MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9105
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3320 100
2 Original Caesar Cipher I 2225 100
3 Number Sequence — Part 2 I 1560 100
4 Caesar Encryption I 1111 100
5 Beaver Code I 866 100
6 Letter to the Templars — Part 1 I 767 100
7 Number Sequence — Part 3 I 724 100
8 Letter to the Templars — Part 2 I 611 100
9 Number Sequence — Part 4 I 581 100
10 A hidden word I 564 100
11 Letter to the Templars — Part 3 II 498 1095
12 Monoalphabetic Substitution I 457 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 429 100
14 Factorization Cipher — Part 1 I 384 100
15 Grille Cipher I 356 100
16 Cracking SHA1-Hashed Passwords II 353 1089
17 Homophonic Encryption Part 1 I 325 100
18 Homophonic Encryption Part 2 I 279 100
19 One-Time Pad with Flaws I 248 100
20 Snow White and the seven dwarfs I 236 100
21 Alice's Birthday Party (Part 1) II 220 1088
22 Advent-Challenge — Part 1 I 215 100
23 Alice's Birthday Party (Part 2) II 211 1088
24 From Russia with Love I 208 100
25 Number Sequence — Part 8 I 205 100
26 How do you become a big cryptographer? I 173 100
27 Broadcasting and low exponent — RSA-Attack II 170 1090
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 163 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 149 1088
32 M-138 — Part 1 I 144 100
33 Classical Ciphers^3 I 144 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 143 1088
35 Enigma Messages with Repeated Letters — Part 1 I 142 100
36 Hybrid Encryption I II 129 1088
37 Nils away on travel I 126 100
38 Pigpen with a twist — Part 1 I 124 100
39 RSA: Two different keys — same ciphertext II 123 1090
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 117 100
42 Factorization Cipher — Part 2 II 115 1091
43 Enigma Part 1 II 113 1088
44 Molehunt (Part 2/3) I 113 100
45 A Secret Message from Castle Mansfeld I 110 100
46 ¿No Hablas Español? No problemo! I 109 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 100 1091
49 ADFGVX — Part 2 I 97 100
50 Kaskade-S/T — Part 1 I 92 100
51 ADFGVX — Part 1 I 89 100
52 Enigma Combinatorics I 87 100
53 Playfair Encryption I 86 100
54 Number Sequence — Part 6 I 86 100
55 Heartbleed — Part 1 I 85 100
56 Image Noise I 85 100
57 M-138 — Part 2 II 85 1107
58 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
59 Double Columnar Transposition I 83 100
60 Playfair with hints about the grid I 82 100
61 ECDH-Key Exchange for Beginners I 78 100
62 The Last Note I 73 100
63 ORYX Stream Cipher Part I II 73 1088
64 Zodiac Cipher I 73 100
65 Factorization Cipher — Part 3 II 71 1092
66 Enigma Part 2 II 71 1088
67 A hidden word — Part 2 I 71 100
68 Partial Key Exposure with RSA — Part 1 II 65 1092
69 Molehunt (Part 3/3) II 65 1088
70 Enigma Messages with Repeated Letters — Part 3 I 64 100
71 Number Sequence — Part 5 I 63 100
72 Hill Cipher with Sudoku Key I 63 100
73 Enigma Messages with Repeated Letters — Part 2 I 63 100
74 BCR code (Book-Caesar-RSA) II 61 1094
75 Smartcard RSA II 60 1088
76 Enigma Messages I 60 100
77 Enigma Messages with Repeated Letters — Part 5 I 59 100
78 Cascading Encryption — Part 1/3 I 59 100
79 Multilingual Monoalphabetic Substitution I 58 100
80 AES key — encoded in the machine readable zone of a European ePassport II 56 1092
81 Turing Bombe Enigma I I 56 100
82 Heartbleed — Part 2 I 56 100
83 Enigma Messages with Repeated Letters — Part 4 I 55 100
84 Recycled One-Time Pad I 50 100
85 Number Sequence — Part 10 I 50 100
86 Monoalphabetic substitution with camouflage — Part 1 I 49 100
87 Unusual encryption using a diophantine equation II 49 1091
88 An Invisible Message I 49 100
89 Number Sequence — Part 9 I 49 100
90 Number Sequence — Part 7 I 46 100
91 Kaskade-S/T — Part 2 II 45 1089
92 Keyshanc — Part 1 II 41 1093
93 ORYX Stream Cipher Part II II 41 1088
94 New Year's Greetings — Part 1 I 40 100
95 Autokey Cipher I 40 102
96 Monoalphabetic substitution with camouflage — Part 4 I 39 100
97 Unconcealed RSA messages II 39 1091
98 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1088
99 News from Castle Mansfeld I 39 100
100 Monoalphabetic substitution with camouflage — Part 2 II 38 1091
101 Strange Message from Thessaloniki I 38 100
102 M-138 — Part 3 II 37 1107
103 New Year's Greetings — Part 2 I 36 100
104 Music Code — Part 2 II 36 1090
105 Weakened Granit — Part 1 I 36 100
106 Music Code — Part 1 I 36 100
107 Monoalphabetic substitution with camouflage — Part 3 II 36 1091
108 The Einstein Enigma II 35 1170
109 RSA Factoring Challenge: RSA-704 II 34 0
110 New Year's Greetings — Part 3 I 34 100
111 Pigpen with a twist — Part 2 II 34 1091
112 Double Column Transposition — Part 4 II 34 1103
113 An 'unhearable' message I 34 100
114 Ku Klux Klan X 34 var
115 CMEA 1 II 34 1088
116 Double Column Transposition — Part 2 II 33 1103
117 New Year's Greetings — Part 4 I 33 100
118 Keyshanc — Part 2 II 32 1093
119 Pigpen with a twist — Part 3 II 31 1091
120 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
121 Double Column Transposition — Part 3 II 29 1103
122 Advent-Challenge — Part 2 II 28 1161
123 Heartbleed — Part 3 II 28 1105
124 Kaskade-S/T — Part 3 II 28 1089
125 ORYX Stream Cipher — Part 3 (revised) II 26 1098
126 RSA Factoring Challenge: RSA-210 II 26 0
127 Advent Challenge — Part 4 II 24 1162
128 Summer Job II 24 1202
129 Lattice Part 1 II 23 1089
130 CMEA 2 III 23 13183
131 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1092
132 Advent Challenge — Part 3 II 22 1162
133 Double Column Transposition — Part 1 II 21 1102
134 Fastest in the West II 20 1202
135 Typex — Part 1 II 20 1096
136 Trendy Messenger II 20 1202
137 RSA with Special d III 20 13175
138 Spanish Strip Cipher — Part 1 II 19 1102
139 Typex — Part 2 II 18 1097
140 Modular Sequences I 17 102
141 Spanish Strip Cipher — Part 2 II 17 1102
142 Concealed Messages — Vigenère's Night Sky X 16 var
143 Purple 1 II 14 1088
144 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1123
145 M-138 — Part 4 II 14 1107
146 AES ECB Wrong Encoding II 13 1161
147 Cryptoanalysis Hacking Puzzles — Part 1 I 12 105
148 Flawed Usage of a OTP Cipher by the BND II 12 1113
149 New Year's Greetings — Part 5 II 12 1119
150 RSA Factoring Challenge: RSA-220 II 12 0
151 Sigaba Part 1 II 12 1088
152 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1089
153 Weakened Handycipher — Part 3 II 11 1110
154 Weakened Handycipher — Part 1 II 11 1110
155 Weakened Handycipher — Part 2 II 10 1110
156 ORYX Stream Cipher — Part 4a II 10 1102
157 Cascading Encryption — Part 3/3 II 10 1097
158 Breaking a Filter Generator II 10 1283
159 Cascading Encryption — Part 2/3 II 10 1097
160 Kaskade-S/T — Part 5 II 9 1089
161 Akelarre Part 1 II 8 1088
162 Handycipher — Part 2 II 6 1109
163 Handycipher — Part 3 III 6 13524
164 RSA Factoring Challenge: RSA-230 II 6 0
165 Weakened Handycipher — Part 4 II 5 1123
166 Double Column Transposition — Part 5 II 5 1104
167 Hilly — Part 1 II 5 1133
168 Weakened Handycipher — Part 5 II 5 1123
169 Handycipher — Part 5 III 5 13742
170 Weakened Handycipher — Part 6 II 5 1123
171 Handycipher — Part 6 III 5 13742
172 Handycipher — Part 1 II 5 1109
173 Handycipher — Part 4 III 4 13742
174 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1144
175 Notes of an Italian Soldier X 4 var
176 Extended Handycipher — Part 1 II 3 1109
177 Spirale — Part 1 II 3 1113
178 Sigaba Part 2 III 3 13175
179 Extended Handycipher — Part 2 II 3 1109
180 The Vatikan Challenge — Part 2 X 3 var
181 Spirale — Part 3 II 3 1113
182 Holographic Encryption — Part 1 II 3 1137
183 Spirale — Part 2 II 3 1113
184 The Vatican Challenge — Part 1 X 3 var
185 ElsieFour — Part 1 III 2 14157
186 Weakened ElsieFour — Part 3 II 2 1152
187 Extended Handycipher — Part 3 II 2 1109
188 Weakened ElsieFour — Part 1 II 2 1187
189 Extended Handycipher — Part 5 III 2 13742
190 Unknown Author X 2 var
191 Extended Handycipher — Part 4 III 2 13742
192 Holographic Encryption — Part 2 II 2 1137
193 ORYX Stream Cipher — Part 4b III 2 13424
194 Handycipher — Part 8 III 2 13885
195 Double Column Transposition X 2 var
196 Handycipher — Part 9 III 2 13885
197 Beale Ciphers X 1 var
198 Handycipher — Part 7 III 1 13885
199 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1094
200 Hilly — Part 2 II 1 1154
201 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1123
202 Extended Handycipher — Part 6 III 1 13742
203 Substitution Cipher with Non-Prefix Codes III 1 13211
204 Kaskade-S/T — Part 4 II 0 1089
205 Twelve-Year-Old Murder Case X 0 var
206 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1123
207 Kryptos X 0 var
208 Dorabella X 0 var
209 D'Agapeyeff X 0 var
210 Weakened ElsieFour — Part 2 II 0 1187
211 World Record Challenge: Break 65 Bits of AES III 0 13175
212 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1123
213 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13188
214 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1123
215 Double-Column Transposition/Granit — Part 2 II 0 1112
216 RSA Factoring Challenge: RSA-390 III 0 13250
217 RSA Factoring Challenge: RSA-400 III 0 13250
218 RSA Factoring Challenge: RSA-410 III 0 13250
219 RSA Factoring Challenge: RSA-420 III 0 13250
220 RSA Factoring Challenge: RSA-380 III 0 13250
221 Double Column Transposition Reloaded — Part 1 III 0 13391
222 RSA Factoring Challenge: RSA-360 III 0 13250
223 RSA Factoring Challenge: RSA-370 III 0 13250
224 Double Column Transposition Reloaded — Part 3 III 0 13391
225 Double Column Transposition Reloaded — Part 2 III 0 13391
226 RSA Factoring Challenge: RSA-430 III 0 13250
227 RSA Factoring Challenge: RSA-440 III 0 13250
228 RSA Factoring Challenge: RSA-490 III 0 13250
229 RSA Factoring Challenge: RSA-500 III 0 13250
230 RSA Factoring Challenge: RSA-617 III 0 13250
231 RSA Factoring Challenge: RSA-2048 III 0 13250
232 RSA Factoring Challenge: RSA-480 III 0 13250
233 RSA Factoring Challenge: RSA-470 III 0 13250
234 ORYX Stream Cipher — Part 4d III 0 13351
235 RSA Factoring Challenge: RSA-450 III 0 13250
236 RSA Factoring Challenge: RSA-460 III 0 13250
237 RSA Factoring Challenge: RSA-1536 III 0 13250
238 RSA Factoring Challenge: RSA-350 III 0 13250
239 RSA Factoring Challenge: RSA-340 III 0 13250
240 RSA Factoring Challenge: RSA-232 III 0 13250
241 RSA Factoring Challenge: RSA-240 III 0 13250
242 RSA Factoring Challenge: RSA-250 III 0 13250
243 RSA Factoring Challenge: RSA-260 III 0 13250
244 Double-Column Transposition/Granit — Part 1 II 0 1112
245 Double-Column Transposition/Granit — Part 3 II 0 1112
246 Weakened Granit — Part 3 II 0 1114
247 Weakened Granit — Part 2 II 0 1114
248 The third ENIGMA M4 message X 0 var
249 Spirale — Part 4 III 0 13590
250 RSA Factoring Challenge: RSA-270 III 0 13250
251 RSA Factoring Challenge: RSA-896 III 0 13250
252 ORYX Stream Cipher — Part 4c III 0 13424
253 RSA Factoring Challenge: RSA-320 III 0 13250
254 Spanish Strip Cipher — Part 3 X 0 var
255 RSA Factoring Challenge: RSA-330 III 0 13250
256 RSA Factoring Challenge: RSA-310 III 0 13250
257 RSA Factoring Challenge: RSA-1024 III 0 13250
258 RSA Factoring Challenge: RSA-280 III 0 13250
259 RSA Factoring Challenge: RSA-290 III 0 13250
260 RSA Factoring Challenge: RSA-300 III 0 13250
261 RSA Factoring Challenge: RSA-309 III 0 13250
262 Digital Signatures: DSA with Medium Fields III 0 13224
 
 
powered by the CrypTool project  CrypTool

 

   +++    [12:31 - 15.11.2018] madness solved the Level I challenge 'From Russia with Love'    +++    [11:34 - 15.11.2018] madness solved the Level I challenge 'M-138 — Part 1'    +++    [10:59 - 15.11.2018] madness solved the Level I challenge 'Modular Sequences'    +++    [07:37 - 15.11.2018] hanspeter solved the Level I challenge 'News from Castle Mansfeld'    +++    [07:33 - 15.11.2018] hanspeter solved the Level I challenge 'Modular Sequences'    +++