MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8855
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3225 100
2 Original Caesar Cipher I 2146 100
3 Number Sequence — Part 2 I 1511 100
4 Caesar Encryption I 1079 100
5 Beaver Code I 834 100
6 Letter to the Templars — Part 1 I 745 100
7 Number Sequence — Part 3 I 700 100
8 Letter to the Templars — Part 2 I 593 100
9 Number Sequence — Part 4 I 557 100
10 A hidden word I 546 100
11 Letter to the Templars — Part 3 II 485 1096
12 Monoalphabetic Substitution I 455 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 417 100
14 Factorization Cipher — Part 1 I 374 100
15 Grille Cipher I 346 100
16 Cracking SHA1-Hashed Passwords II 343 1090
17 Homophonic Encryption Part 1 I 321 100
18 Homophonic Encryption Part 2 I 275 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 232 100
21 Alice's Birthday Party (Part 1) II 217 1088
22 Alice's Birthday Party (Part 2) II 208 1088
23 From Russia with Love I 202 100
24 Number Sequence — Part 8 I 198 100
25 Advent-Challenge — Part 1 I 188 100
26 How do you become a big cryptographer? I 171 100
27 Broadcasting and low exponent — RSA-Attack II 169 1091
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 162 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 148 1088
32 Classical Ciphers^3 I 144 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 142 1088
34 M-138 — Part 1 I 141 100
35 Enigma Messages with Repeated Letters — Part 1 I 139 100
36 Hybrid Encryption I II 127 1089
37 Nils away on travel I 125 100
38 Pigpen with a twist — Part 1 I 123 100
39 RSA: Two different keys — same ciphertext II 121 1091
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 115 100
42 Enigma Part 1 II 112 1088
43 Factorization Cipher — Part 2 II 112 1092
44 Molehunt (Part 2/3) I 111 100
45 A Secret Message from Castle Mansfeld I 109 100
46 ¿No Hablas Español? No problemo! I 107 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 97 1091
49 ADFGVX — Part 2 I 95 100
50 Kaskade-S/T — Part 1 I 90 100
51 Enigma Combinatorics I 87 100
52 ADFGVX — Part 1 I 87 100
53 Playfair Encryption I 85 100
54 Heartbleed — Part 1 I 85 100
55 M-138 — Part 2 II 84 1109
56 Double Columnar Transposition I 83 100
57 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
58 Number Sequence — Part 6 I 82 100
59 Image Noise I 81 100
60 Playfair with hints about the grid I 80 100
61 ECDH-Key Exchange for Beginners I 77 100
62 The Last Note I 73 100
63 ORYX Stream Cipher Part I II 73 1088
64 Zodiac Cipher I 71 100
65 A hidden word — Part 2 I 70 100
66 Factorization Cipher — Part 3 II 70 1093
67 Enigma Part 2 II 70 1088
68 Partial Key Exposure with RSA — Part 1 II 64 1093
69 Hill Cipher with Sudoku Key I 63 100
70 Enigma Messages with Repeated Letters — Part 3 I 63 100
71 Molehunt (Part 3/3) II 63 1089
72 Enigma Messages with Repeated Letters — Part 2 I 62 100
73 Number Sequence — Part 5 I 61 100
74 BCR code (Book-Caesar-RSA) II 60 1095
75 Smartcard RSA II 59 1089
76 Enigma Messages I 59 100
77 Multilingual Monoalphabetic Substitution I 58 100
78 Enigma Messages with Repeated Letters — Part 5 I 58 100
79 Cascading Encryption — Part 1/3 I 58 100
80 Heartbleed — Part 2 I 56 100
81 Turing Bombe Enigma I I 55 100
82 Enigma Messages with Repeated Letters — Part 4 I 54 100
83 AES key — encoded in the machine readable zone of a European ePassport II 53 1093
84 Recycled One-Time Pad I 50 100
85 An Invisible Message I 48 100
86 Unusual encryption using a diophantine equation II 48 1091
87 Monoalphabetic substitution with camouflage — Part 1 I 47 100
88 Kaskade-S/T — Part 2 II 44 1090
89 Number Sequence — Part 9 I 43 100
90 Number Sequence — Part 7 I 42 100
91 ORYX Stream Cipher Part II II 40 1088
92 Keyshanc — Part 1 II 40 1094
93 New Year's Greetings — Part 1 I 39 100
94 News from Castle Mansfeld I 38 100
95 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
96 Strange Message from Thessaloniki I 38 100
97 Number Sequence — Part 10 I 38 101
98 Monoalphabetic substitution with camouflage — Part 2 II 37 1092
99 Unconcealed RSA messages II 37 1092
100 Monoalphabetic substitution with camouflage — Part 4 I 37 100
101 Music Code — Part 1 I 36 100
102 Music Code — Part 2 II 36 1090
103 M-138 — Part 3 II 35 1109
104 New Year's Greetings — Part 2 I 35 100
105 Monoalphabetic substitution with camouflage — Part 3 II 35 1092
106 Weakened Granit — Part 1 I 35 100
107 Pigpen with a twist — Part 2 II 34 1091
108 An 'unhearable' message I 34 100
109 New Year's Greetings — Part 3 I 34 100
110 Ku Klux Klan X 34 var
111 RSA Factoring Challenge: RSA-704 II 33 0
112 Double Column Transposition — Part 2 II 33 1104
113 Double Column Transposition — Part 4 II 33 1105
114 CMEA 1 II 33 1089
115 The Einstein Enigma II 33 1189
116 New Year's Greetings — Part 4 I 33 100
117 Keyshanc — Part 2 II 32 1094
118 Pigpen with a twist — Part 3 II 31 1091
119 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
120 Double Column Transposition — Part 3 II 29 1104
121 Heartbleed — Part 3 II 28 1107
122 Kaskade-S/T — Part 3 II 28 1090
123 ORYX Stream Cipher — Part 3 (revised) II 26 1099
124 Advent-Challenge — Part 2 II 26 1176
125 RSA Factoring Challenge: RSA-210 II 25 0
126 Advent Challenge — Part 4 II 23 1177
127 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1093
128 Lattice Part 1 II 22 1090
129 Summer Job II 21 1258
130 CMEA 2 III 21 13195
131 Double Column Transposition — Part 1 II 20 1104
132 Advent Challenge — Part 3 II 20 1177
133 Typex — Part 1 II 20 1098
134 Spanish Strip Cipher — Part 1 II 19 1104
135 RSA with Special d III 19 13188
136 Trendy Messenger II 18 1258
137 Fastest in the West II 17 1258
138 Typex — Part 2 II 17 1098
139 Spanish Strip Cipher — Part 2 II 17 1104
140 Concealed Messages — Vigenère's Night Sky X 16 var
141 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1127
142 Purple 1 II 14 1089
143 M-138 — Part 4 II 13 1109
144 AES ECB Wrong Encoding II 13 1176
145 Flawed Usage of a OTP Cipher by the BND II 12 1115
146 New Year's Greetings — Part 5 II 12 1122
147 RSA Factoring Challenge: RSA-220 II 11 0
148 Sigaba Part 1 II 11 1088
149 ORYX Stream Cipher — Part 4a II 10 1104
150 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 10 1090
151 Cascading Encryption — Part 3/3 II 10 1098
152 Weakened Handycipher — Part 3 II 10 1112
153 Cascading Encryption — Part 2/3 II 10 1098
154 Weakened Handycipher — Part 1 II 10 1112
155 Kaskade-S/T — Part 5 II 9 1090
156 Weakened Handycipher — Part 2 II 9 1112
157 Akelarre Part 1 II 7 1089
158 Hilly — Part 1 II 5 1138
159 Double Column Transposition — Part 5 II 5 1105
160 Handycipher — Part 3 III 5 13555
161 Handycipher — Part 2 II 5 1111
162 Handycipher — Part 6 III 4 13796
163 Handycipher — Part 5 III 4 13796
164 Handycipher — Part 1 II 4 1111
165 Weakened Handycipher — Part 4 II 4 1127
166 Notes of an Italian Soldier X 4 var
167 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1152
168 Weakened Handycipher — Part 6 II 4 1127
169 Weakened Handycipher — Part 5 II 4 1127
170 The Vatikan Challenge — Part 2 X 3 var
171 Sigaba Part 2 III 3 13188
172 The Vatican Challenge — Part 1 X 3 var
173 Spirale — Part 1 II 3 1115
174 Holographic Encryption — Part 1 II 3 1144
175 Handycipher — Part 4 III 3 13796
176 Spirale — Part 2 II 3 1115
177 Spirale — Part 3 II 3 1115
178 Weakened ElsieFour — Part 3 II 2 1163
179 ORYX Stream Cipher — Part 4b III 2 13448
180 Double Column Transposition X 2 var
181 Extended Handycipher — Part 1 II 2 1111
182 Extended Handycipher — Part 3 II 2 1111
183 Extended Handycipher — Part 2 II 2 1111
184 Holographic Encryption — Part 2 II 2 1144
185 Handycipher — Part 8 III 2 13961
186 Handycipher — Part 9 III 2 13961
187 Extended Handycipher — Part 4 III 2 13796
188 Unknown Author X 2 var
189 Extended Handycipher — Part 5 III 2 13796
190 Handycipher — Part 7 III 1 13961
191 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1095
192 ElsieFour — Part 1 III 1 14298
193 Substitution Cipher with Non-Prefix Codes III 1 13225
194 Beale Ciphers X 1 var
195 Extended Handycipher — Part 6 III 1 13796
196 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1127
197 Weakened ElsieFour — Part 1 II 1 1221
198 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1127
199 Double Column Transposition Reloaded — Part 2 III 0 13413
200 Double Column Transposition Reloaded — Part 3 III 0 13413
201 Double Column Transposition Reloaded — Part 1 III 0 13413
202 RSA Factoring Challenge: RSA-617 III 0 13266
203 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1127
204 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1127
205 Hilly — Part 2 II 0 1165
206 RSA Factoring Challenge: RSA-490 III 0 13266
207 RSA Factoring Challenge: RSA-480 III 0 13266
208 RSA Factoring Challenge: RSA-240 III 0 13266
209 Weakened ElsieFour — Part 2 II 0 1221
210 RSA Factoring Challenge: RSA-230 II 0 1093
211 RSA Factoring Challenge: RSA-232 III 0 13266
212 RSA Factoring Challenge: RSA-250 III 0 13266
213 RSA Factoring Challenge: RSA-260 III 0 13266
214 Twelve-Year-Old Murder Case X 0 var
215 ORYX Stream Cipher — Part 4d III 0 13371
216 RSA Factoring Challenge: RSA-280 III 0 13266
217 RSA Factoring Challenge: RSA-896 III 0 13266
218 RSA Factoring Challenge: RSA-270 III 0 13266
219 Kryptos X 0 var
220 Kaskade-S/T — Part 4 II 0 1090
221 RSA Factoring Challenge: RSA-290 III 0 13266
222 RSA Factoring Challenge: RSA-440 III 0 13266
223 RSA Factoring Challenge: RSA-2048 III 0 13266
224 ORYX Stream Cipher — Part 4c III 0 13448
225 RSA Factoring Challenge: RSA-350 III 0 13266
226 RSA Factoring Challenge: RSA-340 III 0 13266
227 World Record Challenge: Break 65 Bits of AES III 0 13188
228 The third ENIGMA M4 message X 0 var
229 Spanish Strip Cipher — Part 3 X 0 var
230 RSA Factoring Challenge: RSA-360 III 0 13266
231 RSA Factoring Challenge: RSA-370 III 0 13266
232 RSA Factoring Challenge: RSA-400 III 0 13266
233 RSA Factoring Challenge: RSA-430 III 0 13266
234 RSA Factoring Challenge: RSA-410 III 0 13266
235 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13201
236 RSA Factoring Challenge: RSA-390 III 0 13266
237 Dorabella X 0 var
238 RSA Factoring Challenge: RSA-380 III 0 13266
239 Double-Column Transposition/Granit — Part 1 II 0 1114
240 Double-Column Transposition/Granit — Part 2 II 0 1114
241 Digital Signatures: DSA with Medium Fields III 0 13238
242 RSA Factoring Challenge: RSA-310 III 0 13266
243 Weakened Granit — Part 3 II 0 1116
244 RSA Factoring Challenge: RSA-1024 III 0 13266
245 RSA Factoring Challenge: RSA-309 III 0 13266
246 RSA Factoring Challenge: RSA-1536 III 0 13266
247 RSA Factoring Challenge: RSA-420 III 0 13266
248 RSA Factoring Challenge: RSA-300 III 0 13266
249 Weakened Granit — Part 2 II 0 1116
250 RSA Factoring Challenge: RSA-320 III 0 13266
251 RSA Factoring Challenge: RSA-450 III 0 13266
252 D'Agapeyeff X 0 var
253 Double-Column Transposition/Granit — Part 3 II 0 1114
254 RSA Factoring Challenge: RSA-460 III 0 13266
255 RSA Factoring Challenge: RSA-500 III 0 13266
256 RSA Factoring Challenge: RSA-330 III 0 13266
257 Spirale — Part 4 III 0 13627
258 RSA Factoring Challenge: RSA-470 III 0 13266
 
 
powered by the CrypTool project  CrypTool

 

   +++    [02:31 - 20.08.2018] rnd solved the Level II challenge 'RSA: Two different keys — same ciphertext'    +++    [02:08 - 20.08.2018] Mateus de Freitas solved the Level I challenge 'A hidden word'    +++    [01:47 - 20.08.2018] Mateus de Freitas solved the Level I challenge 'Original Caesar Cipher'    +++    [01:39 - 20.08.2018] Mateus de Freitas solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [00:43 - 20.08.2018] FoM solved the Level I challenge 'Zodiac Cipher'    +++