MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8955
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3266 100
2 Original Caesar Cipher I 2179 100
3 Number Sequence — Part 2 I 1532 100
4 Caesar Encryption I 1089 100
5 Beaver Code I 846 100
6 Letter to the Templars — Part 1 I 752 100
7 Number Sequence — Part 3 I 707 100
8 Letter to the Templars — Part 2 I 597 100
9 Number Sequence — Part 4 I 563 100
10 A hidden word I 549 100
11 Letter to the Templars — Part 3 II 488 1095
12 Monoalphabetic Substitution I 455 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 419 100
14 Factorization Cipher — Part 1 I 374 100
15 Grille Cipher I 348 100
16 Cracking SHA1-Hashed Passwords II 344 1090
17 Homophonic Encryption Part 1 I 321 100
18 Homophonic Encryption Part 2 I 275 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 233 100
21 Alice's Birthday Party (Part 1) II 219 1088
22 Alice's Birthday Party (Part 2) II 209 1088
23 From Russia with Love I 205 100
24 Advent-Challenge — Part 1 I 202 100
25 Number Sequence — Part 8 I 198 100
26 How do you become a big cryptographer? I 172 100
27 Broadcasting and low exponent — RSA-Attack II 169 1091
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 163 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 148 1088
32 Classical Ciphers^3 I 144 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 142 1088
34 M-138 — Part 1 I 142 100
35 Enigma Messages with Repeated Letters — Part 1 I 140 100
36 Hybrid Encryption I II 127 1088
37 Nils away on travel I 126 100
38 Pigpen with a twist — Part 1 I 123 100
39 RSA: Two different keys — same ciphertext II 122 1091
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 116 100
42 Enigma Part 1 II 113 1088
43 Factorization Cipher — Part 2 II 113 1092
44 Molehunt (Part 2/3) I 112 100
45 A Secret Message from Castle Mansfeld I 110 100
46 ¿No Hablas Español? No problemo! I 108 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 97 1091
49 ADFGVX — Part 2 I 96 100
50 Kaskade-S/T — Part 1 I 91 100
51 ADFGVX — Part 1 I 88 100
52 Enigma Combinatorics I 87 100
53 Playfair Encryption I 86 100
54 Heartbleed — Part 1 I 85 100
55 M-138 — Part 2 II 84 1108
56 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
57 Image Noise I 83 100
58 Double Columnar Transposition I 83 100
59 Number Sequence — Part 6 I 82 100
60 Playfair with hints about the grid I 81 100
61 ECDH-Key Exchange for Beginners I 77 100
62 ORYX Stream Cipher Part I II 73 1088
63 The Last Note I 73 100
64 Zodiac Cipher I 72 100
65 Factorization Cipher — Part 3 II 71 1092
66 Enigma Part 2 II 71 1088
67 A hidden word — Part 2 I 70 100
68 Enigma Messages with Repeated Letters — Part 3 I 64 100
69 Molehunt (Part 3/3) II 64 1088
70 Partial Key Exposure with RSA — Part 1 II 64 1093
71 Enigma Messages with Repeated Letters — Part 2 I 63 100
72 Hill Cipher with Sudoku Key I 63 100
73 Number Sequence — Part 5 I 62 100
74 BCR code (Book-Caesar-RSA) II 61 1095
75 Enigma Messages I 60 100
76 Enigma Messages with Repeated Letters — Part 5 I 59 100
77 Cascading Encryption — Part 1/3 I 59 100
78 Smartcard RSA II 59 1088
79 Multilingual Monoalphabetic Substitution I 58 100
80 Heartbleed — Part 2 I 56 100
81 Turing Bombe Enigma I I 56 100
82 Enigma Messages with Repeated Letters — Part 4 I 55 100
83 AES key — encoded in the machine readable zone of a European ePassport II 54 1092
84 Recycled One-Time Pad I 50 100
85 An Invisible Message I 48 100
86 Unusual encryption using a diophantine equation II 48 1091
87 Monoalphabetic substitution with camouflage — Part 1 I 48 100
88 Kaskade-S/T — Part 2 II 45 1089
89 Number Sequence — Part 9 I 43 100
90 Number Sequence — Part 7 I 42 100
91 ORYX Stream Cipher Part II II 41 1088
92 Number Sequence — Part 10 I 41 101
93 Keyshanc — Part 1 II 41 1094
94 New Year's Greetings — Part 1 I 39 100
95 Strange Message from Thessaloniki I 38 100
96 News from Castle Mansfeld I 38 100
97 Monoalphabetic substitution with camouflage — Part 4 I 38 100
98 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
99 Monoalphabetic substitution with camouflage — Part 2 II 38 1092
100 Unconcealed RSA messages II 37 1092
101 Music Code — Part 1 I 36 100
102 Music Code — Part 2 II 36 1090
103 M-138 — Part 3 II 36 1108
104 Monoalphabetic substitution with camouflage — Part 3 II 35 1092
105 New Year's Greetings — Part 2 I 35 100
106 Weakened Granit — Part 1 I 35 100
107 The Einstein Enigma II 35 1180
108 New Year's Greetings — Part 3 I 34 100
109 An 'unhearable' message I 34 100
110 Ku Klux Klan X 34 var
111 Double Column Transposition — Part 4 II 34 1104
112 Pigpen with a twist — Part 2 II 34 1091
113 Double Column Transposition — Part 2 II 33 1104
114 RSA Factoring Challenge: RSA-704 II 33 0
115 CMEA 1 II 33 1089
116 New Year's Greetings — Part 4 I 33 100
117 Keyshanc — Part 2 II 32 1094
118 Pigpen with a twist — Part 3 II 31 1091
119 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
120 Double Column Transposition — Part 3 II 29 1104
121 Heartbleed — Part 3 II 28 1106
122 Kaskade-S/T — Part 3 II 28 1089
123 Advent-Challenge — Part 2 II 26 1169
124 ORYX Stream Cipher — Part 3 (revised) II 26 1098
125 RSA Factoring Challenge: RSA-210 II 25 0
126 Advent Challenge — Part 4 II 23 1170
127 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1093
128 Lattice Part 1 II 22 1089
129 CMEA 2 III 22 13190
130 Summer Job II 21 1226
131 Advent Challenge — Part 3 II 20 1170
132 Double Column Transposition — Part 1 II 20 1103
133 Typex — Part 1 II 20 1097
134 Spanish Strip Cipher — Part 1 II 19 1103
135 RSA with Special d III 19 13182
136 Fastest in the West II 18 1226
137 Typex — Part 2 II 18 1098
138 Trendy Messenger II 18 1226
139 Spanish Strip Cipher — Part 2 II 17 1103
140 Concealed Messages — Vigenère's Night Sky X 16 var
141 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1125
142 Purple 1 II 14 1088
143 AES ECB Wrong Encoding II 13 1169
144 M-138 — Part 4 II 13 1108
145 Flawed Usage of a OTP Cipher by the BND II 12 1114
146 Sigaba Part 1 II 12 1088
147 New Year's Greetings — Part 5 II 12 1121
148 RSA Factoring Challenge: RSA-220 II 11 0
149 Cascading Encryption — Part 3/3 II 10 1097
150 Cascading Encryption — Part 2/3 II 10 1097
151 ORYX Stream Cipher — Part 4a II 10 1103
152 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 10 1090
153 Weakened Handycipher — Part 1 II 10 1112
154 Weakened Handycipher — Part 3 II 10 1112
155 Kaskade-S/T — Part 5 II 9 1090
156 Weakened Handycipher — Part 2 II 9 1112
157 Akelarre Part 1 II 7 1088
158 Modular Sequences I 5 150
159 Handycipher — Part 3 III 5 13542
160 Double Column Transposition — Part 5 II 5 1105
161 Autokey Cipher I 5 150
162 Handycipher — Part 2 II 5 1110
163 Hilly — Part 1 II 5 1136
164 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1148
165 Weakened Handycipher — Part 5 II 4 1125
166 Handycipher — Part 1 II 4 1110
167 Notes of an Italian Soldier X 4 var
168 Handycipher — Part 6 III 4 13773
169 Weakened Handycipher — Part 6 II 4 1125
170 Weakened Handycipher — Part 4 II 4 1125
171 Handycipher — Part 5 III 4 13773
172 Sigaba Part 2 III 3 13182
173 Spirale — Part 2 II 3 1114
174 Spirale — Part 1 II 3 1114
175 The Vatican Challenge — Part 1 X 3 var
176 The Vatikan Challenge — Part 2 X 3 var
177 Handycipher — Part 4 III 3 13773
178 Spirale — Part 3 II 3 1114
179 Holographic Encryption — Part 1 II 3 1141
180 Extended Handycipher — Part 4 III 2 13773
181 Extended Handycipher — Part 3 II 2 1110
182 Extended Handycipher — Part 2 II 2 1110
183 Extended Handycipher — Part 5 III 2 13773
184 Extended Handycipher — Part 1 II 2 1110
185 Handycipher — Part 8 III 2 13928
186 Holographic Encryption — Part 2 II 2 1141
187 Weakened ElsieFour — Part 3 II 2 1158
188 Double Column Transposition X 2 var
189 Handycipher — Part 9 III 2 13928
190 Unknown Author X 2 var
191 ORYX Stream Cipher — Part 4b III 2 13438
192 Weakened ElsieFour — Part 1 II 1 1203
193 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1125
194 Handycipher — Part 7 III 1 13928
195 Substitution Cipher with Non-Prefix Codes III 1 13219
196 Beale Ciphers X 1 var
197 Extended Handycipher — Part 6 III 1 13773
198 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1094
199 ElsieFour — Part 1 III 1 14234
200 Kaskade-S/T — Part 4 II 0 1090
201 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13196
202 Twelve-Year-Old Murder Case X 0 var
203 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1125
204 Dorabella X 0 var
205 D'Agapeyeff X 0 var
206 Breaking a Filter Generator II 0 1824
207 Weakened ElsieFour — Part 2 II 0 1203
208 Kryptos X 0 var
209 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1125
210 Hilly — Part 2 II 0 1160
211 World Record Challenge: Break 65 Bits of AES III 0 13182
212 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1125
213 Double-Column Transposition/Granit — Part 1 II 0 1113
214 RSA Factoring Challenge: RSA-390 III 0 13259
215 RSA Factoring Challenge: RSA-380 III 0 13259
216 RSA Factoring Challenge: RSA-400 III 0 13259
217 RSA Factoring Challenge: RSA-410 III 0 13259
218 RSA Factoring Challenge: RSA-420 III 0 13259
219 RSA Factoring Challenge: RSA-370 III 0 13259
220 RSA Factoring Challenge: RSA-360 III 0 13259
221 RSA Factoring Challenge: RSA-350 III 0 13259
222 Double Column Transposition Reloaded — Part 3 III 0 13404
223 Double Column Transposition Reloaded — Part 2 III 0 13404
224 Double Column Transposition Reloaded — Part 1 III 0 13404
225 ORYX Stream Cipher — Part 4d III 0 13362
226 RSA Factoring Challenge: RSA-430 III 0 13259
227 RSA Factoring Challenge: RSA-490 III 0 13259
228 RSA Factoring Challenge: RSA-500 III 0 13259
229 RSA Factoring Challenge: RSA-617 III 0 13259
230 RSA Factoring Challenge: RSA-2048 III 0 13259
231 RSA Factoring Challenge: RSA-480 III 0 13259
232 RSA Factoring Challenge: RSA-470 III 0 13259
233 RSA Factoring Challenge: RSA-440 III 0 13259
234 RSA Factoring Challenge: RSA-450 III 0 13259
235 RSA Factoring Challenge: RSA-460 III 0 13259
236 RSA Factoring Challenge: RSA-1536 III 0 13259
237 RSA Factoring Challenge: RSA-340 III 0 13259
238 RSA Factoring Challenge: RSA-330 III 0 13259
239 RSA Factoring Challenge: RSA-230 II 0 1093
240 RSA Factoring Challenge: RSA-232 III 0 13259
241 RSA Factoring Challenge: RSA-240 III 0 13259
242 RSA Factoring Challenge: RSA-250 III 0 13259
243 The third ENIGMA M4 message X 0 var
244 Double-Column Transposition/Granit — Part 2 II 0 1113
245 Weakened Granit — Part 2 II 0 1115
246 Digital Signatures: DSA with Medium Fields III 0 13232
247 Spirale — Part 4 III 0 13611
248 Double-Column Transposition/Granit — Part 3 II 0 1113
249 RSA Factoring Challenge: RSA-260 III 0 13259
250 RSA Factoring Challenge: RSA-270 III 0 13259
251 RSA Factoring Challenge: RSA-1024 III 0 13259
252 Spanish Strip Cipher — Part 3 X 0 var
253 RSA Factoring Challenge: RSA-310 III 0 13259
254 RSA Factoring Challenge: RSA-320 III 0 13259
255 ORYX Stream Cipher — Part 4c III 0 13438
256 RSA Factoring Challenge: RSA-309 III 0 13259
257 RSA Factoring Challenge: RSA-896 III 0 13259
258 RSA Factoring Challenge: RSA-280 III 0 13259
259 RSA Factoring Challenge: RSA-290 III 0 13259
260 RSA Factoring Challenge: RSA-300 III 0 13259
261 Weakened Granit — Part 3 II 0 1115
 
 
powered by the CrypTool project  CrypTool

 

   +++    [09:53 - 26.09.2018] argh solved the Level I challenge 'Modular Sequences'    +++    [09:50 - 26.09.2018] argh solved the Level I challenge 'Autokey Cipher'    +++    [08:58 - 26.09.2018] chloethor solved the Level I challenge 'Number Sequence'    +++    [05:39 - 26.09.2018] alberta.m solved the Level I challenge 'Beaver Code'    +++    [05:25 - 26.09.2018] alberta.m solved the Level I challenge 'Original Caesar Cipher'    +++