MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

7876
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2841 100
2 Original Caesar Cipher I 1843 100
3 Number Sequence — Part 2 I 1297 100
4 Caesar Encryption I 951 100
5 Beaver Code I 701 100
6 Letter to the Templars — Part 1 I 640 100
7 Number Sequence — Part 3 I 593 100
8 Letter to the Templars — Part 2 I 515 100
9 Number Sequence — Part 4 I 474 100
10 A hidden word I 449 100
11 Monoalphabetic Substitution I 419 100
12 Letter to the Templars — Part 3 II 399 1104
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 373 100
14 Factorization Cipher — Part 1 I 332 100
15 Grille Cipher I 307 100
16 Homophonic Encryption Part 1 I 291 100
17 Cracking SHA1-Hashed Passwords II 274 1096
18 Homophonic Encryption Part 2 I 253 100
19 One-Time Pad with Flaws I 225 100
20 Snow White and the seven dwarfs I 213 100
21 Alice's Birthday Party (Part 1) II 184 1094
22 Alice's Birthday Party (Part 2) II 176 1094
23 From Russia with Love I 171 100
24 Reserve Hand Procedure — Part 1 I 150 100
25 Modified Caesar Cipher I 149 100
26 How do you become a big cryptographer? I 147 100
27 Broadcasting and low exponent — RSA-Attack II 135 1097
28 Letter from the Alleged Countess Julie von Ortenburg I 135 100
29 Classical Ciphers^3 I 132 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 129 1094
31 Enigma Messages with Repeated Letters — Part 1 I 126 100
32 Number Sequence — Part 8 I 123 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 116 1094
34 M-138 — Part 1 I 115 100
35 Hybrid Encryption I II 109 1094
36 Pigpen with a twist — Part 1 I 109 100
37 Nils away on travel I 108 100
38 The Book Code: A Challenge for Bookworms I 107 100
39 RSA: Two different keys — same ciphertext II 106 1097
40 Factorization Cipher — Part 2 II 101 1099
41 Molehunt (Part 1/3) I 101 100
42 A Secret Message from Castle Mansfeld I 100 100
43 Enigma Part 1 II 100 1094
44 Molehunt (Part 2/3) I 98 100
45 ¿No Hablas Español? No problemo! I 89 100
46 Trifid Cipher I 88 100
47 A really long number sequence II 87 1098
48 ADFGVX — Part 2 I 83 100
49 Kaskade-S/T — Part 1 I 82 100
50 Enigma Combinatorics I 77 100
51 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 74 100
52 ADFGVX — Part 1 I 73 100
53 Double Columnar Transposition I 72 100
54 Playfair Encryption I 71 100
55 Heartbleed — Part 1 I 70 100
56 Playfair with hints about the grid I 69 100
57 ECDH-Key Exchange for Beginners I 68 100
58 M-138 — Part 2 II 66 1126
59 Enigma Part 2 II 65 1094
60 Zodiac Cipher I 64 100
61 ORYX Stream Cipher Part I II 64 1094
62 Factorization Cipher — Part 3 II 63 1099
63 Number Sequence — Part 6 I 62 100
64 Molehunt (Part 3/3) II 59 1094
65 A hidden word — Part 2 I 57 100
66 The Last Note I 57 100
67 Enigma Messages with Repeated Letters — Part 2 I 56 100
68 Enigma Messages with Repeated Letters — Part 3 I 56 100
69 Hill Cipher with Sudoku Key I 55 100
70 Smartcard RSA II 55 1094
71 Partial Key Exposure with RSA — Part 1 II 54 1100
72 Enigma Messages with Repeated Letters — Part 5 I 52 100
73 Number Sequence — Part 5 I 52 100
74 Cascading Encryption — Part 1/3 I 51 100
75 Turing Bombe Enigma I I 51 100
76 Enigma Messages I 50 100
77 BCR code (Book-Caesar-RSA) II 50 1103
78 Enigma Messages with Repeated Letters — Part 4 I 48 100
79 Multilingual Monoalphabetic Substitution I 48 100
80 Image Noise I 48 100
81 Heartbleed — Part 2 I 46 100
82 Recycled One-Time Pad I 45 100
83 AES key — encoded in the machine readable zone of a European ePassport II 44 1099
84 An Invisible Message I 43 100
85 Unusual encryption using a diophantine equation II 40 1097
86 Monoalphabetic substitution with camouflage — Part 1 I 40 100
87 Kaskade-S/T — Part 2 II 39 1095
88 ORYX Stream Cipher Part II II 37 1094
89 Keyshanc — Part 1 II 36 1101
90 Strange Message from Thessaloniki I 34 100
91 Monoalphabetic substitution with camouflage — Part 4 I 34 100
92 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 34 1095
93 News from Castle Mansfeld I 33 100
94 Music Code — Part 1 I 33 100
95 Unconcealed RSA messages II 33 1098
96 Monoalphabetic substitution with camouflage — Part 2 II 33 1099
97 Music Code — Part 2 II 33 1096
98 Number Sequence — Part 7 I 32 100
99 Ku Klux Klan X 32 var
100 Monoalphabetic substitution with camouflage — Part 3 II 31 1099
101 Pigpen with a twist — Part 2 II 31 1097
102 An 'unhearable' message I 30 100
103 New Year's Greetings — Part 1 I 30 100
104 Weakened Granit — Part 1 I 30 100
105 Double Column Transposition — Part 4 II 29 1118
106 RSA Factoring Challenge: RSA-704 II 28 0
107 Keyshanc — Part 2 II 28 1101
108 Double Column Transposition — Part 2 II 28 1117
109 M-138 — Part 3 II 27 1126
110 CMEA 1 II 26 1094
111 Not-so-Secret Message from Malawi — Part II (ECC) II 26 1094
112 New Year's Greetings — Part 2 I 26 100
113 Pigpen with a twist — Part 3 II 25 1097
114 Double Column Transposition — Part 3 II 25 1117
115 New Year's Greetings — Part 3 I 25 100
116 New Year's Greetings — Part 4 I 24 100
117 Kaskade-S/T — Part 3 II 23 1095
118 ORYX Stream Cipher — Part 3 (revised) II 23 1108
119 Heartbleed — Part 3 II 22 1121
120 RSA Factoring Challenge: RSA-210 II 21 0
121 Monoalphabetic Substitution with Camouflage — Part 5 II 19 1100
122 Typex — Part 1 II 18 1106
123 Double Column Transposition — Part 1 II 18 1116
124 Lattice Part 1 II 18 1095
125 CMEA 2 III 18 13287
126 Spanish Strip Cipher — Part 1 II 17 1116
127 Typex — Part 2 II 16 1107
128 RSA with Special d III 16 13277
129 Spanish Strip Cipher — Part 2 II 14 1116
130 Concealed Messages — Vigenère's Night Sky X 14 var
131 Purple 1 II 12 1094
132 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 11 1179
133 New Year's Greetings — Part 5 II 11 1160
134 Sigaba Part 1 II 10 1094
135 Cascading Encryption — Part 3/3 II 10 1107
136 Cascading Encryption — Part 2/3 II 10 1107
137 Flawed Usage of a OTP Cipher by the BND II 9 1140
138 Kaskade-S/T — Part 5 II 8 1096
139 ORYX Stream Cipher — Part 4a II 8 1117
140 Weakened Handycipher — Part 3 II 8 1133
141 Weakened Handycipher — Part 1 II 8 1133
142 M-138 — Part 4 II 8 1126
143 Weakened Handycipher — Part 2 II 7 1133
144 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1096
145 Akelarre Part 1 II 7 1094
146 Double Column Transposition — Part 5 II 5 1119
147 Notes of an Italian Soldier X 4 var
148 RSA Factoring Challenge: RSA-220 II 4 0
149 Handycipher — Part 2 II 3 1129
150 Handycipher — Part 3 III 3 13836
151 Handycipher — Part 1 II 2 1129
152 Handycipher — Part 6 III 2 14475
153 Handycipher — Part 5 III 2 14475
154 Spirale — Part 1 II 2 1140
155 Spirale — Part 2 II 2 1140
156 Spirale — Part 3 II 2 1140
157 Weakened Handycipher — Part 5 II 2 1177
158 Unknown Author X 2 var
159 Double Column Transposition X 2 var
160 Weakened Handycipher — Part 6 II 2 1177
161 Weakened Handycipher — Part 4 II 2 1177
162 Sigaba Part 2 III 2 13277
163 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1102
164 ORYX Stream Cipher — Part 4b III 1 13647
165 Hilly — Part 1 II 1 1324
166 Beale Ciphers X 1 var
167 Substitution Cipher with Non-Prefix Codes III 1 13325
168 Extended Handycipher — Part 5 III 1 14475
169 Extended Handycipher — Part 1 II 1 1130
170 Extended Handycipher — Part 2 II 1 1130
171 Extended Handycipher — Part 3 II 1 1130
172 Handycipher — Part 4 III 1 14475
173 Handycipher — Part 7 III 0 15936
174 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1179
175 Double-Column Transposition/Granit — Part 1 II 0 1136
176 Handycipher — Part 9 III 0 15936
177 Handycipher — Part 8 III 0 15936
178 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1179
179 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1179
180 Weakened Granit — Part 2 II 0 1142
181 Weakened Granit — Part 3 II 0 1142
182 Extended Handycipher — Part 6 III 0 14475
183 Spirale — Part 4 II 0 1140
184 Double-Column Transposition/Granit — Part 3 II 0 1136
185 Double-Column Transposition/Granit — Part 2 II 0 1136
186 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1179
187 Extended Handycipher — Part 4 III 0 14475
188 RSA Factoring Challenge: RSA-490 III 0 13379
189 RSA Factoring Challenge: RSA-896 III 0 13379
190 RSA Factoring Challenge: RSA-280 III 0 13379
191 RSA Factoring Challenge: RSA-270 III 0 13379
192 RSA Factoring Challenge: RSA-260 III 0 13379
193 RSA Factoring Challenge: RSA-250 III 0 13379
194 RSA Factoring Challenge: RSA-290 III 0 13379
195 RSA Factoring Challenge: RSA-300 III 0 13379
196 RSA Factoring Challenge: RSA-320 III 0 13379
197 RSA Factoring Challenge: RSA-310 III 0 13379
198 RSA Factoring Challenge: RSA-1024 III 0 13379
199 RSA Factoring Challenge: RSA-309 III 0 13379
200 RSA Factoring Challenge: RSA-240 III 0 13379
201 RSA Factoring Challenge: RSA-232 III 0 13379
202 World Record Challenge: Break 65 Bits of AES III 0 13277
203 Kryptos X 0 var
204 Dorabella X 0 var
205 D'Agapeyeff X 0 var
206 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13294
207 Twelve-Year-Old Murder Case X 0 var
208 RSA Factoring Challenge: RSA-230 II 0 1100
209 The third ENIGMA M4 message X 0 var
210 Digital Signatures: DSA with Medium Fields III 0 13342
211 Kaskade-S/T — Part 4 II 0 1096
212 RSA Factoring Challenge: RSA-330 III 0 13379
213 RSA Factoring Challenge: RSA-340 III 0 13379
214 RSA Factoring Challenge: RSA-500 III 0 13379
215 RSA Factoring Challenge: RSA-617 III 0 13379
216 RSA Factoring Challenge: RSA-480 III 0 13379
217 RSA Factoring Challenge: RSA-470 III 0 13379
218 RSA Factoring Challenge: RSA-1536 III 0 13379
219 RSA Factoring Challenge: RSA-2048 III 0 13379
220 ORYX Stream Cipher — Part 4d III 0 13528
221 Spanish Strip Cipher — Part 3 X 0 var
222 Double Column Transposition Reloaded — Part 3 III 0 13592
223 Double Column Transposition Reloaded — Part 2 III 0 13592
224 Double Column Transposition Reloaded — Part 1 III 0 13592
225 RSA Factoring Challenge: RSA-460 III 0 13379
226 RSA Factoring Challenge: RSA-450 III 0 13379
227 RSA Factoring Challenge: RSA-380 III 0 13379
228 RSA Factoring Challenge: RSA-370 III 0 13379
229 RSA Factoring Challenge: RSA-360 III 0 13379
230 RSA Factoring Challenge: RSA-350 III 0 13379
231 RSA Factoring Challenge: RSA-390 III 0 13379
232 RSA Factoring Challenge: RSA-400 III 0 13379
233 RSA Factoring Challenge: RSA-440 III 0 13379
234 RSA Factoring Challenge: RSA-430 III 0 13379
235 RSA Factoring Challenge: RSA-420 III 0 13379
236 RSA Factoring Challenge: RSA-410 III 0 13379
237 ORYX Stream Cipher — Part 4c III 0 13647
 
 
powered by the CrypTool project  CrypTool

 

   +++    [08:09 - 27.02.2017] rohmux solved the Level I challenge 'Original Caesar Cipher'    +++    [07:55 - 27.02.2017] rohmux solved the Level I challenge 'Number Sequence — Part 2'    +++    [22:06 - 26.02.2017] rohmux solved the Level I challenge 'Number Sequence'    +++    [18:09 - 26.02.2017] hamster147 solved the Level II challenge 'ASAC — A Strong(er) ADFGVX Cipher — Part 1'    +++    [10:08 - 26.02.2017] ion solved the Level I challenge 'Monoalphabetic Substitution'    +++