MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

7675
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2760 100
2 Original Caesar Cipher I 1788 100
3 Number Sequence — Part 2 I 1245 100
4 Caesar Encryption I 924 100
5 Beaver Code I 682 100
6 Letter to the Templars — Part 1 I 625 100
7 Number Sequence — Part 3 I 570 100
8 Letter to the Templars — Part 2 I 502 100
9 Number Sequence — Part 4 I 454 100
10 A hidden word I 429 100
11 Monoalphabetic Substitution I 413 100
12 Letter to the Templars — Part 3 II 387 1105
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 367 100
14 Factorization Cipher — Part 1 I 327 100
15 Grille Cipher I 299 100
16 Homophonic Encryption Part 1 I 285 100
17 Cracking SHA1-Hashed Passwords II 266 1097
18 Homophonic Encryption Part 2 I 248 100
19 One-Time Pad with Flaws I 221 100
20 Snow White and the seven dwarfs I 211 100
21 Alice's Birthday Party (Part 1) II 180 1095
22 Alice's Birthday Party (Part 2) II 171 1095
23 From Russia with Love I 166 100
24 Reserve Hand Procedure — Part 1 I 146 100
25 Modified Caesar Cipher I 146 100
26 How do you become a big cryptographer? I 143 100
27 Letter from the Alleged Countess Julie von Ortenburg I 132 100
28 Broadcasting and low exponent — RSA-Attack II 130 1098
29 Classical Ciphers^3 I 130 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 124 1095
31 Enigma Messages with Repeated Letters — Part 1 I 121 100
32 Number Sequence — Part 8 I 113 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 112 1095
34 M-138 — Part 1 I 109 100
35 Pigpen with a twist — Part 1 I 107 100
36 The Book Code: A Challenge for Bookworms I 106 100
37 Hybrid Encryption I II 106 1095
38 Nils away on travel I 103 100
39 RSA: Two different keys — same ciphertext II 102 1098
40 Factorization Cipher — Part 2 II 100 1100
41 Molehunt (Part 1/3) I 100 100
42 Enigma Part 1 II 99 1095
43 A Secret Message from Castle Mansfeld I 98 100
44 Molehunt (Part 2/3) I 96 100
45 Trifid Cipher I 86 100
46 A really long number sequence II 86 1099
47 ¿No Hablas Español? No problemo! I 85 100
48 ADFGVX — Part 2 I 82 100
49 Kaskade-S/T — Part 1 I 81 100
50 Enigma Combinatorics I 75 100
51 ADFGVX — Part 1 I 72 100
52 Playfair Encryption I 69 100
53 Double Columnar Transposition I 69 100
54 Playfair with hints about the grid I 67 100
55 Heartbleed — Part 1 I 67 100
56 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 67 100
57 ECDH-Key Exchange for Beginners I 66 100
58 ORYX Stream Cipher Part I II 64 1095
59 Enigma Part 2 II 64 1095
60 Zodiac Cipher I 64 100
61 M-138 — Part 2 II 62 1130
62 Factorization Cipher — Part 3 II 61 1101
63 Molehunt (Part 3/3) II 58 1095
64 Number Sequence — Part 6 I 57 100
65 A hidden word — Part 2 I 55 100
66 Smartcard RSA II 54 1095
67 The Last Note I 53 100
68 Enigma Messages with Repeated Letters — Part 2 I 53 100
69 Enigma Messages with Repeated Letters — Part 3 I 53 100
70 Partial Key Exposure with RSA — Part 1 II 53 1101
71 Turing Bombe Enigma I I 51 100
72 Hill Cipher with Sudoku Key I 51 100
73 Number Sequence — Part 5 I 50 100
74 BCR code (Book-Caesar-RSA) II 49 1105
75 Enigma Messages with Repeated Letters — Part 5 I 49 100
76 Enigma Messages I 48 100
77 Cascading Encryption — Part 1/3 I 48 100
78 Multilingual Monoalphabetic Substitution I 47 100
79 Image Noise I 46 100
80 Recycled One-Time Pad I 45 100
81 Enigma Messages with Repeated Letters — Part 4 I 45 100
82 AES key — encoded in the machine readable zone of a European ePassport II 44 1101
83 Heartbleed — Part 2 I 44 100
84 An Invisible Message I 42 100
85 Monoalphabetic substitution with camouflage — Part 1 I 40 100
86 Kaskade-S/T — Part 2 II 39 1096
87 Unusual encryption using a diophantine equation II 38 1099
88 ORYX Stream Cipher Part II II 37 1095
89 Keyshanc — Part 1 II 36 1103
90 Monoalphabetic substitution with camouflage — Part 4 I 34 100
91 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 34 1096
92 Strange Message from Thessaloniki I 34 100
93 Music Code — Part 1 I 33 100
94 Music Code — Part 2 II 33 1097
95 Monoalphabetic substitution with camouflage — Part 2 II 33 1100
96 News from Castle Mansfeld I 32 100
97 Unconcealed RSA messages II 32 1100
98 Ku Klux Klan X 32 var
99 Pigpen with a twist — Part 2 II 31 1099
100 Monoalphabetic substitution with camouflage — Part 3 II 31 1100
101 Double Column Transposition — Part 4 II 29 1121
102 An 'unhearable' message I 29 100
103 Weakened Granit — Part 1 I 29 100
104 Number Sequence — Part 7 I 29 100
105 Keyshanc — Part 2 II 28 1103
106 New Year's Greetings — Part 1 I 28 100
107 Double Column Transposition — Part 2 II 27 1120
108 RSA Factoring Challenge: RSA-704 II 27 0
109 Not-so-Secret Message from Malawi — Part II (ECC) II 26 1095
110 CMEA 1 II 25 1095
111 Pigpen with a twist — Part 3 II 25 1099
112 M-138 — Part 3 II 25 1130
113 New Year's Greetings — Part 2 I 25 100
114 New Year's Greetings — Part 4 I 24 100
115 Double Column Transposition — Part 3 II 24 1120
116 New Year's Greetings — Part 3 I 24 100
117 ORYX Stream Cipher — Part 3 (revised) II 23 1110
118 Kaskade-S/T — Part 3 II 22 1096
119 Heartbleed — Part 3 II 21 1125
120 RSA Factoring Challenge: RSA-210 II 20 0
121 Monoalphabetic Substitution with Camouflage — Part 5 II 19 1102
122 CMEA 2 III 18 13303
123 Lattice Part 1 II 18 1096
124 Double Column Transposition — Part 1 II 18 1119
125 Typex — Part 1 II 18 1108
126 Spanish Strip Cipher — Part 1 II 17 1119
127 RSA with Special d III 16 13293
128 Typex — Part 2 II 16 1109
129 Concealed Messages — Vigenère's Night Sky X 14 var
130 Spanish Strip Cipher — Part 2 II 14 1119
131 Purple 1 II 12 1095
132 New Year's Greetings — Part 5 II 11 1174
133 Cascading Encryption — Part 3/3 II 10 1109
134 Cascading Encryption — Part 2/3 II 10 1109
135 Sigaba Part 1 II 9 1095
136 Flawed Usage of a OTP Cipher by the BND II 9 1146
137 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 8 1205
138 Kaskade-S/T — Part 5 II 8 1097
139 Weakened Handycipher — Part 3 II 8 1138
140 Weakened Handycipher — Part 1 II 8 1138
141 M-138 — Part 4 II 7 1130
142 Akelarre Part 1 II 7 1095
143 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1097
144 Weakened Handycipher — Part 2 II 7 1138
145 ORYX Stream Cipher — Part 4a II 6 1119
146 Double Column Transposition — Part 5 II 5 1122
147 Notes of an Italian Soldier X 4 var
148 Handycipher — Part 2 II 3 1134
149 Handycipher — Part 3 III 3 13903
150 Weakened Handycipher — Part 6 II 2 1200
151 RSA Factoring Challenge: RSA-220 II 2 0
152 Weakened Handycipher — Part 4 II 2 1200
153 Weakened Handycipher — Part 5 II 2 1200
154 Handycipher — Part 5 III 2 14758
155 Double Column Transposition X 2 var
156 Unknown Author X 2 var
157 Handycipher — Part 1 II 2 1134
158 Sigaba Part 2 III 2 13293
159 Handycipher — Part 6 III 2 14758
160 ORYX Stream Cipher — Part 4b III 1 13689
161 Handycipher — Part 4 III 1 14758
162 Spirale — Part 1 II 1 1146
163 Spirale — Part 2 II 1 1146
164 Spirale — Part 3 II 1 1146
165 Beale Ciphers X 1 var
166 Substitution Cipher with Non-Prefix Codes III 1 13344
167 Extended Handycipher — Part 1 II 1 1135
168 Extended Handycipher — Part 2 II 1 1135
169 Extended Handycipher — Part 3 II 1 1135
170 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1103
171 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1205
172 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1205
173 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1205
174 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1205
175 Extended Handycipher — Part 6 III 0 14758
176 Spirale — Part 4 II 0 1146
177 Double-Column Transposition/Granit — Part 2 II 0 1142
178 Double-Column Transposition/Granit — Part 1 II 0 1142
179 Double-Column Transposition/Granit — Part 3 II 0 1142
180 Weakened Granit — Part 2 II 0 1149
181 Extended Handycipher — Part 4 III 0 14758
182 Weakened Granit — Part 3 II 0 1149
183 Extended Handycipher — Part 5 III 0 14758
184 RSA Factoring Challenge: RSA-470 III 0 13401
185 RSA Factoring Challenge: RSA-896 III 0 13401
186 RSA Factoring Challenge: RSA-280 III 0 13401
187 RSA Factoring Challenge: RSA-270 III 0 13401
188 RSA Factoring Challenge: RSA-260 III 0 13401
189 RSA Factoring Challenge: RSA-250 III 0 13401
190 RSA Factoring Challenge: RSA-290 III 0 13401
191 RSA Factoring Challenge: RSA-300 III 0 13401
192 RSA Factoring Challenge: RSA-320 III 0 13401
193 RSA Factoring Challenge: RSA-310 III 0 13401
194 RSA Factoring Challenge: RSA-1024 III 0 13401
195 RSA Factoring Challenge: RSA-309 III 0 13401
196 RSA Factoring Challenge: RSA-240 III 0 13401
197 RSA Factoring Challenge: RSA-232 III 0 13401
198 World Record Challenge: Break 65 Bits of AES III 0 13293
199 Kryptos X 0 var
200 Dorabella X 0 var
201 D'Agapeyeff X 0 var
202 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13311
203 Twelve-Year-Old Murder Case X 0 var
204 RSA Factoring Challenge: RSA-230 II 0 1101
205 The third ENIGMA M4 message X 0 var
206 Digital Signatures: DSA with Medium Fields III 0 13362
207 Kaskade-S/T — Part 4 II 0 1097
208 RSA Factoring Challenge: RSA-330 III 0 13401
209 RSA Factoring Challenge: RSA-340 III 0 13401
210 RSA Factoring Challenge: RSA-500 III 0 13401
211 RSA Factoring Challenge: RSA-617 III 0 13401
212 RSA Factoring Challenge: RSA-490 III 0 13401
213 RSA Factoring Challenge: RSA-480 III 0 13401
214 RSA Factoring Challenge: RSA-1536 III 0 13401
215 RSA Factoring Challenge: RSA-2048 III 0 13401
216 ORYX Stream Cipher — Part 4d III 0 13559
217 Spanish Strip Cipher — Part 3 X 0 var
218 Double Column Transposition Reloaded — Part 3 III 0 13629
219 Double Column Transposition Reloaded — Part 2 III 0 13629
220 Double Column Transposition Reloaded — Part 1 III 0 13629
221 RSA Factoring Challenge: RSA-460 III 0 13401
222 RSA Factoring Challenge: RSA-450 III 0 13401
223 RSA Factoring Challenge: RSA-380 III 0 13401
224 RSA Factoring Challenge: RSA-370 III 0 13401
225 RSA Factoring Challenge: RSA-360 III 0 13401
226 RSA Factoring Challenge: RSA-350 III 0 13401
227 RSA Factoring Challenge: RSA-390 III 0 13401
228 RSA Factoring Challenge: RSA-400 III 0 13401
229 RSA Factoring Challenge: RSA-440 III 0 13401
230 RSA Factoring Challenge: RSA-430 III 0 13401
231 RSA Factoring Challenge: RSA-420 III 0 13401
232 RSA Factoring Challenge: RSA-410 III 0 13401
233 ORYX Stream Cipher — Part 4c III 0 13689
 
 
powered by the CrypTool project  CrypTool

 

   +++    [13:45 - 04.12.2016] JoGo solved the Level I challenge 'M-138 — Part 1'    +++    [11:58 - 04.12.2016] J@cK solved the Level I challenge 'Number Sequence — Part 4'    +++    [11:56 - 04.12.2016] J@cK solved the Level I challenge 'Number Sequence — Part 3'    +++    [11:40 - 04.12.2016] JoGo solved the Level I challenge 'Enigma Messages with Repeated Letters — Part 1'    +++    [09:27 - 04.12.2016] JoGo solved the Level I challenge 'How do you become a big cryptographer?'    +++