
184 Extended Handycipher — Part 3 II 3 1106
185 Extended Handycipher — Part 2 II 3 1106
186 Holographic Encryption — Part 1 II 3 1130
187 Handycipher — Part 8 III 3 13792
188 Spirale — Part 2 II 3 1110
189 Spirale — Part 3 II 3 1110
190 Extended Handycipher — Part 5 III 3 13673
191 Extended Handycipher — Part 4 III 3 13673
192 "The Road" — Part 1 II 3 1227
193 Spirale — Part 1 II 3 1110
194 Unknown Author X 2 var
195 Weakened ElsieFour — Part 3 II 2 1141
196 ElsieFour — Part 1 III 2 14001
197 Double Column Transposition X 2 var
198 Handycipher — Part 7 III 2 13792
199 Extended Handycipher — Part 6 III 2 13673
200 Holographic Encryption — Part 2 II 2 1130
201 ORYX Stream Cipher — Part 4b III 2 13390
202 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
203 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1119
204 Hilly — Part 2 II 1 1142
205 Beale Ciphers X 1 var
206 Weakened ElsieFour — Part 1 II 1 1162
207 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1092
208 Substitution Cipher with Non-Prefix Codes III 1 13192
209 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1119
210 RSA Factoring Challenge: RSA-380 III 0 13229
211 RSA Factoring Challenge: RSA-400 III 0 13229
212 RSA Factoring Challenge: RSA-1536 III 0 13229
213 RSA Factoring Challenge: RSA-470 III 0 13229
214 D'Agapeyeff X 0 var
215 RSA Factoring Challenge: RSA-480 III 0 13229
216 "The Road" — Part 2 II 0 1227
217 "The Road" — Part 3 II 0 1227
218 RSA Factoring Challenge: RSA-440 III 0 13229
219 RSA Factoring Challenge: RSA-450 III 0 13229
220 RSA Factoring Challenge: RSA-460 III 0 13229
221 RSA Factoring Challenge: RSA-490 III 0 13229
222 RSA Factoring Challenge: RSA-500 III 0 13229
223 RSA Factoring Challenge: RSA-410 III 0 13229
224 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1119
225 Kryptos X 0 var
226 RSA Factoring Challenge: RSA-420 III 0 13229
227 RSA Factoring Challenge: RSA-2048 III 0 13229
228 RSA Factoring Challenge: RSA-617 III 0 13229
229 Weakened ElsieFour — Part 2 II 0 1162
230 Dorabella X 0 var
231 RSA Factoring Challenge: RSA-390 III 0 13229
232 RSA Factoring Challenge: RSA-360 III 0 13229
233 RSA Factoring Challenge: RSA-250 III 0 13229
234 RSA Factoring Challenge: RSA-240 III 0 13229
235 Twelve-Year-Old Murder Case X 0 var
236 RSA Factoring Challenge: RSA-260 III 0 13229
237 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13170
238 RSA Factoring Challenge: RSA-430 III 0 13229
239 RSA Factoring Challenge: RSA-896 III 0 13229
240 RSA Factoring Challenge: RSA-270 III 0 13229
241 RSA Factoring Challenge: RSA-232 III 0 13229
242 ORYX Stream Cipher — Part 4d III 0 13323
243 Double Column Transposition Reloaded — Part 2 III 0 13360
244 Spanish Strip Cipher — Part 3 X 0 var
245 Double Column Transposition Reloaded — Part 3 III 0 13360
246 Double Column Transposition Reloaded — Part 1 III 0 13360
247 ORYX Stream Cipher — Part 4c III 0 13390
248 The third ENIGMA M4 message X 0 var
249 Digital Signatures: DSA with Medium Fields III 0 13204
250 RSA Factoring Challenge: RSA-280 III 0 13229
251 RSA Factoring Challenge: RSA-290 III 0 13229
252 Weakened Granit — Part 2 II 0 1110
253 World Record Challenge: Break 65 Bits of AES III 0 13158
254 Spirale — Part 4 III 0 13540
255 Weakened Granit — Part 3 II 0 1110
256 RSA Factoring Challenge: RSA-340 III 0 13229
257 RSA Factoring Challenge: RSA-370 III 0 13229
258 Kaskade-S/T — Part 4 II 0 1088
259 RSA Factoring Challenge: RSA-350 III 0 13229
260 RSA Factoring Challenge: RSA-330 III 0 13229
261 Double-Column Transposition/Granit — Part 3 II 0 1108
262 RSA Factoring Challenge: RSA-1024 III 0 13229
263 RSA Factoring Challenge: RSA-309 III 0 13229
264 RSA Factoring Challenge: RSA-300 III 0 13229
265 RSA Factoring Challenge: RSA-310 III 0 13229
266 RSA Factoring Challenge: RSA-320 III 0 13229
267 Double-Column Transposition/Granit — Part 2 II 0 1108
268 Double-Column Transposition/Granit — Part 1 II 0 1108
269 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1119
 
 
powered by the CrypTool project  CrypTool

 

   +++    [01:18 - 23.03.2019] ykaridi solved the Level II challenge 'Partial Key Exposure with RSA — Part 1'    +++    [01:06 - 23.03.2019] ykaridi solved the Level II challenge 'Broadcasting and low exponent — RSA-Attack'    +++    [00:58 - 23.03.2019] ykaridi solved the Level II challenge 'Alice's Birthday Party (Part 2)'    +++    [23:43 - 22.03.2019] ykaridi solved the Level II challenge 'Alice's Birthday Party (Part 1)'    +++    [23:33 - 22.03.2019] ykaridi solved the Level II challenge 'RSA: Two different keys — same ciphertext'    +++