MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8205
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2978 100
2 Original Caesar Cipher I 1950 100
3 Number Sequence — Part 2 I 1369 100
4 Caesar Encryption I 998 100
5 Beaver Code I 751 100
6 Letter to the Templars — Part 1 I 674 100
7 Number Sequence — Part 3 I 620 100
8 Letter to the Templars — Part 2 I 539 100
9 Number Sequence — Part 4 I 497 100
10 A hidden word I 483 100
11 Monoalphabetic Substitution I 432 100
12 Letter to the Templars — Part 3 II 422 1101
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 388 100
14 Factorization Cipher — Part 1 I 346 100
15 Grille Cipher I 322 100
16 Homophonic Encryption Part 1 I 306 100
17 Cracking SHA1-Hashed Passwords II 297 1094
18 Homophonic Encryption Part 2 I 263 100
19 One-Time Pad with Flaws I 235 100
20 Snow White and the seven dwarfs I 223 100
21 Alice's Birthday Party (Part 1) II 201 1092
22 Alice's Birthday Party (Part 2) II 192 1092
23 From Russia with Love I 182 100
24 Modified Caesar Cipher I 159 100
25 How do you become a big cryptographer? I 159 100
26 Reserve Hand Procedure — Part 1 I 155 100
27 Broadcasting and low exponent — RSA-Attack II 153 1095
28 Number Sequence — Part 8 I 147 100
29 Letter from the Alleged Countess Julie von Ortenburg I 144 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 139 1092
31 Classical Ciphers^3 I 138 100
32 Enigma Messages with Repeated Letters — Part 1 I 132 100
33 M-138 — Part 1 I 123 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 122 1092
35 Hybrid Encryption I II 119 1092
36 Nils away on travel I 118 100
37 Pigpen with a twist — Part 1 I 116 100
38 RSA: Two different keys — same ciphertext II 115 1095
39 The Book Code: A Challenge for Bookworms I 113 100
40 Enigma Part 1 II 109 1092
41 Molehunt (Part 1/3) I 107 100
42 Factorization Cipher — Part 2 II 106 1096
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 103 100
45 ¿No Hablas Español? No problemo! I 97 100
46 Trifid Cipher I 93 100
47 A really long number sequence II 92 1095
48 ADFGVX — Part 2 I 90 100
49 Kaskade-S/T — Part 1 I 88 100
50 Enigma Combinatorics I 82 100
51 ADFGVX — Part 1 I 80 100
52 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 79 100
53 Heartbleed — Part 1 I 78 100
54 Double Columnar Transposition I 78 100
55 Playfair Encryption I 77 100
56 ECDH-Key Exchange for Beginners I 74 100
57 Playfair with hints about the grid I 74 100
58 M-138 — Part 2 II 73 1119
59 ORYX Stream Cipher Part I II 72 1092
60 Number Sequence — Part 6 I 71 100
61 Enigma Part 2 II 70 1092
62 Factorization Cipher — Part 3 II 69 1097
63 Zodiac Cipher I 69 100
64 The Last Note I 63 100
65 A hidden word — Part 2 I 63 100
66 Molehunt (Part 3/3) II 62 1092
67 Enigma Messages with Repeated Letters — Part 2 I 62 100
68 Enigma Messages with Repeated Letters — Part 3 I 61 100
69 Hill Cipher with Sudoku Key I 61 100
70 Partial Key Exposure with RSA — Part 1 II 60 1097
71 Smartcard RSA II 58 1092
72 Image Noise I 57 100
73 Enigma Messages with Repeated Letters — Part 5 I 57 100
74 BCR code (Book-Caesar-RSA) II 56 1100
75 Number Sequence — Part 5 I 55 100
76 Turing Bombe Enigma I I 55 100
77 Enigma Messages I 55 100
78 Cascading Encryption — Part 1/3 I 54 100
79 Enigma Messages with Repeated Letters — Part 4 I 53 100
80 Multilingual Monoalphabetic Substitution I 52 100
81 Heartbleed — Part 2 I 52 100
82 AES key — encoded in the machine readable zone of a European ePassport II 47 1097
83 Recycled One-Time Pad I 46 100
84 Unusual encryption using a diophantine equation II 46 1095
85 An Invisible Message I 45 100
86 Monoalphabetic substitution with camouflage — Part 1 I 44 100
87 Kaskade-S/T — Part 2 II 43 1093
88 ORYX Stream Cipher Part II II 40 1092
89 Keyshanc — Part 1 II 39 1099
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1093
91 Strange Message from Thessaloniki I 37 100
92 Monoalphabetic substitution with camouflage — Part 4 I 37 100
93 Unconcealed RSA messages II 36 1096
94 News from Castle Mansfeld I 36 100
95 Number Sequence — Part 7 I 36 100
96 Music Code — Part 1 I 35 100
97 Monoalphabetic substitution with camouflage — Part 2 II 35 1096
98 Music Code — Part 2 II 35 1094
99 Weakened Granit — Part 1 I 34 100
100 Monoalphabetic substitution with camouflage — Part 3 II 33 1096
101 CMEA 1 II 33 1092
102 Pigpen with a twist — Part 2 II 32 1095
103 Ku Klux Klan X 32 var
104 An 'unhearable' message I 32 100
105 Double Column Transposition — Part 2 II 32 1112
106 RSA Factoring Challenge: RSA-704 II 31 0
107 New Year's Greetings — Part 1 I 31 100
108 Keyshanc — Part 2 II 31 1099
109 M-138 — Part 3 II 31 1119
110 Double Column Transposition — Part 4 II 30 1113
111 Not-so-Secret Message from Malawi — Part II (ECC) II 29 1092
112 Pigpen with a twist — Part 3 II 29 1095
113 New Year's Greetings — Part 2 I 27 100
114 Heartbleed — Part 3 II 27 1115
115 Double Column Transposition — Part 3 II 27 1112
116 New Year's Greetings — Part 3 I 26 100
117 ORYX Stream Cipher — Part 3 (revised) II 26 1105
118 Kaskade-S/T — Part 3 II 26 1093
119 New Year's Greetings — Part 4 I 25 100
120 RSA Factoring Challenge: RSA-210 II 23 0
121 CMEA 2 III 21 13254
122 Double Column Transposition — Part 1 II 20 1111
123 Monoalphabetic Substitution with Camouflage — Part 5 II 20 1098
124 Typex — Part 1 II 19 1103
125 Spanish Strip Cipher — Part 1 II 19 1111
126 Lattice Part 1 II 18 1093
127 RSA with Special d III 17 13245
128 Typex — Part 2 II 16 1104
129 Spanish Strip Cipher — Part 2 II 16 1111
130 Concealed Messages — Vigenère's Night Sky X 15 var
131 Purple 1 II 13 1092
132 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 13 1152
133 New Year's Greetings — Part 5 II 12 1142
134 Sigaba Part 1 II 11 1092
135 M-138 — Part 4 II 11 1119
136 Cascading Encryption — Part 3/3 II 10 1104
137 Cascading Encryption — Part 2/3 II 10 1104
138 ORYX Stream Cipher — Part 4a II 10 1112
139 Flawed Usage of a OTP Cipher by the BND II 10 1129
140 Weakened Handycipher — Part 3 II 9 1124
141 Kaskade-S/T — Part 5 II 9 1094
142 Weakened Handycipher — Part 1 II 9 1124
143 Weakened Handycipher — Part 2 II 8 1124
144 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 8 1094
145 Akelarre Part 1 II 7 1092
146 RSA Factoring Challenge: RSA-220 II 7 0
147 Double Column Transposition — Part 5 II 5 1113
148 Notes of an Italian Soldier X 4 var
149 Handycipher — Part 3 III 4 13723
150 Handycipher — Part 2 II 4 1122
151 Handycipher — Part 6 III 3 14140
152 Spirale — Part 1 II 3 1129
153 Handycipher — Part 1 II 3 1122
154 Handycipher — Part 5 III 3 14140
155 Spirale — Part 2 II 3 1129
156 Weakened Handycipher — Part 6 II 3 1151
157 Weakened Handycipher — Part 5 II 3 1151
158 Sigaba Part 2 III 3 13245
159 Weakened Handycipher — Part 4 II 3 1151
160 Spirale — Part 3 II 3 1129
161 Extended Handycipher — Part 2 II 2 1123
162 Extended Handycipher — Part 1 II 2 1123
163 ORYX Stream Cipher — Part 4b III 2 13571
164 Extended Handycipher — Part 5 III 2 14140
165 Unknown Author X 2 var
166 Extended Handycipher — Part 4 III 2 14140
167 Extended Handycipher — Part 3 II 2 1123
168 Holographic Encryption — Part 1 II 2 1209
169 Handycipher — Part 4 III 2 14140
170 Holographic Encryption — Part 2 II 2 1209
171 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 2 1281
172 Double Column Transposition X 2 var
173 Handycipher — Part 9 III 1 14560
174 Substitution Cipher with Non-Prefix Codes III 1 13289
175 Handycipher — Part 7 III 1 14560
176 Hilly — Part 1 II 1 1185
177 Extended Handycipher — Part 6 III 1 14140
178 Beale Ciphers X 1 var
179 Handycipher — Part 8 III 1 14560
180 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1152
181 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1099
182 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1152
183 Double-Column Transposition/Granit — Part 3 II 0 1127
184 Double-Column Transposition/Granit — Part 2 II 0 1127
185 Double-Column Transposition/Granit — Part 1 II 0 1127
186 Spirale — Part 4 II 0 1129
187 Weakened Granit — Part 2 II 0 1131
188 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1152
189 Weakened Granit — Part 3 II 0 1131
190 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1152
191 RSA Factoring Challenge: RSA-500 III 0 13338
192 RSA Factoring Challenge: RSA-896 III 0 13338
193 RSA Factoring Challenge: RSA-280 III 0 13338
194 RSA Factoring Challenge: RSA-270 III 0 13338
195 RSA Factoring Challenge: RSA-260 III 0 13338
196 RSA Factoring Challenge: RSA-250 III 0 13338
197 RSA Factoring Challenge: RSA-290 III 0 13338
198 RSA Factoring Challenge: RSA-300 III 0 13338
199 RSA Factoring Challenge: RSA-320 III 0 13338
200 RSA Factoring Challenge: RSA-310 III 0 13338
201 RSA Factoring Challenge: RSA-1024 III 0 13338
202 RSA Factoring Challenge: RSA-309 III 0 13338
203 RSA Factoring Challenge: RSA-240 III 0 13338
204 RSA Factoring Challenge: RSA-232 III 0 13338
205 World Record Challenge: Break 65 Bits of AES III 0 13245
206 Kryptos X 0 var
207 Dorabella X 0 var
208 D'Agapeyeff X 0 var
209 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13261
210 Twelve-Year-Old Murder Case X 0 var
211 RSA Factoring Challenge: RSA-230 II 0 1097
212 The third ENIGMA M4 message X 0 var
213 Digital Signatures: DSA with Medium Fields III 0 13305
214 Kaskade-S/T — Part 4 II 0 1094
215 RSA Factoring Challenge: RSA-330 III 0 13338
216 RSA Factoring Challenge: RSA-340 III 0 13338
217 RSA Factoring Challenge: RSA-490 III 0 13338
218 RSA Factoring Challenge: RSA-617 III 0 13338
219 RSA Factoring Challenge: RSA-480 III 0 13338
220 RSA Factoring Challenge: RSA-470 III 0 13338
221 RSA Factoring Challenge: RSA-1536 III 0 13338
222 RSA Factoring Challenge: RSA-2048 III 0 13338
223 ORYX Stream Cipher — Part 4d III 0 13469
224 Spanish Strip Cipher — Part 3 X 0 var
225 Double Column Transposition Reloaded — Part 3 III 0 13524
226 Double Column Transposition Reloaded — Part 2 III 0 13524
227 Double Column Transposition Reloaded — Part 1 III 0 13524
228 RSA Factoring Challenge: RSA-460 III 0 13338
229 RSA Factoring Challenge: RSA-450 III 0 13338
230 RSA Factoring Challenge: RSA-380 III 0 13338
231 RSA Factoring Challenge: RSA-370 III 0 13338
232 RSA Factoring Challenge: RSA-360 III 0 13338
233 RSA Factoring Challenge: RSA-350 III 0 13338
234 RSA Factoring Challenge: RSA-390 III 0 13338
235 RSA Factoring Challenge: RSA-400 III 0 13338
236 RSA Factoring Challenge: RSA-440 III 0 13338
237 RSA Factoring Challenge: RSA-430 III 0 13338
238 RSA Factoring Challenge: RSA-420 III 0 13338
239 RSA Factoring Challenge: RSA-410 III 0 13338
240 ORYX Stream Cipher — Part 4c III 0 13571
 
 
powered by the CrypTool project  CrypTool

 

   +++    [13:27 - 23.08.2017] tenchijin solved the Level II challenge 'Broadcasting and low exponent — RSA-Attack'    +++    [10:07 - 23.08.2017] nurnicu solved the Level I challenge 'Number Sequence — Part 2'    +++    [18:15 - 22.08.2017] D3d4lu5 solved the Level II challenge 'ASAC — A Strong(er) ADFGVX Cipher — Part 1'    +++    [18:13 - 22.08.2017] D3d4lu5 solved the Level II challenge 'Double Column Transposition — Part 3'    +++    [18:11 - 22.08.2017] D3d4lu5 solved the Level II challenge 'Double Column Transposition — Part 2'    +++