MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8397
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3042 100
2 Original Caesar Cipher I 1997 100
3 Number Sequence — Part 2 I 1403 100
4 Caesar Encryption I 1015 100
5 Beaver Code I 769 100
6 Letter to the Templars — Part 1 I 688 100
7 Number Sequence — Part 3 I 634 100
8 Letter to the Templars — Part 2 I 552 100
9 Number Sequence — Part 4 I 508 100
10 A hidden word I 493 100
11 Monoalphabetic Substitution I 439 100
12 Letter to the Templars — Part 3 II 434 1099
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 395 100
14 Factorization Cipher — Part 1 I 353 100
15 Grille Cipher I 326 100
16 Cracking SHA1-Hashed Passwords II 313 1092
17 Homophonic Encryption Part 1 I 310 100
18 Homophonic Encryption Part 2 I 265 100
19 One-Time Pad with Flaws I 237 100
20 Snow White and the seven dwarfs I 225 100
21 Alice's Birthday Party (Part 1) II 204 1091
22 Alice's Birthday Party (Part 2) II 195 1091
23 From Russia with Love I 185 100
24 Modified Caesar Cipher I 161 100
25 How do you become a big cryptographer? I 160 100
26 Broadcasting and low exponent — RSA-Attack II 157 1094
27 Reserve Hand Procedure — Part 1 I 155 100
28 Number Sequence — Part 8 I 153 100
29 Letter from the Alleged Countess Julie von Ortenburg I 145 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 140 1091
31 Classical Ciphers^3 I 139 100
32 Enigma Messages with Repeated Letters — Part 1 I 132 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 130 1091
34 M-138 — Part 1 I 125 100
35 Hybrid Encryption I II 120 1091
36 Nils away on travel I 119 100
37 Pigpen with a twist — Part 1 I 117 100
38 RSA: Two different keys — same ciphertext II 115 1094
39 The Book Code: A Challenge for Bookworms I 115 100
40 Enigma Part 1 II 111 1091
41 Factorization Cipher — Part 2 II 108 1095
42 Molehunt (Part 1/3) I 107 100
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 103 100
45 ¿No Hablas Español? No problemo! I 97 100
46 Trifid Cipher I 95 100
47 A really long number sequence II 92 1094
48 ADFGVX — Part 2 I 91 100
49 Kaskade-S/T — Part 1 I 89 100
50 Enigma Combinatorics I 83 100
51 Heartbleed — Part 1 I 82 100
52 ADFGVX — Part 1 I 81 100
53 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 80 100
54 Double Columnar Transposition I 79 100
55 Playfair Encryption I 78 100
56 ECDH-Key Exchange for Beginners I 75 100
57 Playfair with hints about the grid I 75 100
58 M-138 — Part 2 II 74 1116
59 Number Sequence — Part 6 I 73 100
60 ORYX Stream Cipher Part I II 72 1091
61 Enigma Part 2 II 70 1091
62 Zodiac Cipher I 70 100
63 Factorization Cipher — Part 3 II 69 1095
64 Image Noise I 66 100
65 A hidden word — Part 2 I 63 100
66 The Last Note I 63 100
67 Hill Cipher with Sudoku Key I 62 100
68 Enigma Messages with Repeated Letters — Part 2 I 62 100
69 Molehunt (Part 3/3) II 62 1091
70 Enigma Messages with Repeated Letters — Part 3 I 61 100
71 Partial Key Exposure with RSA — Part 1 II 60 1096
72 BCR code (Book-Caesar-RSA) II 58 1099
73 Smartcard RSA II 58 1091
74 Enigma Messages with Repeated Letters — Part 5 I 57 100
75 Enigma Messages I 57 100
76 Number Sequence — Part 5 I 56 100
77 Turing Bombe Enigma I I 55 100
78 Cascading Encryption — Part 1/3 I 54 100
79 Multilingual Monoalphabetic Substitution I 54 100
80 Heartbleed — Part 2 I 53 100
81 Enigma Messages with Repeated Letters — Part 4 I 53 100
82 AES key — encoded in the machine readable zone of a European ePassport II 53 1096
83 Recycled One-Time Pad I 46 100
84 Unusual encryption using a diophantine equation II 46 1094
85 Monoalphabetic substitution with camouflage — Part 1 I 45 100
86 An Invisible Message I 45 100
87 Kaskade-S/T — Part 2 II 44 1092
88 ORYX Stream Cipher Part II II 40 1091
89 Keyshanc — Part 1 II 40 1097
90 Number Sequence — Part 7 I 39 100
91 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1092
92 Monoalphabetic substitution with camouflage — Part 4 I 37 100
93 Strange Message from Thessaloniki I 37 100
94 News from Castle Mansfeld I 36 100
95 Unconcealed RSA messages II 36 1095
96 Monoalphabetic substitution with camouflage — Part 2 II 35 1095
97 Music Code — Part 1 I 35 100
98 Music Code — Part 2 II 35 1093
99 Weakened Granit — Part 1 I 35 100
100 Ku Klux Klan X 34 var
101 Pigpen with a twist — Part 2 II 33 1094
102 CMEA 1 II 33 1091
103 Monoalphabetic substitution with camouflage — Part 3 II 33 1095
104 An 'unhearable' message I 33 100
105 Keyshanc — Part 2 II 32 1097
106 Double Column Transposition — Part 2 II 32 1109
107 New Year's Greetings — Part 1 I 32 100
108 Double Column Transposition — Part 4 II 31 1110
109 M-138 — Part 3 II 31 1116
110 RSA Factoring Challenge: RSA-704 II 31 0
111 Pigpen with a twist — Part 3 II 29 1094
112 Not-so-Secret Message from Malawi — Part II (ECC) II 29 1091
113 Double Column Transposition — Part 3 II 28 1109
114 Heartbleed — Part 3 II 28 1112
115 New Year's Greetings — Part 2 I 28 100
116 Kaskade-S/T — Part 3 II 27 1092
117 New Year's Greetings — Part 3 I 27 100
118 ORYX Stream Cipher — Part 3 (revised) II 26 1103
119 New Year's Greetings — Part 4 I 26 100
120 Advent-Challenge — Part 1 I 23 120
121 RSA Factoring Challenge: RSA-210 II 23 0
122 Monoalphabetic Substitution with Camouflage — Part 5 II 21 1096
123 CMEA 2 III 21 13235
124 Typex — Part 1 II 20 1101
125 Double Column Transposition — Part 1 II 20 1109
126 Spanish Strip Cipher — Part 1 II 19 1109
127 Lattice Part 1 II 18 1092
128 RSA with Special d III 18 13226
129 Typex — Part 2 II 17 1102
130 Spanish Strip Cipher — Part 2 II 17 1109
131 Number Sequence — Part 9 I 17 104
132 Concealed Messages — Vigenère's Night Sky X 15 var
133 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1142
134 Purple 1 II 14 1091
135 New Year's Greetings — Part 5 II 12 1134
136 M-138 — Part 4 II 11 1116
137 Sigaba Part 1 II 11 1091
138 Flawed Usage of a OTP Cipher by the BND II 10 1124
139 Cascading Encryption — Part 3/3 II 10 1102
140 Cascading Encryption — Part 2/3 II 10 1102
141 ORYX Stream Cipher — Part 4a II 10 1109
142 Weakened Handycipher — Part 1 II 9 1120
143 Kaskade-S/T — Part 5 II 9 1093
144 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1092
145 Weakened Handycipher — Part 3 II 9 1120
146 RSA Factoring Challenge: RSA-220 II 8 0
147 Weakened Handycipher — Part 2 II 8 1120
148 Akelarre Part 1 II 7 1091
149 Double Column Transposition — Part 5 II 5 1111
150 Handycipher — Part 3 III 4 13664
151 Notes of an Italian Soldier X 4 var
152 Handycipher — Part 2 II 4 1118
153 Handycipher — Part 5 III 3 14005
154 Handycipher — Part 1 II 3 1118
155 Handycipher — Part 6 III 3 14005
156 Sigaba Part 2 III 3 13226
157 Weakened Handycipher — Part 5 II 3 1141
158 Weakened Handycipher — Part 4 II 3 1141
159 Weakened Handycipher — Part 6 II 3 1141
160 Holographic Encryption — Part 1 II 3 1176
161 Spirale — Part 3 II 3 1124
162 Spirale — Part 2 II 3 1124
163 Spirale — Part 1 II 3 1124
164 ORYX Stream Cipher — Part 4b III 2 13529
165 Extended Handycipher — Part 4 III 2 14005
166 Double Column Transposition X 2 var
167 Extended Handycipher — Part 2 II 2 1118
168 Handycipher — Part 4 III 2 14005
169 Extended Handycipher — Part 3 II 2 1118
170 Extended Handycipher — Part 1 II 2 1118
171 Extended Handycipher — Part 5 III 2 14005
172 Unknown Author X 2 var
173 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 2 1199
174 Holographic Encryption — Part 2 II 2 1176
175 Handycipher — Part 9 III 1 14293
176 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1098
177 Handycipher — Part 8 III 1 14293
178 Hilly — Part 1 II 1 1163
179 Beale Ciphers X 1 var
180 Handycipher — Part 7 III 1 14293
181 Substitution Cipher with Non-Prefix Codes III 1 13268
182 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1142
183 Extended Handycipher — Part 6 III 1 14005
184 RSA Factoring Challenge: RSA-270 III 0 13314
185 Digital Signatures: DSA with Medium Fields III 0 13283
186 Weakened ElsieFour — Part 1 II 0 1255
187 Weakened Granit — Part 2 II 0 1125
188 Hilly — Part 2 II 0 1275
189 Spirale — Part 4 II 0 1124
190 Dorabella X 0 var
191 ElsieFour — Part 1 II 0 1255
192 RSA Factoring Challenge: RSA-250 III 0 13314
193 Kaskade-S/T — Part 4 II 0 1093
194 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1142
195 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1142
196 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1142
197 RSA Factoring Challenge: RSA-230 II 0 1096
198 RSA Factoring Challenge: RSA-232 III 0 13314
199 RSA Factoring Challenge: RSA-260 III 0 13314
200 D'Agapeyeff X 0 var
201 RSA Factoring Challenge: RSA-240 III 0 13314
202 Weakened Granit — Part 3 II 0 1125
203 RSA Factoring Challenge: RSA-2048 III 0 13314
204 RSA Factoring Challenge: RSA-370 III 0 13314
205 RSA Factoring Challenge: RSA-380 III 0 13314
206 Double Column Transposition Reloaded — Part 3 III 0 13487
207 Double Column Transposition Reloaded — Part 2 III 0 13487
208 RSA Factoring Challenge: RSA-360 III 0 13314
209 RSA Factoring Challenge: RSA-350 III 0 13314
210 RSA Factoring Challenge: RSA-1536 III 0 13314
211 RSA Factoring Challenge: RSA-340 III 0 13314
212 Spanish Strip Cipher — Part 3 X 0 var
213 Double Column Transposition Reloaded — Part 1 III 0 13487
214 RSA Factoring Challenge: RSA-390 III 0 13314
215 RSA Factoring Challenge: RSA-420 III 0 13314
216 ORYX Stream Cipher — Part 4d III 0 13436
217 RSA Factoring Challenge: RSA-430 III 0 13314
218 RSA Factoring Challenge: RSA-450 III 0 13314
219 The third ENIGMA M4 message X 0 var
220 RSA Factoring Challenge: RSA-410 III 0 13314
221 World Record Challenge: Break 65 Bits of AES III 0 13226
222 RSA Factoring Challenge: RSA-400 III 0 13314
223 RSA Factoring Challenge: RSA-460 III 0 13314
224 ORYX Stream Cipher — Part 4c III 0 13529
225 RSA Factoring Challenge: RSA-330 III 0 13314
226 RSA Factoring Challenge: RSA-896 III 0 13314
227 Kryptos X 0 var
228 RSA Factoring Challenge: RSA-500 III 0 13314
229 Twelve-Year-Old Murder Case X 0 var
230 RSA Factoring Challenge: RSA-617 III 0 13314
231 RSA Factoring Challenge: RSA-440 III 0 13314
232 Double-Column Transposition/Granit — Part 2 II 0 1122
233 Double-Column Transposition/Granit — Part 1 II 0 1122
234 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13242
235 RSA Factoring Challenge: RSA-490 III 0 13314
236 RSA Factoring Challenge: RSA-280 III 0 13314
237 RSA Factoring Challenge: RSA-470 III 0 13314
238 RSA Factoring Challenge: RSA-310 III 0 13314
239 RSA Factoring Challenge: RSA-320 III 0 13314
240 RSA Factoring Challenge: RSA-1024 III 0 13314
241 RSA Factoring Challenge: RSA-309 III 0 13314
242 RSA Factoring Challenge: RSA-290 III 0 13314
243 RSA Factoring Challenge: RSA-480 III 0 13314
244 RSA Factoring Challenge: RSA-300 III 0 13314
245 Double-Column Transposition/Granit — Part 3 II 0 1122
 
 
powered by the CrypTool project  CrypTool

 

   +++    [20:57 - 12.12.2017] Qiu solved the Level I challenge 'Letter to the Templars — Part 2'    +++    [20:57 - 12.12.2017] Qiu solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [10:06 - 12.12.2017] rbsatish solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [19:45 - 11.12.2017] Qiu solved the Level I challenge 'Letter to the Templars — Part 1'    +++    [17:09 - 11.12.2017] wisch solved the Level I challenge 'Advent-Challenge — Part 1'    +++