MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8692
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3164 100
2 Original Caesar Cipher I 2095 100
3 Number Sequence — Part 2 I 1468 100
4 Caesar Encryption I 1057 100
5 Beaver Code I 809 100
6 Letter to the Templars — Part 1 I 727 100
7 Number Sequence — Part 3 I 667 100
8 Letter to the Templars — Part 2 I 581 100
9 Number Sequence — Part 4 I 536 100
10 A hidden word I 527 100
11 Letter to the Templars — Part 3 II 469 1097
12 Monoalphabetic Substitution I 450 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 407 100
14 Factorization Cipher — Part 1 I 369 100
15 Grille Cipher I 339 100
16 Cracking SHA1-Hashed Passwords II 332 1091
17 Homophonic Encryption Part 1 I 315 100
18 Homophonic Encryption Part 2 I 270 100
19 One-Time Pad with Flaws I 243 100
20 Snow White and the seven dwarfs I 228 100
21 Alice's Birthday Party (Part 1) II 210 1089
22 Alice's Birthday Party (Part 2) II 200 1089
23 From Russia with Love I 199 100
24 Number Sequence — Part 8 I 184 100
25 How do you become a big cryptographer? I 168 100
26 Modified Caesar Cipher I 165 100
27 Broadcasting and low exponent — RSA-Attack II 165 1092
28 Reserve Hand Procedure — Part 1 I 160 100
29 Letter from the Alleged Countess Julie von Ortenburg I 148 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 146 1089
31 Classical Ciphers^3 I 141 100
32 M-138 — Part 1 I 138 100
33 Enigma Messages with Repeated Letters — Part 1 I 135 100
34 Advent-Challenge — Part 1 I 134 101
35 Brute-Force-Attack on Triple-DES with Reduced Key Space II 132 1089
36 Nils away on travel I 122 100
37 Hybrid Encryption I II 122 1089
38 Pigpen with a twist — Part 1 I 121 100
39 RSA: Two different keys — same ciphertext II 118 1092
40 The Book Code: A Challenge for Bookworms I 118 100
41 Molehunt (Part 1/3) I 112 100
42 Enigma Part 1 II 111 1089
43 Factorization Cipher — Part 2 II 111 1093
44 Molehunt (Part 2/3) I 108 100
45 A Secret Message from Castle Mansfeld I 107 100
46 ¿No Hablas Español? No problemo! I 105 100
47 Trifid Cipher I 98 100
48 A really long number sequence II 95 1092
49 ADFGVX — Part 2 I 95 100
50 Kaskade-S/T — Part 1 I 90 100
51 ADFGVX — Part 1 I 87 100
52 Enigma Combinatorics I 84 100
53 Playfair Encryption I 84 100
54 M-138 — Part 2 II 83 1111
55 Heartbleed — Part 1 I 83 100
56 Double Columnar Transposition I 82 100
57 Number Sequence — Part 6 I 80 100
58 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 80 100
59 Playfair with hints about the grid I 79 100
60 ECDH-Key Exchange for Beginners I 75 100
61 Image Noise I 74 100
62 ORYX Stream Cipher Part I II 72 1089
63 Factorization Cipher — Part 3 II 70 1094
64 Zodiac Cipher I 70 100
65 Enigma Part 2 II 70 1089
66 The Last Note I 69 100
67 A hidden word — Part 2 I 67 100
68 Molehunt (Part 3/3) II 63 1089
69 Enigma Messages with Repeated Letters — Part 3 I 62 100
70 Hill Cipher with Sudoku Key I 62 100
71 Enigma Messages with Repeated Letters — Part 2 I 62 100
72 Partial Key Exposure with RSA — Part 1 II 62 1094
73 BCR code (Book-Caesar-RSA) II 60 1096
74 Smartcard RSA II 59 1089
75 Enigma Messages with Repeated Letters — Part 5 I 58 100
76 Enigma Messages I 58 100
77 Multilingual Monoalphabetic Substitution I 57 100
78 Number Sequence — Part 5 I 57 100
79 Cascading Encryption — Part 1/3 I 56 100
80 Turing Bombe Enigma I I 55 100
81 Enigma Messages with Repeated Letters — Part 4 I 54 100
82 AES key — encoded in the machine readable zone of a European ePassport II 53 1094
83 Heartbleed — Part 2 I 53 100
84 Recycled One-Time Pad I 48 100
85 Unusual encryption using a diophantine equation II 47 1092
86 An Invisible Message I 47 100
87 Monoalphabetic substitution with camouflage — Part 1 I 46 100
88 Kaskade-S/T — Part 2 II 44 1090
89 Number Sequence — Part 7 I 42 100
90 ORYX Stream Cipher Part II II 40 1089
91 Keyshanc — Part 1 II 40 1095
92 New Year's Greetings — Part 1 I 39 100
93 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1090
94 Monoalphabetic substitution with camouflage — Part 4 I 37 100
95 Strange Message from Thessaloniki I 37 100
96 News from Castle Mansfeld I 37 100
97 Unconcealed RSA messages II 37 1093
98 Music Code — Part 1 I 36 100
99 Monoalphabetic substitution with camouflage — Part 2 II 36 1093
100 Music Code — Part 2 II 36 1091
101 New Year's Greetings — Part 2 I 35 100
102 Weakened Granit — Part 1 I 35 100
103 Monoalphabetic substitution with camouflage — Part 3 II 34 1093
104 New Year's Greetings — Part 3 I 34 100
105 Ku Klux Klan X 34 var
106 Pigpen with a twist — Part 2 II 34 1092
107 An 'unhearable' message I 34 100
108 M-138 — Part 3 II 34 1111
109 New Year's Greetings — Part 4 I 33 100
110 CMEA 1 II 33 1090
111 Double Column Transposition — Part 4 II 33 1106
112 Double Column Transposition — Part 2 II 33 1106
113 Number Sequence — Part 9 I 32 101
114 Keyshanc — Part 2 II 32 1095
115 RSA Factoring Challenge: RSA-704 II 32 0
116 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1089
117 Pigpen with a twist — Part 3 II 30 1092
118 Double Column Transposition — Part 3 II 29 1106
119 Heartbleed — Part 3 II 28 1108
120 Kaskade-S/T — Part 3 II 28 1090
121 The Einstein Enigma II 27 1225
122 ORYX Stream Cipher — Part 3 (revised) II 26 1100
123 Advent-Challenge — Part 2 II 25 1199
124 RSA Factoring Challenge: RSA-210 II 24 0
125 Monoalphabetic Substitution with Camouflage — Part 5 II 22 1094
126 CMEA 2 III 21 13208
127 Lattice Part 1 II 21 1090
128 Number Sequence — Part 10 I 20 103
129 Typex — Part 1 II 20 1099
130 Double Column Transposition — Part 1 II 20 1105
131 Advent Challenge — Part 4 II 19 1201
132 Spanish Strip Cipher — Part 1 II 19 1105
133 RSA with Special d III 19 13200
134 Advent Challenge — Part 3 II 18 1202
135 Spanish Strip Cipher — Part 2 II 17 1105
136 Typex — Part 2 II 17 1099
137 Concealed Messages — Vigenère's Night Sky X 15 var
138 Purple 1 II 14 1089
139 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1131
140 New Year's Greetings — Part 5 II 12 1126
141 M-138 — Part 4 II 12 1111
142 Flawed Usage of a OTP Cipher by the BND II 11 1118
143 Sigaba Part 1 II 11 1089
144 ORYX Stream Cipher — Part 4a II 10 1106
145 Cascading Encryption — Part 3/3 II 10 1099
146 Weakened Handycipher — Part 1 II 10 1115
147 Weakened Handycipher — Part 3 II 10 1115
148 Cascading Encryption — Part 2/3 II 10 1099
149 RSA Factoring Challenge: RSA-220 II 10 0
150 Kaskade-S/T — Part 5 II 9 1091
151 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1091
152 Weakened Handycipher — Part 2 II 9 1115
153 AES ECB Wrong Encoding II 8 1199
154 Akelarre Part 1 II 7 1090
155 Handycipher — Part 3 III 5 13589
156 Double Column Transposition — Part 5 II 5 1107
157 Handycipher — Part 2 II 5 1113
158 Weakened Handycipher — Part 6 II 4 1131
159 Handycipher — Part 1 II 4 1113
160 Notes of an Italian Soldier X 4 var
161 Weakened Handycipher — Part 4 II 4 1131
162 Weakened Handycipher — Part 5 II 4 1131
163 Handycipher — Part 5 III 4 13857
164 Handycipher — Part 6 III 4 13857
165 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 3 1162
166 Handycipher — Part 4 III 3 13857
167 Holographic Encryption — Part 1 II 3 1152
168 Spirale — Part 1 II 3 1118
169 Spirale — Part 3 II 3 1118
170 Sigaba Part 2 III 3 13200
171 Spirale — Part 2 II 3 1118
172 Double Column Transposition X 2 var
173 Extended Handycipher — Part 3 II 2 1113
174 Extended Handycipher — Part 5 III 2 13857
175 Extended Handycipher — Part 4 III 2 13857
176 Extended Handycipher — Part 1 II 2 1113
177 Extended Handycipher — Part 2 II 2 1113
178 Handycipher — Part 9 III 2 14051
179 Holographic Encryption — Part 2 II 2 1152
180 The Vatican Challenge — Part 1 X 2 var
181 The Vatikan Challenge — Part 2 X 2 var
182 Handycipher — Part 8 III 2 14051
183 Weakened ElsieFour — Part 3 II 2 1178
184 Unknown Author X 2 var
185 ORYX Stream Cipher — Part 4b III 2 13474
186 Handycipher — Part 7 III 1 14051
187 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1096
188 Beale Ciphers X 1 var
189 Substitution Cipher with Non-Prefix Codes III 1 13239
190 Extended Handycipher — Part 6 III 1 13857
191 Hilly — Part 1 II 1 1145
192 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1131
193 RSA Factoring Challenge: RSA-250 III 0 13282
194 RSA Factoring Challenge: RSA-232 III 0 13282
195 The third ENIGMA M4 message X 0 var
196 RSA Factoring Challenge: RSA-230 II 0 1094
197 RSA Factoring Challenge: RSA-240 III 0 13282
198 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1131
199 Kaskade-S/T — Part 4 II 0 1091
200 D'Agapeyeff X 0 var
201 Twelve-Year-Old Murder Case X 0 var
202 Weakened ElsieFour — Part 1 II 0 1337
203 Weakened ElsieFour — Part 2 II 0 1337
204 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13215
205 Hilly — Part 2 II 0 1182
206 Weakened Granit — Part 3 II 0 1119
207 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1131
208 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1131
209 ElsieFour — Part 1 III 0 14494
210 Digital Signatures: DSA with Medium Fields III 0 13253
211 Double-Column Transposition/Granit — Part 2 II 0 1116
212 RSA Factoring Challenge: RSA-450 III 0 13282
213 RSA Factoring Challenge: RSA-460 III 0 13282
214 Double Column Transposition Reloaded — Part 3 III 0 13437
215 Double Column Transposition Reloaded — Part 2 III 0 13437
216 RSA Factoring Challenge: RSA-440 III 0 13282
217 RSA Factoring Challenge: RSA-430 III 0 13282
218 RSA Factoring Challenge: RSA-400 III 0 13282
219 RSA Factoring Challenge: RSA-410 III 0 13282
220 Spanish Strip Cipher — Part 3 X 0 var
221 RSA Factoring Challenge: RSA-420 III 0 13282
222 Double Column Transposition Reloaded — Part 1 III 0 13437
223 RSA Factoring Challenge: RSA-1536 III 0 13282
224 ORYX Stream Cipher — Part 4d III 0 13392
225 RSA Factoring Challenge: RSA-617 III 0 13282
226 RSA Factoring Challenge: RSA-2048 III 0 13282
227 World Record Challenge: Break 65 Bits of AES III 0 13200
228 RSA Factoring Challenge: RSA-500 III 0 13282
229 RSA Factoring Challenge: RSA-490 III 0 13282
230 RSA Factoring Challenge: RSA-470 III 0 13282
231 Kryptos X 0 var
232 RSA Factoring Challenge: RSA-480 III 0 13282
233 ORYX Stream Cipher — Part 4c III 0 13474
234 RSA Factoring Challenge: RSA-390 III 0 13282
235 Double-Column Transposition/Granit — Part 1 II 0 1116
236 RSA Factoring Challenge: RSA-896 III 0 13282
237 RSA Factoring Challenge: RSA-280 III 0 13282
238 RSA Factoring Challenge: RSA-290 III 0 13282
239 Double-Column Transposition/Granit — Part 3 II 0 1116
240 RSA Factoring Challenge: RSA-270 III 0 13282
241 RSA Factoring Challenge: RSA-260 III 0 13282
242 Dorabella X 0 var
243 Spirale — Part 4 II 0 1118
244 RSA Factoring Challenge: RSA-300 III 0 13282
245 RSA Factoring Challenge: RSA-309 III 0 13282
246 RSA Factoring Challenge: RSA-350 III 0 13282
247 RSA Factoring Challenge: RSA-360 III 0 13282
248 RSA Factoring Challenge: RSA-370 III 0 13282
249 RSA Factoring Challenge: RSA-380 III 0 13282
250 RSA Factoring Challenge: RSA-340 III 0 13282
251 RSA Factoring Challenge: RSA-330 III 0 13282
252 RSA Factoring Challenge: RSA-1024 III 0 13282
253 RSA Factoring Challenge: RSA-310 III 0 13282
254 RSA Factoring Challenge: RSA-320 III 0 13282
255 Weakened Granit — Part 2 II 0 1119
 
 
powered by the CrypTool project  CrypTool

 

   +++    [21:08 - 27.05.2018] psychohasii solved the Level I challenge 'A hidden word'    +++    [17:04 - 27.05.2018] Theofanidis solved the Level I challenge 'Number Sequence — Part 10'    +++    [23:27 - 26.05.2018] 200611736 solved the Level I challenge 'Homophonic Encryption Part 2'    +++    [23:16 - 26.05.2018] 200611736 solved the Level I challenge 'Homophonic Encryption Part 1'    +++    [22:53 - 26.05.2018] 200611736 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++