MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8449
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3060 100
2 Original Caesar Cipher I 2017 100
3 Number Sequence — Part 2 I 1413 100
4 Caesar Encryption I 1026 100
5 Beaver Code I 776 100
6 Letter to the Templars — Part 1 I 694 100
7 Number Sequence — Part 3 I 638 100
8 Letter to the Templars — Part 2 I 554 100
9 Number Sequence — Part 4 I 511 100
10 A hidden word I 496 100
11 Monoalphabetic Substitution I 440 100
12 Letter to the Templars — Part 3 II 439 1099
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 397 100
14 Factorization Cipher — Part 1 I 356 100
15 Grille Cipher I 327 100
16 Cracking SHA1-Hashed Passwords II 314 1092
17 Homophonic Encryption Part 1 I 310 100
18 Homophonic Encryption Part 2 I 265 100
19 One-Time Pad with Flaws I 237 100
20 Snow White and the seven dwarfs I 225 100
21 Alice's Birthday Party (Part 1) II 204 1090
22 Alice's Birthday Party (Part 2) II 195 1090
23 From Russia with Love I 189 100
24 How do you become a big cryptographer? I 162 100
25 Modified Caesar Cipher I 161 100
26 Broadcasting and low exponent — RSA-Attack II 158 1093
27 Reserve Hand Procedure — Part 1 I 157 100
28 Number Sequence — Part 8 I 154 100
29 Letter from the Alleged Countess Julie von Ortenburg I 145 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 141 1090
31 Classical Ciphers^3 I 139 100
32 Enigma Messages with Repeated Letters — Part 1 I 133 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 130 1090
34 M-138 — Part 1 I 127 100
35 Hybrid Encryption I II 120 1090
36 Nils away on travel I 120 100
37 Pigpen with a twist — Part 1 I 117 100
38 RSA: Two different keys — same ciphertext II 115 1093
39 The Book Code: A Challenge for Bookworms I 115 100
40 Enigma Part 1 II 111 1090
41 Factorization Cipher — Part 2 II 109 1095
42 Molehunt (Part 1/3) I 108 100
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 104 100
45 ¿No Hablas Español? No problemo! I 98 100
46 Trifid Cipher I 95 100
47 ADFGVX — Part 2 I 94 100
48 A really long number sequence II 93 1094
49 Kaskade-S/T — Part 1 I 89 100
50 ADFGVX — Part 1 I 84 100
51 Enigma Combinatorics I 83 100
52 Heartbleed — Part 1 I 82 100
53 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 80 100
54 Playfair Encryption I 79 100
55 Double Columnar Transposition I 79 100
56 M-138 — Part 2 II 76 1114
57 ECDH-Key Exchange for Beginners I 75 100
58 Playfair with hints about the grid I 75 100
59 Number Sequence — Part 6 I 73 100
60 ORYX Stream Cipher Part I II 72 1090
61 Enigma Part 2 II 70 1090
62 Zodiac Cipher I 70 100
63 Factorization Cipher — Part 3 II 69 1095
64 Image Noise I 67 100
65 A hidden word — Part 2 I 65 100
66 Advent-Challenge — Part 1 I 64 102
67 The Last Note I 63 100
68 Enigma Messages with Repeated Letters — Part 2 I 62 100
69 Hill Cipher with Sudoku Key I 62 100
70 Molehunt (Part 3/3) II 62 1090
71 Enigma Messages with Repeated Letters — Part 3 I 62 100
72 Partial Key Exposure with RSA — Part 1 II 61 1095
73 Smartcard RSA II 58 1090
74 Enigma Messages with Repeated Letters — Part 5 I 58 100
75 BCR code (Book-Caesar-RSA) II 58 1098
76 Enigma Messages I 58 100
77 Number Sequence — Part 5 I 57 100
78 Multilingual Monoalphabetic Substitution I 55 100
79 Turing Bombe Enigma I I 55 100
80 Cascading Encryption — Part 1/3 I 55 100
81 Enigma Messages with Repeated Letters — Part 4 I 54 100
82 AES key — encoded in the machine readable zone of a European ePassport II 53 1095
83 Heartbleed — Part 2 I 53 100
84 Recycled One-Time Pad I 47 100
85 Unusual encryption using a diophantine equation II 46 1094
86 An Invisible Message I 46 100
87 Monoalphabetic substitution with camouflage — Part 1 I 45 100
88 Kaskade-S/T — Part 2 II 44 1092
89 Keyshanc — Part 1 II 40 1097
90 ORYX Stream Cipher Part II II 40 1090
91 Number Sequence — Part 7 I 39 100
92 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1091
93 Strange Message from Thessaloniki I 37 100
94 New Year's Greetings — Part 1 I 37 100
95 Monoalphabetic substitution with camouflage — Part 4 I 37 100
96 News from Castle Mansfeld I 36 100
97 Unconcealed RSA messages II 36 1094
98 Weakened Granit — Part 1 I 35 100
99 Music Code — Part 2 II 35 1092
100 Monoalphabetic substitution with camouflage — Part 2 II 35 1095
101 Music Code — Part 1 I 35 100
102 Ku Klux Klan X 34 var
103 Pigpen with a twist — Part 2 II 33 1094
104 CMEA 1 II 33 1091
105 Monoalphabetic substitution with camouflage — Part 3 II 33 1095
106 An 'unhearable' message I 33 100
107 Keyshanc — Part 2 II 32 1097
108 New Year's Greetings — Part 2 I 32 100
109 Double Column Transposition — Part 2 II 32 1109
110 M-138 — Part 3 II 32 1114
111 New Year's Greetings — Part 3 I 31 100
112 Double Column Transposition — Part 4 II 31 1109
113 RSA Factoring Challenge: RSA-704 II 31 0
114 New Year's Greetings — Part 4 I 30 100
115 Pigpen with a twist — Part 3 II 29 1094
116 Not-so-Secret Message from Malawi — Part II (ECC) II 29 1090
117 Heartbleed — Part 3 II 28 1111
118 Kaskade-S/T — Part 3 II 28 1092
119 Double Column Transposition — Part 3 II 28 1109
120 ORYX Stream Cipher — Part 3 (revised) II 26 1102
121 Number Sequence — Part 9 I 24 102
122 RSA Factoring Challenge: RSA-210 II 23 0
123 Advent-Challenge — Part 2 II 21 1321
124 Monoalphabetic Substitution with Camouflage — Part 5 II 21 1096
125 CMEA 2 III 21 13229
126 Double Column Transposition — Part 1 II 20 1108
127 Typex — Part 1 II 20 1101
128 Lattice Part 1 II 20 1092
129 Spanish Strip Cipher — Part 1 II 19 1108
130 RSA with Special d III 18 13220
131 Spanish Strip Cipher — Part 2 II 17 1108
132 Typex — Part 2 II 17 1101
133 Advent Challenge — Part 4 II 16 1337
134 Advent Challenge — Part 3 II 16 1341
135 Concealed Messages — Vigenère's Night Sky X 15 var
136 Purple 1 II 14 1090
137 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1139
138 New Year's Greetings — Part 5 II 12 1132
139 M-138 — Part 4 II 11 1114
140 Sigaba Part 1 II 11 1090
141 Cascading Encryption — Part 2/3 II 10 1101
142 Cascading Encryption — Part 3/3 II 10 1101
143 Weakened Handycipher — Part 1 II 10 1119
144 ORYX Stream Cipher — Part 4a II 10 1108
145 Flawed Usage of a OTP Cipher by the BND II 10 1122
146 Weakened Handycipher — Part 3 II 9 1119
147 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1092
148 Kaskade-S/T — Part 5 II 9 1092
149 RSA Factoring Challenge: RSA-220 II 9 0
150 Weakened Handycipher — Part 2 II 8 1119
151 AES ECB Wrong Encoding II 8 1321
152 Akelarre Part 1 II 7 1091
153 Double Column Transposition — Part 5 II 5 1110
154 Notes of an Italian Soldier X 4 var
155 Handycipher — Part 2 II 4 1116
156 Handycipher — Part 3 III 4 13645
157 Sigaba Part 2 III 3 13220
158 Spirale — Part 2 II 3 1122
159 Weakened Handycipher — Part 5 II 3 1138
160 Weakened Handycipher — Part 6 II 3 1138
161 Holographic Encryption — Part 1 II 3 1169
162 Weakened Handycipher — Part 4 II 3 1138
163 Handycipher — Part 6 III 3 13967
164 Spirale — Part 3 II 3 1122
165 Handycipher — Part 5 III 3 13967
166 Spirale — Part 1 II 3 1122
167 Handycipher — Part 1 II 3 1116
168 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 2 1187
169 Extended Handycipher — Part 5 III 2 13967
170 Holographic Encryption — Part 2 II 2 1169
171 Handycipher — Part 4 III 2 13967
172 Extended Handycipher — Part 4 III 2 13967
173 Double Column Transposition X 2 var
174 ORYX Stream Cipher — Part 4b III 2 13515
175 Unknown Author X 2 var
176 Extended Handycipher — Part 3 II 2 1117
177 Extended Handycipher — Part 2 II 2 1117
178 Extended Handycipher — Part 1 II 2 1117
179 Handycipher — Part 7 III 1 14226
180 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1097
181 Extended Handycipher — Part 6 III 1 13967
182 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1139
183 Handycipher — Part 8 III 1 14226
184 Substitution Cipher with Non-Prefix Codes III 1 13262
185 Weakened ElsieFour — Part 1 II 1 1224
186 Handycipher — Part 9 III 1 14226
187 Beale Ciphers X 1 var
188 Hilly — Part 1 II 1 1158
189 World Record Challenge: Break 65 Bits of AES III 0 13220
190 RSA Factoring Challenge: RSA-380 III 0 13307
191 RSA Factoring Challenge: RSA-390 III 0 13307
192 RSA Factoring Challenge: RSA-400 III 0 13307
193 RSA Factoring Challenge: RSA-410 III 0 13307
194 RSA Factoring Challenge: RSA-420 III 0 13307
195 RSA Factoring Challenge: RSA-430 III 0 13307
196 Kryptos X 0 var
197 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1139
198 D'Agapeyeff X 0 var
199 Dorabella X 0 var
200 RSA Factoring Challenge: RSA-1536 III 0 13307
201 RSA Factoring Challenge: RSA-470 III 0 13307
202 RSA Factoring Challenge: RSA-480 III 0 13307
203 Hilly — Part 2 II 0 1235
204 ElsieFour — Part 1 II 0 1224
205 Weakened Granit — Part 3 II 0 1124
206 RSA Factoring Challenge: RSA-450 III 0 13307
207 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1139
208 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1139
209 RSA Factoring Challenge: RSA-460 III 0 13307
210 RSA Factoring Challenge: RSA-440 III 0 13307
211 Spirale — Part 4 II 0 1122
212 RSA Factoring Challenge: RSA-270 III 0 13307
213 Digital Signatures: DSA with Medium Fields III 0 13276
214 RSA Factoring Challenge: RSA-260 III 0 13307
215 Kaskade-S/T — Part 4 II 0 1092
216 RSA Factoring Challenge: RSA-896 III 0 13307
217 RSA Factoring Challenge: RSA-290 III 0 13307
218 RSA Factoring Challenge: RSA-280 III 0 13307
219 Twelve-Year-Old Murder Case X 0 var
220 The third ENIGMA M4 message X 0 var
221 Double Column Transposition Reloaded — Part 1 III 0 13475
222 Double Column Transposition Reloaded — Part 3 III 0 13475
223 RSA Factoring Challenge: RSA-250 III 0 13307
224 RSA Factoring Challenge: RSA-232 III 0 13307
225 Spanish Strip Cipher — Part 3 X 0 var
226 RSA Factoring Challenge: RSA-617 III 0 13307
227 RSA Factoring Challenge: RSA-230 II 0 1095
228 ORYX Stream Cipher — Part 4c III 0 13515
229 Double Column Transposition Reloaded — Part 2 III 0 13475
230 RSA Factoring Challenge: RSA-490 III 0 13307
231 RSA Factoring Challenge: RSA-300 III 0 13307
232 RSA Factoring Challenge: RSA-330 III 0 13307
233 RSA Factoring Challenge: RSA-500 III 0 13307
234 Double-Column Transposition/Granit — Part 3 II 0 1120
235 RSA Factoring Challenge: RSA-340 III 0 13307
236 RSA Factoring Challenge: RSA-350 III 0 13307
237 RSA Factoring Challenge: RSA-370 III 0 13307
238 RSA Factoring Challenge: RSA-360 III 0 13307
239 RSA Factoring Challenge: RSA-240 III 0 13307
240 Double-Column Transposition/Granit — Part 2 II 0 1120
241 Double-Column Transposition/Granit — Part 1 II 0 1120
242 RSA Factoring Challenge: RSA-2048 III 0 13307
243 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13235
244 RSA Factoring Challenge: RSA-309 III 0 13307
245 ORYX Stream Cipher — Part 4d III 0 13426
246 RSA Factoring Challenge: RSA-1024 III 0 13307
247 RSA Factoring Challenge: RSA-320 III 0 13307
248 RSA Factoring Challenge: RSA-310 III 0 13307
249 Weakened Granit — Part 2 II 0 1124
 
 
powered by the CrypTool project  CrypTool

 

   +++    [16:00 - 19.01.2018] Quantum solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [02:26 - 19.01.2018] nicosPavlov solved the Level II challenge 'Weakened Handycipher — Part 1'    +++    [22:21 - 18.01.2018] dognaldo solved the Level I challenge 'Number Sequence'    +++    [11:20 - 18.01.2018] drandika solved the Level I challenge 'Original Caesar Cipher'    +++    [11:17 - 18.01.2018] drandika solved the Level I challenge 'Playfair Encryption'    +++