MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8821
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3211 100
2 Original Caesar Cipher I 2135 100
3 Number Sequence — Part 2 I 1500 100
4 Caesar Encryption I 1074 100
5 Beaver Code I 830 100
6 Letter to the Templars — Part 1 I 742 100
7 Number Sequence — Part 3 I 694 100
8 Letter to the Templars — Part 2 I 591 100
9 Number Sequence — Part 4 I 553 100
10 A hidden word I 543 100
11 Letter to the Templars — Part 3 II 481 1096
12 Monoalphabetic Substitution I 455 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 415 100
14 Factorization Cipher — Part 1 I 373 100
15 Grille Cipher I 346 100
16 Cracking SHA1-Hashed Passwords II 339 1090
17 Homophonic Encryption Part 1 I 320 100
18 Homophonic Encryption Part 2 I 274 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 231 100
21 Alice's Birthday Party (Part 1) II 216 1089
22 Alice's Birthday Party (Part 2) II 207 1089
23 From Russia with Love I 202 100
24 Number Sequence — Part 8 I 194 100
25 Advent-Challenge — Part 1 I 174 100
26 How do you become a big cryptographer? I 170 100
27 Modified Caesar Cipher I 168 100
28 Broadcasting and low exponent — RSA-Attack II 168 1091
29 Reserve Hand Procedure — Part 1 I 162 100
30 Letter from the Alleged Countess Julie von Ortenburg I 150 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 147 1089
32 Classical Ciphers^3 I 143 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 141 1089
34 M-138 — Part 1 I 141 100
35 Enigma Messages with Repeated Letters — Part 1 I 138 100
36 Hybrid Encryption I II 125 1089
37 Nils away on travel I 124 100
38 Pigpen with a twist — Part 1 I 122 100
39 RSA: Two different keys — same ciphertext II 120 1091
40 The Book Code: A Challenge for Bookworms I 119 100
41 Molehunt (Part 1/3) I 113 100
42 Factorization Cipher — Part 2 II 111 1093
43 Enigma Part 1 II 111 1089
44 Molehunt (Part 2/3) I 109 100
45 A Secret Message from Castle Mansfeld I 107 100
46 ¿No Hablas Español? No problemo! I 106 100
47 Trifid Cipher I 100 100
48 A really long number sequence II 96 1092
49 ADFGVX — Part 2 I 95 100
50 Kaskade-S/T — Part 1 I 90 100
51 ADFGVX — Part 1 I 87 100
52 Enigma Combinatorics I 85 100
53 Playfair Encryption I 84 100
54 Heartbleed — Part 1 I 84 100
55 Double Columnar Transposition I 83 100
56 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
57 M-138 — Part 2 II 83 1110
58 Number Sequence — Part 6 I 81 100
59 Playfair with hints about the grid I 79 100
60 Image Noise I 78 100
61 ECDH-Key Exchange for Beginners I 77 100
62 ORYX Stream Cipher Part I II 72 1089
63 The Last Note I 72 100
64 Enigma Part 2 II 70 1089
65 Factorization Cipher — Part 3 II 70 1093
66 Zodiac Cipher I 70 100
67 A hidden word — Part 2 I 69 100
68 Hill Cipher with Sudoku Key I 63 100
69 Enigma Messages with Repeated Letters — Part 3 I 63 100
70 Molehunt (Part 3/3) II 63 1089
71 Partial Key Exposure with RSA — Part 1 II 63 1093
72 Enigma Messages with Repeated Letters — Part 2 I 62 100
73 BCR code (Book-Caesar-RSA) II 60 1096
74 Smartcard RSA II 59 1089
75 Enigma Messages I 59 100
76 Number Sequence — Part 5 I 59 100
77 Multilingual Monoalphabetic Substitution I 58 100
78 Enigma Messages with Repeated Letters — Part 5 I 58 100
79 Cascading Encryption — Part 1/3 I 57 100
80 Turing Bombe Enigma I I 55 100
81 Heartbleed — Part 2 I 54 100
82 Enigma Messages with Repeated Letters — Part 4 I 54 100
83 AES key — encoded in the machine readable zone of a European ePassport II 53 1093
84 Recycled One-Time Pad I 49 100
85 An Invisible Message I 48 100
86 Unusual encryption using a diophantine equation II 48 1092
87 Monoalphabetic substitution with camouflage — Part 1 I 47 100
88 Kaskade-S/T — Part 2 II 44 1090
89 Number Sequence — Part 7 I 42 100
90 Number Sequence — Part 9 I 41 100
91 Keyshanc — Part 1 II 40 1094
92 ORYX Stream Cipher Part II II 40 1089
93 New Year's Greetings — Part 1 I 39 100
94 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
95 Strange Message from Thessaloniki I 38 100
96 Unconcealed RSA messages II 37 1092
97 News from Castle Mansfeld I 37 100
98 Monoalphabetic substitution with camouflage — Part 2 II 37 1093
99 Monoalphabetic substitution with camouflage — Part 4 I 37 100
100 Music Code — Part 1 I 36 100
101 Music Code — Part 2 II 36 1091
102 M-138 — Part 3 II 35 1110
103 Monoalphabetic substitution with camouflage — Part 3 II 35 1093
104 New Year's Greetings — Part 2 I 35 100
105 Weakened Granit — Part 1 I 35 100
106 Pigpen with a twist — Part 2 II 34 1092
107 An 'unhearable' message I 34 100
108 Ku Klux Klan X 34 var
109 New Year's Greetings — Part 3 I 34 100
110 RSA Factoring Challenge: RSA-704 II 33 0
111 CMEA 1 II 33 1089
112 Double Column Transposition — Part 2 II 33 1105
113 New Year's Greetings — Part 4 I 33 100
114 Double Column Transposition — Part 4 II 33 1105
115 Keyshanc — Part 2 II 32 1094
116 Pigpen with a twist — Part 3 II 31 1092
117 Number Sequence — Part 10 I 31 101
118 The Einstein Enigma II 30 1198
119 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1089
120 Double Column Transposition — Part 3 II 29 1105
121 Kaskade-S/T — Part 3 II 28 1090
122 Heartbleed — Part 3 II 28 1107
123 ORYX Stream Cipher — Part 3 (revised) II 26 1099
124 RSA Factoring Challenge: RSA-210 II 25 0
125 Advent-Challenge — Part 2 II 25 1183
126 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1094
127 Lattice Part 1 II 22 1090
128 CMEA 2 III 21 13200
129 Advent Challenge — Part 4 II 21 1184
130 Typex — Part 1 II 20 1098
131 Advent Challenge — Part 3 II 20 1184
132 Double Column Transposition — Part 1 II 20 1104
133 Spanish Strip Cipher — Part 1 II 19 1104
134 RSA with Special d III 19 13192
135 Summer Job II 17 1305
136 Typex — Part 2 II 17 1098
137 Spanish Strip Cipher — Part 2 II 17 1104
138 Concealed Messages — Vigenère's Night Sky X 16 var
139 Fastest in the West II 16 1305
140 Trendy Messenger II 16 1305
141 Purple 1 II 14 1089
142 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1128
143 M-138 — Part 4 II 13 1110
144 New Year's Greetings — Part 5 II 12 1124
145 Flawed Usage of a OTP Cipher by the BND II 12 1116
146 AES ECB Wrong Encoding II 12 1183
147 RSA Factoring Challenge: RSA-220 II 11 0
148 Sigaba Part 1 II 11 1089
149 ORYX Stream Cipher — Part 4a II 10 1104
150 Weakened Handycipher — Part 3 II 10 1113
151 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 10 1090
152 Weakened Handycipher — Part 1 II 10 1113
153 Cascading Encryption — Part 3/3 II 10 1098
154 Cascading Encryption — Part 2/3 II 10 1098
155 Weakened Handycipher — Part 2 II 9 1113
156 Kaskade-S/T — Part 5 II 9 1090
157 Akelarre Part 1 II 7 1089
158 Double Column Transposition — Part 5 II 5 1106
159 Handycipher — Part 3 III 5 13566
160 Handycipher — Part 2 II 5 1111
161 Handycipher — Part 1 II 4 1111
162 Handycipher — Part 5 III 4 13816
163 Handycipher — Part 6 III 4 13816
164 Weakened Handycipher — Part 5 II 4 1128
165 Weakened Handycipher — Part 6 II 4 1128
166 Weakened Handycipher — Part 4 II 4 1128
167 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1155
168 Notes of an Italian Soldier X 4 var
169 Hilly — Part 1 II 4 1140
170 Holographic Encryption — Part 1 II 3 1146
171 The Vatikan Challenge — Part 2 X 3 var
172 Spirale — Part 2 II 3 1116
173 Handycipher — Part 4 III 3 13816
174 Sigaba Part 2 III 3 13192
175 Spirale — Part 3 II 3 1116
176 Spirale — Part 1 II 3 1116
177 Weakened ElsieFour — Part 3 II 2 1168
178 The Vatican Challenge — Part 1 X 2 var
179 Handycipher — Part 8 III 2 13989
180 Extended Handycipher — Part 3 II 2 1112
181 ORYX Stream Cipher — Part 4b III 2 13457
182 Double Column Transposition X 2 var
183 Extended Handycipher — Part 5 III 2 13816
184 Extended Handycipher — Part 1 II 2 1112
185 Handycipher — Part 9 III 2 13989
186 Unknown Author X 2 var
187 Extended Handycipher — Part 4 III 2 13816
188 Holographic Encryption — Part 2 II 2 1146
189 Extended Handycipher — Part 2 II 2 1112
190 ElsieFour — Part 1 III 1 14359
191 Handycipher — Part 7 III 1 13989
192 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1128
193 Beale Ciphers X 1 var
194 Extended Handycipher — Part 6 III 1 13816
195 Weakened ElsieFour — Part 1 II 1 1242
196 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1095
197 Substitution Cipher with Non-Prefix Codes III 1 13230
198 Double Column Transposition Reloaded — Part 1 III 0 13421
199 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1128
200 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1128
201 Kaskade-S/T — Part 4 II 0 1090
202 RSA Factoring Challenge: RSA-470 III 0 13271
203 RSA Factoring Challenge: RSA-1536 III 0 13271
204 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1128
205 World Record Challenge: Break 65 Bits of AES III 0 13192
206 Hilly — Part 2 II 0 1170
207 RSA Factoring Challenge: RSA-500 III 0 13271
208 RSA Factoring Challenge: RSA-232 III 0 13271
209 RSA Factoring Challenge: RSA-230 II 0 1093
210 Weakened ElsieFour — Part 2 II 0 1242
211 Kryptos X 0 var
212 RSA Factoring Challenge: RSA-240 III 0 13271
213 RSA Factoring Challenge: RSA-250 III 0 13271
214 RSA Factoring Challenge: RSA-490 III 0 13271
215 ORYX Stream Cipher — Part 4d III 0 13378
216 Double Column Transposition Reloaded — Part 2 III 0 13421
217 RSA Factoring Challenge: RSA-270 III 0 13271
218 RSA Factoring Challenge: RSA-260 III 0 13271
219 RSA Factoring Challenge: RSA-480 III 0 13271
220 RSA Factoring Challenge: RSA-280 III 0 13271
221 RSA Factoring Challenge: RSA-330 III 0 13271
222 Spanish Strip Cipher — Part 3 X 0 var
223 RSA Factoring Challenge: RSA-420 III 0 13271
224 RSA Factoring Challenge: RSA-320 III 0 13271
225 RSA Factoring Challenge: RSA-430 III 0 13271
226 RSA Factoring Challenge: RSA-2048 III 0 13271
227 RSA Factoring Challenge: RSA-440 III 0 13271
228 The third ENIGMA M4 message X 0 var
229 RSA Factoring Challenge: RSA-340 III 0 13271
230 RSA Factoring Challenge: RSA-350 III 0 13271
231 ORYX Stream Cipher — Part 4c III 0 13457
232 RSA Factoring Challenge: RSA-390 III 0 13271
233 RSA Factoring Challenge: RSA-400 III 0 13271
234 RSA Factoring Challenge: RSA-380 III 0 13271
235 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13206
236 Dorabella X 0 var
237 RSA Factoring Challenge: RSA-360 III 0 13271
238 RSA Factoring Challenge: RSA-370 III 0 13271
239 Double-Column Transposition/Granit — Part 1 II 0 1115
240 Double-Column Transposition/Granit — Part 2 II 0 1115
241 Digital Signatures: DSA with Medium Fields III 0 13243
242 RSA Factoring Challenge: RSA-309 III 0 13271
243 Weakened Granit — Part 3 II 0 1117
244 RSA Factoring Challenge: RSA-300 III 0 13271
245 RSA Factoring Challenge: RSA-290 III 0 13271
246 Twelve-Year-Old Murder Case X 0 var
247 RSA Factoring Challenge: RSA-896 III 0 13271
248 RSA Factoring Challenge: RSA-410 III 0 13271
249 Weakened Granit — Part 2 II 0 1117
250 RSA Factoring Challenge: RSA-1024 III 0 13271
251 RSA Factoring Challenge: RSA-617 III 0 13271
252 D'Agapeyeff X 0 var
253 Double-Column Transposition/Granit — Part 3 II 0 1115
254 RSA Factoring Challenge: RSA-450 III 0 13271
255 RSA Factoring Challenge: RSA-460 III 0 13271
256 RSA Factoring Challenge: RSA-310 III 0 13271
257 Spirale — Part 4 III 0 13640
258 Double Column Transposition Reloaded — Part 3 III 0 13421
 
 
powered by the CrypTool project  CrypTool

 

   +++    [04:01 - 23.07.2018] rnd solved the Level I challenge 'Image Noise'    +++    [21:17 - 22.07.2018] michaelm solved the Level II challenge 'Weakened ElsieFour — Part 1'    +++    [14:50 - 22.07.2018] netcom solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [23:06 - 21.07.2018] arbacle solved the Level I challenge 'Monoalphabetic Substitution'    +++    [21:48 - 21.07.2018] arbacle solved the Level II challenge 'Letter to the Templars — Part 3'    +++