MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8325
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3013 100
2 Original Caesar Cipher I 1972 100
3 Number Sequence — Part 2 I 1385 100
4 Caesar Encryption I 1006 100
5 Beaver Code I 763 100
6 Letter to the Templars — Part 1 I 682 100
7 Number Sequence — Part 3 I 626 100
8 Letter to the Templars — Part 2 I 547 100
9 Number Sequence — Part 4 I 503 100
10 A hidden word I 489 100
11 Monoalphabetic Substitution I 436 100
12 Letter to the Templars — Part 3 II 429 1100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 391 100
14 Factorization Cipher — Part 1 I 351 100
15 Grille Cipher I 325 100
16 Cracking SHA1-Hashed Passwords II 311 1093
17 Homophonic Encryption Part 1 I 309 100
18 Homophonic Encryption Part 2 I 264 100
19 One-Time Pad with Flaws I 236 100
20 Snow White and the seven dwarfs I 224 100
21 Alice's Birthday Party (Part 1) II 204 1091
22 Alice's Birthday Party (Part 2) II 195 1091
23 From Russia with Love I 184 100
24 Modified Caesar Cipher I 160 100
25 How do you become a big cryptographer? I 159 100
26 Broadcasting and low exponent — RSA-Attack II 157 1094
27 Reserve Hand Procedure — Part 1 I 155 100
28 Number Sequence — Part 8 I 150 100
29 Letter from the Alleged Countess Julie von Ortenburg I 144 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 140 1091
31 Classical Ciphers^3 I 138 100
32 Enigma Messages with Repeated Letters — Part 1 I 132 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 130 1091
34 M-138 — Part 1 I 125 100
35 Hybrid Encryption I II 120 1091
36 Nils away on travel I 118 100
37 Pigpen with a twist — Part 1 I 116 100
38 RSA: Two different keys — same ciphertext II 115 1094
39 The Book Code: A Challenge for Bookworms I 114 100
40 Enigma Part 1 II 110 1091
41 Factorization Cipher — Part 2 II 107 1096
42 Molehunt (Part 1/3) I 107 100
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 103 100
45 ¿No Hablas Español? No problemo! I 97 100
46 Trifid Cipher I 94 100
47 A really long number sequence II 92 1095
48 ADFGVX — Part 2 I 91 100
49 Kaskade-S/T — Part 1 I 89 100
50 Enigma Combinatorics I 82 100
51 Heartbleed — Part 1 I 82 100
52 ADFGVX — Part 1 I 81 100
53 Double Columnar Transposition I 79 100
54 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 79 100
55 Playfair Encryption I 78 100
56 Playfair with hints about the grid I 75 100
57 M-138 — Part 2 II 74 1117
58 ECDH-Key Exchange for Beginners I 74 100
59 ORYX Stream Cipher Part I II 72 1091
60 Number Sequence — Part 6 I 71 100
61 Zodiac Cipher I 70 100
62 Enigma Part 2 II 70 1091
63 Factorization Cipher — Part 3 II 69 1096
64 Image Noise I 66 100
65 A hidden word — Part 2 I 63 100
66 The Last Note I 63 100
67 Molehunt (Part 3/3) II 62 1091
68 Enigma Messages with Repeated Letters — Part 2 I 62 100
69 Hill Cipher with Sudoku Key I 62 100
70 Enigma Messages with Repeated Letters — Part 3 I 61 100
71 Partial Key Exposure with RSA — Part 1 II 60 1097
72 Smartcard RSA II 58 1091
73 BCR code (Book-Caesar-RSA) II 58 1099
74 Enigma Messages with Repeated Letters — Part 5 I 57 100
75 Number Sequence — Part 5 I 56 100
76 Enigma Messages I 56 100
77 Turing Bombe Enigma I I 55 100
78 Cascading Encryption — Part 1/3 I 54 100
79 Multilingual Monoalphabetic Substitution I 54 100
80 Heartbleed — Part 2 I 53 100
81 AES key — encoded in the machine readable zone of a European ePassport II 53 1096
82 Enigma Messages with Repeated Letters — Part 4 I 53 100
83 Unusual encryption using a diophantine equation II 46 1095
84 Recycled One-Time Pad I 46 100
85 An Invisible Message I 45 100
86 Kaskade-S/T — Part 2 II 44 1093
87 Monoalphabetic substitution with camouflage — Part 1 I 44 100
88 ORYX Stream Cipher Part II II 40 1091
89 Keyshanc — Part 1 II 39 1098
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1092
91 Number Sequence — Part 7 I 38 100
92 Monoalphabetic substitution with camouflage — Part 4 I 37 100
93 Strange Message from Thessaloniki I 37 100
94 News from Castle Mansfeld I 36 100
95 Unconcealed RSA messages II 36 1095
96 Monoalphabetic substitution with camouflage — Part 2 II 35 1096
97 Weakened Granit — Part 1 I 35 100
98 Music Code — Part 2 II 35 1093
99 Music Code — Part 1 I 35 100
100 Ku Klux Klan X 34 var
101 Monoalphabetic substitution with camouflage — Part 3 II 33 1096
102 Pigpen with a twist — Part 2 II 33 1095
103 An 'unhearable' message I 33 100
104 CMEA 1 II 33 1092
105 Double Column Transposition — Part 2 II 32 1111
106 RSA Factoring Challenge: RSA-704 II 31 0
107 M-138 — Part 3 II 31 1117
108 Keyshanc — Part 2 II 31 1098
109 Double Column Transposition — Part 4 II 31 1111
110 New Year's Greetings — Part 1 I 31 100
111 Pigpen with a twist — Part 3 II 29 1095
112 Not-so-Secret Message from Malawi — Part II (ECC) II 29 1091
113 Double Column Transposition — Part 3 II 28 1111
114 Heartbleed — Part 3 II 28 1114
115 New Year's Greetings — Part 2 I 27 100
116 Kaskade-S/T — Part 3 II 27 1093
117 ORYX Stream Cipher — Part 3 (revised) II 26 1104
118 New Year's Greetings — Part 3 I 26 100
119 New Year's Greetings — Part 4 I 25 100
120 RSA Factoring Challenge: RSA-210 II 23 0
121 CMEA 2 III 21 13244
122 Monoalphabetic Substitution with Camouflage — Part 5 II 21 1097
123 Typex — Part 1 II 20 1102
124 Double Column Transposition — Part 1 II 20 1110
125 Spanish Strip Cipher — Part 1 II 19 1110
126 Lattice Part 1 II 18 1093
127 Typex — Part 2 II 17 1103
128 RSA with Special d III 17 13235
129 Spanish Strip Cipher — Part 2 II 17 1110
130 Concealed Messages — Vigenère's Night Sky X 15 var
131 Purple 1 II 14 1091
132 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 13 1146
133 New Year's Greetings — Part 5 II 12 1138
134 Sigaba Part 1 II 11 1091
135 M-138 — Part 4 II 11 1117
136 Cascading Encryption — Part 2/3 II 10 1103
137 Flawed Usage of a OTP Cipher by the BND II 10 1126
138 ORYX Stream Cipher — Part 4a II 10 1110
139 Cascading Encryption — Part 3/3 II 10 1103
140 Weakened Handycipher — Part 3 II 9 1122
141 Weakened Handycipher — Part 1 II 9 1122
142 Kaskade-S/T — Part 5 II 9 1093
143 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 8 1093
144 Weakened Handycipher — Part 2 II 8 1122
145 RSA Factoring Challenge: RSA-220 II 7 0
146 Akelarre Part 1 II 7 1092
147 Double Column Transposition — Part 5 II 5 1112
148 Handycipher — Part 3 III 4 13691
149 Notes of an Italian Soldier X 4 var
150 Handycipher — Part 2 II 4 1119
151 Handycipher — Part 1 II 3 1119
152 Weakened Handycipher — Part 5 II 3 1146
153 Spirale — Part 3 II 3 1126
154 Weakened Handycipher — Part 6 II 3 1146
155 Weakened Handycipher — Part 4 II 3 1146
156 Handycipher — Part 5 III 3 14065
157 Spirale — Part 1 II 3 1126
158 Spirale — Part 2 II 3 1126
159 Handycipher — Part 6 III 3 14065
160 Holographic Encryption — Part 1 II 3 1189
161 Sigaba Part 2 III 3 13235
162 Double Column Transposition X 2 var
163 Extended Handycipher — Part 3 II 2 1120
164 Extended Handycipher — Part 2 II 2 1120
165 Handycipher — Part 4 III 2 14065
166 Extended Handycipher — Part 1 II 2 1120
167 ORYX Stream Cipher — Part 4b III 2 13548
168 Extended Handycipher — Part 5 III 2 14065
169 Extended Handycipher — Part 4 III 2 14065
170 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 2 1224
171 Holographic Encryption — Part 2 II 2 1189
172 Unknown Author X 2 var
173 Extended Handycipher — Part 6 III 1 14065
174 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1146
175 Handycipher — Part 9 III 1 14405
176 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1098
177 Handycipher — Part 8 III 1 14405
178 Substitution Cipher with Non-Prefix Codes III 1 13278
179 Hilly — Part 1 II 1 1172
180 Handycipher — Part 7 III 1 14405
181 Beale Ciphers X 1 var
182 Hilly — Part 2 II 0 1725
183 ElsieFour — Part 1 II 0 1398
184 Weakened ElsieFour — Part 1 II 0 1398
185 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1146
186 Double-Column Transposition/Granit — Part 3 II 0 1124
187 Double-Column Transposition/Granit — Part 2 II 0 1124
188 Double-Column Transposition/Granit — Part 1 II 0 1124
189 Spirale — Part 4 II 0 1126
190 Weakened Granit — Part 2 II 0 1128
191 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1146
192 Weakened Granit — Part 3 II 0 1128
193 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1146
194 RSA Factoring Challenge: RSA-2048 III 0 13326
195 RSA Factoring Challenge: RSA-896 III 0 13326
196 RSA Factoring Challenge: RSA-280 III 0 13326
197 RSA Factoring Challenge: RSA-270 III 0 13326
198 RSA Factoring Challenge: RSA-260 III 0 13326
199 RSA Factoring Challenge: RSA-250 III 0 13326
200 RSA Factoring Challenge: RSA-290 III 0 13326
201 RSA Factoring Challenge: RSA-300 III 0 13326
202 RSA Factoring Challenge: RSA-320 III 0 13326
203 RSA Factoring Challenge: RSA-310 III 0 13326
204 RSA Factoring Challenge: RSA-1024 III 0 13326
205 RSA Factoring Challenge: RSA-309 III 0 13326
206 RSA Factoring Challenge: RSA-240 III 0 13326
207 RSA Factoring Challenge: RSA-232 III 0 13326
208 World Record Challenge: Break 65 Bits of AES III 0 13235
209 Kryptos X 0 var
210 Dorabella X 0 var
211 D'Agapeyeff X 0 var
212 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13251
213 Twelve-Year-Old Murder Case X 0 var
214 RSA Factoring Challenge: RSA-230 II 0 1097
215 The third ENIGMA M4 message X 0 var
216 Digital Signatures: DSA with Medium Fields III 0 13294
217 Kaskade-S/T — Part 4 II 0 1093
218 RSA Factoring Challenge: RSA-330 III 0 13326
219 RSA Factoring Challenge: RSA-340 III 0 13326
220 RSA Factoring Challenge: RSA-490 III 0 13326
221 RSA Factoring Challenge: RSA-500 III 0 13326
222 RSA Factoring Challenge: RSA-480 III 0 13326
223 RSA Factoring Challenge: RSA-470 III 0 13326
224 RSA Factoring Challenge: RSA-1536 III 0 13326
225 RSA Factoring Challenge: RSA-617 III 0 13326
226 ORYX Stream Cipher — Part 4d III 0 13452
227 Spanish Strip Cipher — Part 3 X 0 var
228 Double Column Transposition Reloaded — Part 3 III 0 13505
229 Double Column Transposition Reloaded — Part 2 III 0 13505
230 Double Column Transposition Reloaded — Part 1 III 0 13505
231 RSA Factoring Challenge: RSA-460 III 0 13326
232 RSA Factoring Challenge: RSA-450 III 0 13326
233 RSA Factoring Challenge: RSA-380 III 0 13326
234 RSA Factoring Challenge: RSA-370 III 0 13326
235 RSA Factoring Challenge: RSA-360 III 0 13326
236 RSA Factoring Challenge: RSA-350 III 0 13326
237 RSA Factoring Challenge: RSA-390 III 0 13326
238 RSA Factoring Challenge: RSA-400 III 0 13326
239 RSA Factoring Challenge: RSA-440 III 0 13326
240 RSA Factoring Challenge: RSA-430 III 0 13326
241 RSA Factoring Challenge: RSA-420 III 0 13326
242 RSA Factoring Challenge: RSA-410 III 0 13326
243 ORYX Stream Cipher — Part 4c III 0 13548
 
 
powered by the CrypTool project  CrypTool

 

   +++    [15:50 - 19.10.2017] peai002 solved the Level I challenge 'Original Caesar Cipher'    +++    [16:58 - 17.10.2017] Xiao_Xin solved the Level II challenge 'AES key — encoded in the machine readable zone of a European ePassport'    +++    [11:25 - 17.10.2017] Himmelsfeuer solved the Level I challenge 'Number Sequence — Part 3'    +++    [01:52 - 17.10.2017] holo solved the Level I challenge 'M-138 — Part 1'    +++    [01:24 - 17.10.2017] holo solved the Level I challenge 'Image Noise'    +++