MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

7748
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2790 100
2 Original Caesar Cipher I 1807 100
3 Number Sequence — Part 2 I 1265 100
4 Caesar Encryption I 932 100
5 Beaver Code I 691 100
6 Letter to the Templars — Part 1 I 630 100
7 Number Sequence — Part 3 I 583 100
8 Letter to the Templars — Part 2 I 509 100
9 Number Sequence — Part 4 I 464 100
10 A hidden word I 434 100
11 Monoalphabetic Substitution I 418 100
12 Letter to the Templars — Part 3 II 393 1104
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 369 100
14 Factorization Cipher — Part 1 I 330 100
15 Grille Cipher I 301 100
16 Homophonic Encryption Part 1 I 289 100
17 Cracking SHA1-Hashed Passwords II 269 1096
18 Homophonic Encryption Part 2 I 251 100
19 One-Time Pad with Flaws I 224 100
20 Snow White and the seven dwarfs I 212 100
21 Alice's Birthday Party (Part 1) II 181 1094
22 Alice's Birthday Party (Part 2) II 172 1094
23 From Russia with Love I 168 100
24 Reserve Hand Procedure — Part 1 I 149 100
25 Modified Caesar Cipher I 149 100
26 How do you become a big cryptographer? I 147 100
27 Letter from the Alleged Countess Julie von Ortenburg I 135 100
28 Broadcasting and low exponent — RSA-Attack II 132 1097
29 Classical Ciphers^3 I 132 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 126 1094
31 Enigma Messages with Repeated Letters — Part 1 I 125 100
32 Number Sequence — Part 8 I 119 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 115 1094
34 M-138 — Part 1 I 114 100
35 Pigpen with a twist — Part 1 I 109 100
36 Hybrid Encryption I II 107 1094
37 The Book Code: A Challenge for Bookworms I 106 100
38 RSA: Two different keys — same ciphertext II 104 1098
39 Nils away on travel I 104 100
40 A Secret Message from Castle Mansfeld I 100 100
41 Factorization Cipher — Part 2 II 100 1099
42 Molehunt (Part 1/3) I 100 100
43 Enigma Part 1 II 99 1094
44 Molehunt (Part 2/3) I 97 100
45 Trifid Cipher I 88 100
46 A really long number sequence II 87 1098
47 ¿No Hablas Español? No problemo! I 87 100
48 ADFGVX — Part 2 I 83 100
49 Kaskade-S/T — Part 1 I 82 100
50 Enigma Combinatorics I 77 100
51 ADFGVX — Part 1 I 73 100
52 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 73 100
53 Double Columnar Transposition I 72 100
54 Playfair Encryption I 71 100
55 Heartbleed — Part 1 I 69 100
56 ECDH-Key Exchange for Beginners I 68 100
57 Playfair with hints about the grid I 68 100
58 M-138 — Part 2 II 64 1128
59 Zodiac Cipher I 64 100
60 Enigma Part 2 II 64 1094
61 ORYX Stream Cipher Part I II 64 1094
62 Factorization Cipher — Part 3 II 63 1100
63 Number Sequence — Part 6 I 60 100
64 Molehunt (Part 3/3) II 59 1094
65 A hidden word — Part 2 I 57 100
66 The Last Note I 56 100
67 Smartcard RSA II 55 1094
68 Enigma Messages with Repeated Letters — Part 3 I 55 100
69 Enigma Messages with Repeated Letters — Part 2 I 55 100
70 Hill Cipher with Sudoku Key I 54 100
71 Partial Key Exposure with RSA — Part 1 II 53 1100
72 Turing Bombe Enigma I I 51 100
73 Number Sequence — Part 5 I 51 100
74 Enigma Messages with Repeated Letters — Part 5 I 51 100
75 BCR code (Book-Caesar-RSA) II 50 1104
76 Cascading Encryption — Part 1/3 I 49 100
77 Image Noise I 48 100
78 Enigma Messages I 48 100
79 Enigma Messages with Repeated Letters — Part 4 I 47 100
80 Multilingual Monoalphabetic Substitution I 47 100
81 Heartbleed — Part 2 I 46 100
82 Recycled One-Time Pad I 45 100
83 AES key — encoded in the machine readable zone of a European ePassport II 44 1100
84 An Invisible Message I 43 100
85 Monoalphabetic substitution with camouflage — Part 1 I 40 100
86 Kaskade-S/T — Part 2 II 39 1096
87 Unusual encryption using a diophantine equation II 39 1098
88 ORYX Stream Cipher Part II II 37 1094
89 Keyshanc — Part 1 II 36 1102
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 34 1095
91 Monoalphabetic substitution with camouflage — Part 4 I 34 100
92 Strange Message from Thessaloniki I 34 100
93 Monoalphabetic substitution with camouflage — Part 2 II 33 1099
94 News from Castle Mansfeld I 33 100
95 Music Code — Part 2 II 33 1097
96 Music Code — Part 1 I 33 100
97 Ku Klux Klan X 32 var
98 Unconcealed RSA messages II 32 1099
99 Monoalphabetic substitution with camouflage — Part 3 II 31 1099
100 Pigpen with a twist — Part 2 II 31 1098
101 Number Sequence — Part 7 I 30 100
102 An 'unhearable' message I 30 100
103 New Year's Greetings — Part 1 I 30 100
104 Weakened Granit — Part 1 I 30 100
105 Double Column Transposition — Part 4 II 29 1119
106 RSA Factoring Challenge: RSA-704 II 28 0
107 Keyshanc — Part 2 II 28 1102
108 Double Column Transposition — Part 2 II 28 1118
109 M-138 — Part 3 II 26 1128
110 CMEA 1 II 26 1095
111 New Year's Greetings — Part 2 I 26 100
112 Not-so-Secret Message from Malawi — Part II (ECC) II 26 1094
113 New Year's Greetings — Part 3 I 25 100
114 Double Column Transposition — Part 3 II 25 1118
115 Pigpen with a twist — Part 3 II 25 1098
116 New Year's Greetings — Part 4 I 24 100
117 ORYX Stream Cipher — Part 3 (revised) II 23 1109
118 Heartbleed — Part 3 II 22 1123
119 Kaskade-S/T — Part 3 II 22 1096
120 RSA Factoring Challenge: RSA-210 II 21 0
121 Monoalphabetic Substitution with Camouflage — Part 5 II 19 1101
122 Typex — Part 1 II 18 1107
123 CMEA 2 III 18 13294
124 Double Column Transposition — Part 1 II 18 1117
125 Lattice Part 1 II 18 1096
126 Spanish Strip Cipher — Part 1 II 17 1117
127 Typex — Part 2 II 16 1108
128 RSA with Special d III 16 13284
129 Concealed Messages — Vigenère's Night Sky X 14 var
130 Spanish Strip Cipher — Part 2 II 14 1117
131 Purple 1 II 12 1094
132 New Year's Greetings — Part 5 II 11 1166
133 Sigaba Part 1 II 10 1094
134 Cascading Encryption — Part 2/3 II 10 1108
135 Cascading Encryption — Part 3/3 II 10 1108
136 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 10 1189
137 Flawed Usage of a OTP Cipher by the BND II 9 1142
138 Weakened Handycipher — Part 3 II 8 1135
139 Weakened Handycipher — Part 1 II 8 1135
140 Kaskade-S/T — Part 5 II 8 1096
141 ORYX Stream Cipher — Part 4a II 8 1118
142 Weakened Handycipher — Part 2 II 7 1135
143 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1096
144 M-138 — Part 4 II 7 1128
145 Akelarre Part 1 II 7 1094
146 Double Column Transposition — Part 5 II 5 1120
147 Notes of an Italian Soldier X 4 var
148 RSA Factoring Challenge: RSA-220 II 3 0
149 Handycipher — Part 3 III 3 13864
150 Handycipher — Part 2 II 3 1131
151 Double Column Transposition X 2 var
152 Spirale — Part 1 II 2 1142
153 Spirale — Part 3 II 2 1142
154 Spirale — Part 2 II 2 1142
155 Unknown Author X 2 var
156 Handycipher — Part 6 III 2 14582
157 Handycipher — Part 5 III 2 14582
158 Weakened Handycipher — Part 6 II 2 1186
159 Sigaba Part 2 III 2 13284
160 Weakened Handycipher — Part 5 II 2 1186
161 Weakened Handycipher — Part 4 II 2 1186
162 Handycipher — Part 1 II 2 1131
163 ORYX Stream Cipher — Part 4b III 1 13665
164 Handycipher — Part 4 III 1 14582
165 Substitution Cipher with Non-Prefix Codes III 1 13333
166 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1103
167 Beale Ciphers X 1 var
168 Extended Handycipher — Part 3 II 1 1133
169 Extended Handycipher — Part 2 II 1 1133
170 Extended Handycipher — Part 1 II 1 1133
171 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1189
172 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1189
173 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1189
174 Extended Handycipher — Part 6 III 0 14582
175 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1189
176 Weakened Granit — Part 3 II 0 1145
177 Double-Column Transposition/Granit — Part 2 II 0 1138
178 Double-Column Transposition/Granit — Part 1 II 0 1138
179 Double-Column Transposition/Granit — Part 3 II 0 1138
180 Spirale — Part 4 II 0 1142
181 Extended Handycipher — Part 4 III 0 14582
182 Weakened Granit — Part 2 II 0 1145
183 Extended Handycipher — Part 5 III 0 14582
184 RSA Factoring Challenge: RSA-470 III 0 13389
185 RSA Factoring Challenge: RSA-896 III 0 13389
186 RSA Factoring Challenge: RSA-280 III 0 13389
187 RSA Factoring Challenge: RSA-270 III 0 13389
188 RSA Factoring Challenge: RSA-260 III 0 13389
189 RSA Factoring Challenge: RSA-250 III 0 13389
190 RSA Factoring Challenge: RSA-290 III 0 13389
191 RSA Factoring Challenge: RSA-300 III 0 13389
192 RSA Factoring Challenge: RSA-320 III 0 13389
193 RSA Factoring Challenge: RSA-310 III 0 13389
194 RSA Factoring Challenge: RSA-1024 III 0 13389
195 RSA Factoring Challenge: RSA-309 III 0 13389
196 RSA Factoring Challenge: RSA-240 III 0 13389
197 RSA Factoring Challenge: RSA-232 III 0 13389
198 World Record Challenge: Break 65 Bits of AES III 0 13284
199 Kryptos X 0 var
200 Dorabella X 0 var
201 D'Agapeyeff X 0 var
202 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13302
203 Twelve-Year-Old Murder Case X 0 var
204 RSA Factoring Challenge: RSA-230 II 0 1100
205 The third ENIGMA M4 message X 0 var
206 Digital Signatures: DSA with Medium Fields III 0 13351
207 Kaskade-S/T — Part 4 II 0 1096
208 RSA Factoring Challenge: RSA-330 III 0 13389
209 RSA Factoring Challenge: RSA-340 III 0 13389
210 RSA Factoring Challenge: RSA-500 III 0 13389
211 RSA Factoring Challenge: RSA-617 III 0 13389
212 RSA Factoring Challenge: RSA-490 III 0 13389
213 RSA Factoring Challenge: RSA-480 III 0 13389
214 RSA Factoring Challenge: RSA-1536 III 0 13389
215 RSA Factoring Challenge: RSA-2048 III 0 13389
216 ORYX Stream Cipher — Part 4d III 0 13541
217 Spanish Strip Cipher — Part 3 X 0 var
218 Double Column Transposition Reloaded — Part 3 III 0 13608
219 Double Column Transposition Reloaded — Part 2 III 0 13608
220 Double Column Transposition Reloaded — Part 1 III 0 13608
221 RSA Factoring Challenge: RSA-460 III 0 13389
222 RSA Factoring Challenge: RSA-450 III 0 13389
223 RSA Factoring Challenge: RSA-380 III 0 13389
224 RSA Factoring Challenge: RSA-370 III 0 13389
225 RSA Factoring Challenge: RSA-360 III 0 13389
226 RSA Factoring Challenge: RSA-350 III 0 13389
227 RSA Factoring Challenge: RSA-390 III 0 13389
228 RSA Factoring Challenge: RSA-400 III 0 13389
229 RSA Factoring Challenge: RSA-440 III 0 13389
230 RSA Factoring Challenge: RSA-430 III 0 13389
231 RSA Factoring Challenge: RSA-420 III 0 13389
232 RSA Factoring Challenge: RSA-410 III 0 13389
233 ORYX Stream Cipher — Part 4c III 0 13665
 
 
powered by the CrypTool project  CrypTool

 

   +++    [22:28 - 20.01.2017] trimic solved the Level I challenge 'Number Sequence'    +++    [22:22 - 20.01.2017] trimic solved the Level I challenge 'Number Sequence — Part 4'    +++    [22:05 - 20.01.2017] trimic solved the Level I challenge 'Number Sequence — Part 3'    +++    [21:49 - 20.01.2017] trimic solved the Level I challenge 'Number Sequence — Part 2'    +++    [21:08 - 20.01.2017] trimic solved the Level I challenge 'Original Caesar Cipher'    +++