MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8268
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3001 100
2 Original Caesar Cipher I 1963 100
3 Number Sequence — Part 2 I 1379 100
4 Caesar Encryption I 1002 100
5 Beaver Code I 759 100
6 Letter to the Templars — Part 1 I 678 100
7 Number Sequence — Part 3 I 622 100
8 Letter to the Templars — Part 2 I 544 100
9 Number Sequence — Part 4 I 500 100
10 A hidden word I 488 100
11 Monoalphabetic Substitution I 436 100
12 Letter to the Templars — Part 3 II 424 1100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 391 100
14 Factorization Cipher — Part 1 I 350 100
15 Grille Cipher I 323 100
16 Homophonic Encryption Part 1 I 308 100
17 Cracking SHA1-Hashed Passwords II 299 1093
18 Homophonic Encryption Part 2 I 264 100
19 One-Time Pad with Flaws I 236 100
20 Snow White and the seven dwarfs I 224 100
21 Alice's Birthday Party (Part 1) II 202 1091
22 Alice's Birthday Party (Part 2) II 194 1091
23 From Russia with Love I 183 100
24 Modified Caesar Cipher I 160 100
25 How do you become a big cryptographer? I 159 100
26 Reserve Hand Procedure — Part 1 I 155 100
27 Broadcasting and low exponent — RSA-Attack II 154 1094
28 Number Sequence — Part 8 I 150 100
29 Letter from the Alleged Countess Julie von Ortenburg I 144 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 140 1091
31 Classical Ciphers^3 I 138 100
32 Enigma Messages with Repeated Letters — Part 1 I 132 100
33 M-138 — Part 1 I 124 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 122 1091
35 Hybrid Encryption I II 119 1092
36 Nils away on travel I 118 100
37 Pigpen with a twist — Part 1 I 116 100
38 RSA: Two different keys — same ciphertext II 115 1095
39 The Book Code: A Challenge for Bookworms I 114 100
40 Enigma Part 1 II 110 1091
41 Factorization Cipher — Part 2 II 107 1096
42 Molehunt (Part 1/3) I 107 100
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 103 100
45 ¿No Hablas Español? No problemo! I 97 100
46 Trifid Cipher I 94 100
47 A really long number sequence II 92 1095
48 ADFGVX — Part 2 I 91 100
49 Kaskade-S/T — Part 1 I 89 100
50 Heartbleed — Part 1 I 82 100
51 Enigma Combinatorics I 82 100
52 ADFGVX — Part 1 I 81 100
53 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 79 100
54 Playfair Encryption I 78 100
55 Double Columnar Transposition I 78 100
56 Playfair with hints about the grid I 75 100
57 ECDH-Key Exchange for Beginners I 74 100
58 M-138 — Part 2 II 74 1118
59 ORYX Stream Cipher Part I II 72 1091
60 Number Sequence — Part 6 I 71 100
61 Zodiac Cipher I 70 100
62 Enigma Part 2 II 70 1091
63 Factorization Cipher — Part 3 II 69 1096
64 Image Noise I 65 100
65 The Last Note I 63 100
66 A hidden word — Part 2 I 63 100
67 Enigma Messages with Repeated Letters — Part 2 I 62 100
68 Molehunt (Part 3/3) II 62 1092
69 Hill Cipher with Sudoku Key I 61 100
70 Enigma Messages with Repeated Letters — Part 3 I 61 100
71 Partial Key Exposure with RSA — Part 1 II 60 1097
72 Smartcard RSA II 58 1092
73 Enigma Messages with Repeated Letters — Part 5 I 57 100
74 Number Sequence — Part 5 I 56 100
75 Enigma Messages I 56 100
76 BCR code (Book-Caesar-RSA) II 56 1100
77 Turing Bombe Enigma I I 55 100
78 Cascading Encryption — Part 1/3 I 54 100
79 Multilingual Monoalphabetic Substitution I 54 100
80 Enigma Messages with Repeated Letters — Part 4 I 53 100
81 Heartbleed — Part 2 I 53 100
82 AES key — encoded in the machine readable zone of a European ePassport II 47 1097
83 Unusual encryption using a diophantine equation II 46 1095
84 Recycled One-Time Pad I 46 100
85 An Invisible Message I 45 100
86 Kaskade-S/T — Part 2 II 44 1093
87 Monoalphabetic substitution with camouflage — Part 1 I 44 100
88 ORYX Stream Cipher Part II II 40 1091
89 Keyshanc — Part 1 II 39 1098
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1092
91 Number Sequence — Part 7 I 38 100
92 Monoalphabetic substitution with camouflage — Part 4 I 37 100
93 Strange Message from Thessaloniki I 37 100
94 News from Castle Mansfeld I 36 100
95 Unconcealed RSA messages II 36 1096
96 Music Code — Part 2 II 35 1094
97 Monoalphabetic substitution with camouflage — Part 2 II 35 1096
98 Music Code — Part 1 I 35 100
99 Weakened Granit — Part 1 I 34 100
100 Ku Klux Klan X 34 var
101 An 'unhearable' message I 33 100
102 Monoalphabetic substitution with camouflage — Part 3 II 33 1096
103 CMEA 1 II 33 1092
104 Pigpen with a twist — Part 2 II 33 1095
105 Double Column Transposition — Part 2 II 32 1111
106 Double Column Transposition — Part 4 II 31 1112
107 M-138 — Part 3 II 31 1118
108 RSA Factoring Challenge: RSA-704 II 31 0
109 Keyshanc — Part 2 II 31 1098
110 New Year's Greetings — Part 1 I 31 100
111 Not-so-Secret Message from Malawi — Part II (ECC) II 29 1091
112 Pigpen with a twist — Part 3 II 29 1095
113 Heartbleed — Part 3 II 28 1114
114 Double Column Transposition — Part 3 II 28 1111
115 New Year's Greetings — Part 2 I 27 100
116 Kaskade-S/T — Part 3 II 27 1093
117 ORYX Stream Cipher — Part 3 (revised) II 26 1104
118 New Year's Greetings — Part 3 I 26 100
119 New Year's Greetings — Part 4 I 25 100
120 RSA Factoring Challenge: RSA-210 II 23 0
121 CMEA 2 III 21 13248
122 Monoalphabetic Substitution with Camouflage — Part 5 II 21 1097
123 Typex — Part 1 II 20 1103
124 Double Column Transposition — Part 1 II 20 1111
125 Spanish Strip Cipher — Part 1 II 19 1110
126 Lattice Part 1 II 18 1093
127 RSA with Special d III 17 13239
128 Spanish Strip Cipher — Part 2 II 17 1110
129 Typex — Part 2 II 17 1103
130 Concealed Messages — Vigenère's Night Sky X 15 var
131 Purple 1 II 14 1092
132 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 13 1149
133 New Year's Greetings — Part 5 II 12 1140
134 Sigaba Part 1 II 11 1091
135 M-138 — Part 4 II 11 1118
136 Flawed Usage of a OTP Cipher by the BND II 10 1127
137 ORYX Stream Cipher — Part 4a II 10 1111
138 Cascading Encryption — Part 3/3 II 10 1103
139 Cascading Encryption — Part 2/3 II 10 1103
140 Weakened Handycipher — Part 3 II 9 1123
141 Weakened Handycipher — Part 1 II 9 1123
142 Kaskade-S/T — Part 5 II 9 1094
143 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 8 1093
144 Weakened Handycipher — Part 2 II 8 1123
145 Akelarre Part 1 II 7 1092
146 RSA Factoring Challenge: RSA-220 II 7 0
147 Double Column Transposition — Part 5 II 5 1113
148 Notes of an Italian Soldier X 4 var
149 Handycipher — Part 3 III 4 13704
150 Handycipher — Part 2 II 4 1120
151 Weakened Handycipher — Part 6 II 3 1148
152 Spirale — Part 3 II 3 1127
153 Weakened Handycipher — Part 5 II 3 1148
154 Handycipher — Part 1 II 3 1120
155 Holographic Encryption — Part 1 II 3 1196
156 Spirale — Part 1 II 3 1127
157 Handycipher — Part 5 III 3 14095
158 Spirale — Part 2 II 3 1127
159 Handycipher — Part 6 III 3 14095
160 Weakened Handycipher — Part 4 II 3 1148
161 Sigaba Part 2 III 3 13239
162 Extended Handycipher — Part 1 II 2 1121
163 ORYX Stream Cipher — Part 4b III 2 13558
164 Extended Handycipher — Part 2 II 2 1121
165 Extended Handycipher — Part 5 III 2 14095
166 Extended Handycipher — Part 4 III 2 14095
167 Unknown Author X 2 var
168 Double Column Transposition X 2 var
169 Holographic Encryption — Part 2 II 2 1196
170 Extended Handycipher — Part 3 II 2 1121
171 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 2 1242
172 Handycipher — Part 4 III 2 14095
173 Handycipher — Part 8 III 1 14464
174 Substitution Cipher with Non-Prefix Codes III 1 13283
175 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1149
176 Handycipher — Part 9 III 1 14464
177 Hilly — Part 1 II 1 1177
178 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1099
179 Beale Ciphers X 1 var
180 Handycipher — Part 7 III 1 14464
181 Extended Handycipher — Part 6 III 1 14095
182 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1149
183 Double-Column Transposition/Granit — Part 3 II 0 1125
184 Double-Column Transposition/Granit — Part 2 II 0 1125
185 Double-Column Transposition/Granit — Part 1 II 0 1125
186 Spirale — Part 4 II 0 1127
187 Weakened Granit — Part 2 II 0 1129
188 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1149
189 Weakened Granit — Part 3 II 0 1129
190 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1149
191 RSA Factoring Challenge: RSA-500 III 0 13331
192 RSA Factoring Challenge: RSA-896 III 0 13331
193 RSA Factoring Challenge: RSA-280 III 0 13331
194 RSA Factoring Challenge: RSA-270 III 0 13331
195 RSA Factoring Challenge: RSA-260 III 0 13331
196 RSA Factoring Challenge: RSA-250 III 0 13331
197 RSA Factoring Challenge: RSA-290 III 0 13331
198 RSA Factoring Challenge: RSA-300 III 0 13331
199 RSA Factoring Challenge: RSA-320 III 0 13331
200 RSA Factoring Challenge: RSA-310 III 0 13331
201 RSA Factoring Challenge: RSA-1024 III 0 13331
202 RSA Factoring Challenge: RSA-309 III 0 13331
203 RSA Factoring Challenge: RSA-240 III 0 13331
204 RSA Factoring Challenge: RSA-232 III 0 13331
205 World Record Challenge: Break 65 Bits of AES III 0 13239
206 Kryptos X 0 var
207 Dorabella X 0 var
208 D'Agapeyeff X 0 var
209 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13255
210 Twelve-Year-Old Murder Case X 0 var
211 RSA Factoring Challenge: RSA-230 II 0 1097
212 The third ENIGMA M4 message X 0 var
213 Digital Signatures: DSA with Medium Fields III 0 13298
214 Kaskade-S/T — Part 4 II 0 1094
215 RSA Factoring Challenge: RSA-330 III 0 13331
216 RSA Factoring Challenge: RSA-340 III 0 13331
217 RSA Factoring Challenge: RSA-490 III 0 13331
218 RSA Factoring Challenge: RSA-617 III 0 13331
219 RSA Factoring Challenge: RSA-480 III 0 13331
220 RSA Factoring Challenge: RSA-470 III 0 13331
221 RSA Factoring Challenge: RSA-1536 III 0 13331
222 RSA Factoring Challenge: RSA-2048 III 0 13331
223 ORYX Stream Cipher — Part 4d III 0 13459
224 Spanish Strip Cipher — Part 3 X 0 var
225 Double Column Transposition Reloaded — Part 3 III 0 13513
226 Double Column Transposition Reloaded — Part 2 III 0 13513
227 Double Column Transposition Reloaded — Part 1 III 0 13513
228 RSA Factoring Challenge: RSA-460 III 0 13331
229 RSA Factoring Challenge: RSA-450 III 0 13331
230 RSA Factoring Challenge: RSA-380 III 0 13331
231 RSA Factoring Challenge: RSA-370 III 0 13331
232 RSA Factoring Challenge: RSA-360 III 0 13331
233 RSA Factoring Challenge: RSA-350 III 0 13331
234 RSA Factoring Challenge: RSA-390 III 0 13331
235 RSA Factoring Challenge: RSA-400 III 0 13331
236 RSA Factoring Challenge: RSA-440 III 0 13331
237 RSA Factoring Challenge: RSA-430 III 0 13331
238 RSA Factoring Challenge: RSA-420 III 0 13331
239 RSA Factoring Challenge: RSA-410 III 0 13331
240 ORYX Stream Cipher — Part 4c III 0 13558
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:20 - 25.09.2017] idipaolo solved the Level II challenge 'M-138 — Part 2'    +++    [22:21 - 25.09.2017] idipaolo solved the Level I challenge 'M-138 — Part 1'    +++    [19:46 - 25.09.2017] 0xDB solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [17:36 - 25.09.2017] 0xDB solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [16:47 - 25.09.2017] 0xDB solved the Level I challenge 'Number Sequence — Part 4'    +++