MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9191
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3349 100
2 Original Caesar Cipher I 2249 100
3 Number Sequence — Part 2 I 1572 100
4 Caesar Encryption I 1118 100
5 Beaver Code I 873 100
6 Letter to the Templars — Part 1 I 774 100
7 Number Sequence — Part 3 I 728 100
8 Letter to the Templars — Part 2 I 616 100
9 Number Sequence — Part 4 I 584 100
10 A hidden word I 573 100
11 Letter to the Templars — Part 3 II 504 1094
12 Monoalphabetic Substitution I 457 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 429 100
14 Factorization Cipher — Part 1 I 384 100
15 Grille Cipher I 357 100
16 Cracking SHA1-Hashed Passwords II 355 1089
17 Homophonic Encryption Part 1 I 326 100
18 Homophonic Encryption Part 2 I 279 100
19 One-Time Pad with Flaws I 248 100
20 Snow White and the seven dwarfs I 236 100
21 Advent-Challenge — Part 1 I 223 100
22 Alice's Birthday Party (Part 1) II 220 1087
23 Alice's Birthday Party (Part 2) II 211 1087
24 Number Sequence — Part 8 I 209 100
25 From Russia with Love I 209 100
26 How do you become a big cryptographer? I 173 100
27 Broadcasting and low exponent — RSA-Attack II 170 1090
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 164 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 149 1087
32 Classical Ciphers^3 I 144 100
33 M-138 — Part 1 I 144 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 143 1087
35 Enigma Messages with Repeated Letters — Part 1 I 142 100
36 Hybrid Encryption I II 129 1088
37 Nils away on travel I 127 100
38 Pigpen with a twist — Part 1 I 124 100
39 RSA: Two different keys — same ciphertext II 123 1090
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 117 100
42 Factorization Cipher — Part 2 II 115 1091
43 Enigma Part 1 II 113 1087
44 Molehunt (Part 2/3) I 113 100
45 ¿No Hablas Español? No problemo! I 111 100
46 A Secret Message from Castle Mansfeld I 110 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 100 1090
49 ADFGVX — Part 2 I 98 100
50 Kaskade-S/T — Part 1 I 92 100
51 ADFGVX — Part 1 I 89 100
52 Enigma Combinatorics I 87 100
53 Number Sequence — Part 6 I 87 100
54 Heartbleed — Part 1 I 86 100
55 Playfair Encryption I 86 100
56 M-138 — Part 2 II 86 1107
57 Image Noise I 85 100
58 Double Columnar Transposition I 83 100
59 Playfair with hints about the grid I 83 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
61 ECDH-Key Exchange for Beginners I 78 100
62 The Last Note I 73 100
63 Zodiac Cipher I 73 100
64 ORYX Stream Cipher Part I II 73 1087
65 A hidden word — Part 2 I 71 100
66 Factorization Cipher — Part 3 II 71 1091
67 Enigma Part 2 II 71 1087
68 Partial Key Exposure with RSA — Part 1 II 65 1092
69 Enigma Messages with Repeated Letters — Part 3 I 65 100
70 Molehunt (Part 3/3) II 65 1088
71 Enigma Messages with Repeated Letters — Part 2 I 64 100
72 Number Sequence — Part 5 I 64 100
73 Enigma Messages I 63 100
74 Hill Cipher with Sudoku Key I 63 100
75 BCR code (Book-Caesar-RSA) II 61 1094
76 Enigma Messages with Repeated Letters — Part 5 I 60 100
77 Smartcard RSA II 60 1088
78 Cascading Encryption — Part 1/3 I 59 100
79 Turing Bombe Enigma I I 58 100
80 Multilingual Monoalphabetic Substitution I 58 100
81 Heartbleed — Part 2 I 57 100
82 AES key — encoded in the machine readable zone of a European ePassport II 56 1092
83 Enigma Messages with Repeated Letters — Part 4 I 56 100
84 Unusual encryption using a diophantine equation II 50 1090
85 An Invisible Message I 50 100
86 Number Sequence — Part 10 I 50 100
87 Recycled One-Time Pad I 50 100
88 Monoalphabetic substitution with camouflage — Part 1 I 50 100
89 Number Sequence — Part 9 I 49 100
90 Number Sequence — Part 7 I 47 100
91 Kaskade-S/T — Part 2 II 45 1089
92 Autokey Cipher I 43 101
93 ORYX Stream Cipher Part II II 41 1087
94 Keyshanc — Part 1 II 41 1093
95 New Year's Greetings — Part 1 I 40 100
96 Monoalphabetic substitution with camouflage — Part 4 I 39 100
97 News from Castle Mansfeld I 39 100
98 Unconcealed RSA messages II 39 1091
99 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1088
100 Strange Message from Thessaloniki I 38 100
101 Monoalphabetic substitution with camouflage — Part 2 II 38 1091
102 Music Code — Part 2 II 37 1089
103 The Einstein Enigma II 37 1165
104 M-138 — Part 3 II 37 1107
105 Music Code — Part 1 I 37 100
106 Monoalphabetic substitution with camouflage — Part 3 II 36 1091
107 Weakened Granit — Part 1 I 36 100
108 New Year's Greetings — Part 2 I 36 100
109 Double Column Transposition — Part 4 II 35 1103
110 Ku Klux Klan X 35 var
111 An 'unhearable' message I 35 100
112 RSA Factoring Challenge: RSA-704 II 34 0
113 Double Column Transposition — Part 2 II 34 1102
114 CMEA 1 II 34 1088
115 New Year's Greetings — Part 3 I 34 100
116 Pigpen with a twist — Part 2 II 34 1090
117 New Year's Greetings — Part 4 I 33 100
118 Keyshanc — Part 2 II 32 1093
119 Pigpen with a twist — Part 3 II 31 1090
120 Double Column Transposition — Part 3 II 30 1102
121 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1087
122 Advent-Challenge — Part 2 II 28 1157
123 Heartbleed — Part 3 II 28 1104
124 Kaskade-S/T — Part 3 II 28 1089
125 RSA Factoring Challenge: RSA-210 II 27 0
126 ORYX Stream Cipher — Part 3 (revised) II 26 1097
127 Summer Job II 25 1192
128 Lattice Part 1 II 24 1089
129 Advent Challenge — Part 4 II 24 1158
130 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1092
131 CMEA 2 III 23 13178
132 Trendy Messenger II 23 1192
133 Advent Challenge — Part 3 II 22 1158
134 Double Column Transposition — Part 1 II 22 1102
135 Fastest in the West II 21 1192
136 Modular Sequences I 21 101
137 RSA with Special d III 20 13171
138 Typex — Part 1 II 20 1096
139 Spanish Strip Cipher — Part 1 II 19 1102
140 Typex — Part 2 II 18 1097
141 Spanish Strip Cipher — Part 2 II 17 1102
142 Concealed Messages — Vigenère's Night Sky X 16 var
143 Purple 1 II 14 1088
144 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1122
145 M-138 — Part 4 II 14 1107
146 RSA Factoring Challenge: RSA-220 II 13 0
147 Cryptoanalysis Hacking Puzzles — Part 1 I 13 102
148 AES ECB Wrong Encoding II 13 1157
149 Sigaba Part 1 II 12 1087
150 Flawed Usage of a OTP Cipher by the BND II 12 1112
151 New Year's Greetings — Part 5 II 12 1118
152 Weakened Handycipher — Part 3 II 11 1110
153 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1089
154 Weakened Handycipher — Part 1 II 11 1110
155 ORYX Stream Cipher — Part 4a II 10 1102
156 Cascading Encryption — Part 2/3 II 10 1096
157 Cascading Encryption — Part 3/3 II 10 1096
158 Weakened Handycipher — Part 2 II 10 1110
159 Breaking a Filter Generator II 10 1246
160 Kaskade-S/T — Part 5 II 9 1089
161 Akelarre Part 1 II 8 1088
162 RSA Factoring Challenge: RSA-230 II 7 0
163 Handycipher — Part 3 III 6 13513
164 Handycipher — Part 2 II 6 1108
165 Weakened Handycipher — Part 6 II 5 1122
166 Double Column Transposition — Part 5 II 5 1103
167 Hilly — Part 1 II 5 1131
168 Weakened Handycipher — Part 5 II 5 1122
169 Weakened Handycipher — Part 4 II 5 1122
170 Handycipher — Part 5 III 5 13725
171 Handycipher — Part 1 II 5 1108
172 Handycipher — Part 6 III 5 13725
173 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 5 1141
174 Notes of an Italian Soldier X 4 var
175 Handycipher — Part 4 III 4 13725
176 Extended Handycipher — Part 4 III 3 13725
177 Holographic Encryption — Part 1 II 3 1135
178 The Vatican Challenge — Part 1 X 3 var
179 The Vatikan Challenge — Part 2 X 3 var
180 Spirale — Part 3 II 3 1112
181 Spirale — Part 1 II 3 1112
182 Extended Handycipher — Part 1 II 3 1109
183 Spirale — Part 2 II 3 1112
184 Extended Handycipher — Part 3 II 3 1109
185 Extended Handycipher — Part 2 II 3 1109
186 Sigaba Part 2 III 3 13171
187 Unknown Author X 2 var
188 ORYX Stream Cipher — Part 4b III 2 13416
189 ElsieFour — Part 1 III 2 14116
190 Weakened ElsieFour — Part 3 II 2 1149
191 Weakened ElsieFour — Part 1 II 2 1180
192 Double Column Transposition X 2 var
193 Holographic Encryption — Part 2 II 2 1135
194 Handycipher — Part 9 III 2 13861
195 Extended Handycipher — Part 5 III 2 13725
196 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
197 "The Road" — Part 1 II 2 1547
198 Handycipher — Part 8 III 2 13861
199 Extended Handycipher — Part 6 III 1 13725
200 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1122
201 Hilly — Part 2 II 1 1151
202 Handycipher — Part 7 III 1 13861
203 Beale Ciphers X 1 var
204 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1093
205 Substitution Cipher with Non-Prefix Codes III 1 13207
206 RSA Factoring Challenge: RSA-1536 III 0 13245
207 RSA Factoring Challenge: RSA-460 III 0 13245
208 RSA Factoring Challenge: RSA-370 III 0 13245
209 D'Agapeyeff X 0 var
210 RSA Factoring Challenge: RSA-360 III 0 13245
211 "The Road" — Part 2 II 0 1547
212 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1122
213 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1122
214 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1122
215 "The Road" — Part 3 II 0 1547
216 RSA Factoring Challenge: RSA-380 III 0 13245
217 RSA Factoring Challenge: RSA-450 III 0 13245
218 RSA Factoring Challenge: RSA-500 III 0 13245
219 RSA Factoring Challenge: RSA-390 III 0 13245
220 Dorabella X 0 var
221 RSA Factoring Challenge: RSA-400 III 0 13245
222 Kryptos X 0 var
223 RSA Factoring Challenge: RSA-617 III 0 13245
224 RSA Factoring Challenge: RSA-440 III 0 13245
225 RSA Factoring Challenge: RSA-430 III 0 13245
226 RSA Factoring Challenge: RSA-420 III 0 13245
227 Weakened ElsieFour — Part 2 II 0 1180
228 RSA Factoring Challenge: RSA-410 III 0 13245
229 RSA Factoring Challenge: RSA-320 III 0 13245
230 Double Column Transposition Reloaded — Part 2 III 0 13384
231 Double Column Transposition Reloaded — Part 3 III 0 13384
232 The third ENIGMA M4 message X 0 var
233 Double-Column Transposition/Granit — Part 1 II 0 1111
234 Double-Column Transposition/Granit — Part 2 II 0 1111
235 RSA Factoring Challenge: RSA-232 III 0 13245
236 Double Column Transposition Reloaded — Part 1 III 0 13384
237 Double-Column Transposition/Granit — Part 3 II 0 1111
238 Spanish Strip Cipher — Part 3 X 0 var
239 ORYX Stream Cipher — Part 4c III 0 13416
240 Digital Signatures: DSA with Medium Fields III 0 13219
241 Kaskade-S/T — Part 4 II 0 1089
242 RSA Factoring Challenge: RSA-2048 III 0 13245
243 RSA Factoring Challenge: RSA-480 III 0 13245
244 RSA Factoring Challenge: RSA-490 III 0 13245
245 RSA Factoring Challenge: RSA-470 III 0 13245
246 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13184
247 RSA Factoring Challenge: RSA-240 III 0 13245
248 RSA Factoring Challenge: RSA-250 III 0 13245
249 RSA Factoring Challenge: RSA-309 III 0 13245
250 RSA Factoring Challenge: RSA-300 III 0 13245
251 RSA Factoring Challenge: RSA-290 III 0 13245
252 RSA Factoring Challenge: RSA-1024 III 0 13245
253 RSA Factoring Challenge: RSA-310 III 0 13245
254 RSA Factoring Challenge: RSA-340 III 0 13245
255 RSA Factoring Challenge: RSA-330 III 0 13245
256 Twelve-Year-Old Murder Case X 0 var
257 RSA Factoring Challenge: RSA-280 III 0 13245
258 ORYX Stream Cipher — Part 4d III 0 13344
259 RSA Factoring Challenge: RSA-270 III 0 13245
260 RSA Factoring Challenge: RSA-260 III 0 13245
261 Spirale — Part 4 III 0 13577
262 Weakened Granit — Part 2 II 0 1113
263 Weakened Granit — Part 3 II 0 1113
264 World Record Challenge: Break 65 Bits of AES III 0 13171
265 RSA Factoring Challenge: RSA-896 III 0 13245
266 RSA Factoring Challenge: RSA-350 III 0 13245
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:39 - 15.12.2018] McDudeface solved the Level I challenge 'Beaver Code'    +++    [00:23 - 15.12.2018] 16dombrowski solved the Level I challenge 'Grille Cipher'    +++    [23:42 - 14.12.2018] 16dombrowski solved the Level I challenge 'Homophonic Encryption Part 1'    +++    [22:18 - 14.12.2018] 16dombrowski solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [21:29 - 14.12.2018] FoM solved the Level I challenge 'An 'unhearable' message'    +++