MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9014
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3284 100
2 Original Caesar Cipher I 2193 100
3 Number Sequence — Part 2 I 1541 100
4 Caesar Encryption I 1095 100
5 Beaver Code I 852 100
6 Letter to the Templars — Part 1 I 758 100
7 Number Sequence — Part 3 I 712 100
8 Letter to the Templars — Part 2 I 601 100
9 Number Sequence — Part 4 I 569 100
10 A hidden word I 554 100
11 Letter to the Templars — Part 3 II 492 1095
12 Monoalphabetic Substitution I 456 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 423 100
14 Factorization Cipher — Part 1 I 378 100
15 Grille Cipher I 351 100
16 Cracking SHA1-Hashed Passwords II 349 1089
17 Homophonic Encryption Part 1 I 323 100
18 Homophonic Encryption Part 2 I 277 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 234 100
21 Alice's Birthday Party (Part 1) II 219 1088
22 Alice's Birthday Party (Part 2) II 210 1088
23 Advent-Challenge — Part 1 I 207 100
24 From Russia with Love I 205 100
25 Number Sequence — Part 8 I 199 100
26 How do you become a big cryptographer? I 172 100
27 Broadcasting and low exponent — RSA-Attack II 169 1090
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 163 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 148 1088
32 Classical Ciphers^3 I 144 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 142 1088
34 M-138 — Part 1 I 142 100
35 Enigma Messages with Repeated Letters — Part 1 I 140 100
36 Hybrid Encryption I II 128 1088
37 Nils away on travel I 126 100
38 Pigpen with a twist — Part 1 I 123 100
39 RSA: Two different keys — same ciphertext II 122 1091
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 117 100
42 Factorization Cipher — Part 2 II 114 1092
43 Enigma Part 1 II 113 1088
44 Molehunt (Part 2/3) I 113 100
45 A Secret Message from Castle Mansfeld I 110 100
46 ¿No Hablas Español? No problemo! I 108 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 100 1091
49 ADFGVX — Part 2 I 97 100
50 Kaskade-S/T — Part 1 I 91 100
51 ADFGVX — Part 1 I 89 100
52 Enigma Combinatorics I 87 100
53 Playfair Encryption I 86 100
54 Heartbleed — Part 1 I 85 100
55 Image Noise I 84 100
56 M-138 — Part 2 II 84 1108
57 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
58 Number Sequence — Part 6 I 83 100
59 Double Columnar Transposition I 83 100
60 Playfair with hints about the grid I 81 100
61 ECDH-Key Exchange for Beginners I 77 100
62 ORYX Stream Cipher Part I II 73 1088
63 The Last Note I 73 100
64 Zodiac Cipher I 72 100
65 Enigma Part 2 II 71 1088
66 Factorization Cipher — Part 3 II 71 1092
67 A hidden word — Part 2 I 70 100
68 Partial Key Exposure with RSA — Part 1 II 65 1092
69 Molehunt (Part 3/3) II 65 1088
70 Enigma Messages with Repeated Letters — Part 3 I 64 100
71 Hill Cipher with Sudoku Key I 63 100
72 Enigma Messages with Repeated Letters — Part 2 I 63 100
73 Number Sequence — Part 5 I 62 100
74 BCR code (Book-Caesar-RSA) II 61 1095
75 Enigma Messages I 60 100
76 Enigma Messages with Repeated Letters — Part 5 I 59 100
77 Cascading Encryption — Part 1/3 I 59 100
78 Smartcard RSA II 59 1088
79 Multilingual Monoalphabetic Substitution I 58 100
80 AES key — encoded in the machine readable zone of a European ePassport II 56 1092
81 Heartbleed — Part 2 I 56 100
82 Turing Bombe Enigma I I 56 100
83 Enigma Messages with Repeated Letters — Part 4 I 55 100
84 Recycled One-Time Pad I 50 100
85 Unusual encryption using a diophantine equation II 49 1091
86 Monoalphabetic substitution with camouflage — Part 1 I 48 100
87 An Invisible Message I 48 100
88 Number Sequence — Part 10 I 47 101
89 Kaskade-S/T — Part 2 II 45 1089
90 Number Sequence — Part 9 I 44 100
91 Number Sequence — Part 7 I 43 100
92 Keyshanc — Part 1 II 41 1093
93 ORYX Stream Cipher Part II II 41 1088
94 New Year's Greetings — Part 1 I 40 100
95 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
96 News from Castle Mansfeld I 38 100
97 Strange Message from Thessaloniki I 38 100
98 Monoalphabetic substitution with camouflage — Part 4 I 38 100
99 Monoalphabetic substitution with camouflage — Part 2 II 38 1092
100 Unconcealed RSA messages II 37 1091
101 M-138 — Part 3 II 36 1108
102 Music Code — Part 1 I 36 100
103 New Year's Greetings — Part 2 I 36 100
104 Music Code — Part 2 II 36 1090
105 The Einstein Enigma II 35 1175
106 Weakened Granit — Part 1 I 35 100
107 Monoalphabetic substitution with camouflage — Part 3 II 35 1092
108 Pigpen with a twist — Part 2 II 34 1091
109 Double Column Transposition — Part 4 II 34 1103
110 New Year's Greetings — Part 3 I 34 100
111 CMEA 1 II 34 1088
112 An 'unhearable' message I 34 100
113 Ku Klux Klan X 34 var
114 Autokey Cipher I 33 104
115 New Year's Greetings — Part 4 I 33 100
116 RSA Factoring Challenge: RSA-704 II 33 0
117 Double Column Transposition — Part 2 II 33 1103
118 Keyshanc — Part 2 II 32 1093
119 Pigpen with a twist — Part 3 II 31 1091
120 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
121 Double Column Transposition — Part 3 II 29 1103
122 Kaskade-S/T — Part 3 II 28 1089
123 Heartbleed — Part 3 II 28 1105
124 Advent-Challenge — Part 2 II 27 1165
125 ORYX Stream Cipher — Part 3 (revised) II 26 1098
126 RSA Factoring Challenge: RSA-210 II 25 0
127 Advent Challenge — Part 4 II 24 1166
128 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1093
129 CMEA 2 III 22 13186
130 Lattice Part 1 II 22 1089
131 Summer Job II 22 1213
132 Double Column Transposition — Part 1 II 21 1103
133 Advent Challenge — Part 3 II 21 1166
134 Typex — Part 1 II 20 1097
135 Trendy Messenger II 19 1213
136 Spanish Strip Cipher — Part 1 II 19 1103
137 RSA with Special d III 19 13179
138 Typex — Part 2 II 18 1097
139 Fastest in the West II 18 1213
140 Spanish Strip Cipher — Part 2 II 17 1103
141 Concealed Messages — Vigenère's Night Sky X 16 var
142 Modular Sequences I 14 104
143 Purple 1 II 14 1088
144 M-138 — Part 4 II 14 1108
145 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1124
146 AES ECB Wrong Encoding II 13 1165
147 Sigaba Part 1 II 12 1088
148 New Year's Greetings — Part 5 II 12 1120
149 Flawed Usage of a OTP Cipher by the BND II 12 1114
150 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1089
151 RSA Factoring Challenge: RSA-220 II 11 0
152 Weakened Handycipher — Part 1 II 10 1111
153 Weakened Handycipher — Part 3 II 10 1111
154 ORYX Stream Cipher — Part 4a II 10 1103
155 Cascading Encryption — Part 2/3 II 10 1097
156 Cascading Encryption — Part 3/3 II 10 1097
157 Kaskade-S/T — Part 5 II 9 1090
158 Weakened Handycipher — Part 2 II 9 1111
159 Akelarre Part 1 II 8 1088
160 Breaking a Filter Generator II 8 1357
161 Handycipher — Part 2 II 5 1109
162 Handycipher — Part 3 III 5 13533
163 Hilly — Part 1 II 5 1134
164 Double Column Transposition — Part 5 II 5 1104
165 Handycipher — Part 6 III 4 13758
166 Weakened Handycipher — Part 4 II 4 1124
167 Weakened Handycipher — Part 5 II 4 1124
168 Handycipher — Part 1 II 4 1109
169 Weakened Handycipher — Part 6 II 4 1124
170 Notes of an Italian Soldier X 4 var
171 Handycipher — Part 5 III 4 13758
172 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1146
173 Sigaba Part 2 III 3 13179
174 Spirale — Part 3 II 3 1114
175 The Vatikan Challenge — Part 2 X 3 var
176 The Vatican Challenge — Part 1 X 3 var
177 Holographic Encryption — Part 1 II 3 1139
178 Spirale — Part 1 II 3 1114
179 Spirale — Part 2 II 3 1114
180 Handycipher — Part 4 III 3 13758
181 Extended Handycipher — Part 3 II 2 1110
182 Extended Handycipher — Part 4 III 2 13758
183 Extended Handycipher — Part 5 III 2 13758
184 Extended Handycipher — Part 1 II 2 1110
185 Extended Handycipher — Part 2 II 2 1110
186 Handycipher — Part 8 III 2 13907
187 Holographic Encryption — Part 2 II 2 1139
188 Unknown Author X 2 var
189 Weakened ElsieFour — Part 1 II 2 1195
190 Double Column Transposition X 2 var
191 Handycipher — Part 9 III 2 13907
192 Weakened ElsieFour — Part 3 II 2 1155
193 ORYX Stream Cipher — Part 4b III 2 13431
194 Substitution Cipher with Non-Prefix Codes III 1 13215
195 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1094
196 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1124
197 Handycipher — Part 7 III 1 13907
198 Beale Ciphers X 1 var
199 ElsieFour — Part 1 III 1 14196
200 Extended Handycipher — Part 6 III 1 13758
201 Kaskade-S/T — Part 4 II 0 1090
202 Twelve-Year-Old Murder Case X 0 var
203 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13192
204 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1124
205 Kryptos X 0 var
206 Dorabella X 0 var
207 D'Agapeyeff X 0 var
208 Weakened ElsieFour — Part 2 II 0 1195
209 World Record Challenge: Break 65 Bits of AES III 0 13179
210 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1124
211 Hilly — Part 2 II 0 1157
212 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1124
213 Double-Column Transposition/Granit — Part 1 II 0 1112
214 RSA Factoring Challenge: RSA-390 III 0 13255
215 RSA Factoring Challenge: RSA-380 III 0 13255
216 RSA Factoring Challenge: RSA-400 III 0 13255
217 RSA Factoring Challenge: RSA-410 III 0 13255
218 RSA Factoring Challenge: RSA-420 III 0 13255
219 RSA Factoring Challenge: RSA-370 III 0 13255
220 Double Column Transposition Reloaded — Part 1 III 0 13398
221 RSA Factoring Challenge: RSA-350 III 0 13255
222 RSA Factoring Challenge: RSA-360 III 0 13255
223 Double Column Transposition Reloaded — Part 3 III 0 13398
224 Double Column Transposition Reloaded — Part 2 III 0 13398
225 RSA Factoring Challenge: RSA-430 III 0 13255
226 ORYX Stream Cipher — Part 4d III 0 13357
227 RSA Factoring Challenge: RSA-490 III 0 13255
228 RSA Factoring Challenge: RSA-500 III 0 13255
229 RSA Factoring Challenge: RSA-617 III 0 13255
230 RSA Factoring Challenge: RSA-2048 III 0 13255
231 RSA Factoring Challenge: RSA-480 III 0 13255
232 RSA Factoring Challenge: RSA-470 III 0 13255
233 RSA Factoring Challenge: RSA-440 III 0 13255
234 RSA Factoring Challenge: RSA-450 III 0 13255
235 RSA Factoring Challenge: RSA-460 III 0 13255
236 RSA Factoring Challenge: RSA-1536 III 0 13255
237 RSA Factoring Challenge: RSA-340 III 0 13255
238 RSA Factoring Challenge: RSA-330 III 0 13255
239 RSA Factoring Challenge: RSA-230 II 0 0
240 RSA Factoring Challenge: RSA-232 III 0 13255
241 RSA Factoring Challenge: RSA-240 III 0 13255
242 RSA Factoring Challenge: RSA-250 III 0 13255
243 Double-Column Transposition/Granit — Part 2 II 0 1112
244 Double-Column Transposition/Granit — Part 3 II 0 1112
245 Weakened Granit — Part 2 II 0 1114
246 Digital Signatures: DSA with Medium Fields III 0 13228
247 The third ENIGMA M4 message X 0 var
248 Spirale — Part 4 III 0 13601
249 RSA Factoring Challenge: RSA-260 III 0 13255
250 RSA Factoring Challenge: RSA-270 III 0 13255
251 ORYX Stream Cipher — Part 4c III 0 13431
252 RSA Factoring Challenge: RSA-310 III 0 13255
253 Spanish Strip Cipher — Part 3 X 0 var
254 RSA Factoring Challenge: RSA-320 III 0 13255
255 RSA Factoring Challenge: RSA-1024 III 0 13255
256 RSA Factoring Challenge: RSA-309 III 0 13255
257 RSA Factoring Challenge: RSA-896 III 0 13255
258 RSA Factoring Challenge: RSA-280 III 0 13255
259 RSA Factoring Challenge: RSA-290 III 0 13255
260 RSA Factoring Challenge: RSA-300 III 0 13255
261 Weakened Granit — Part 3 II 0 1114
 
 
powered by the CrypTool project  CrypTool

 

   +++    [10:17 - 20.10.2018] roland solved the Level I challenge 'Autokey Cipher'    +++    [16:21 - 19.10.2018] Cl3v3r solved the Level I challenge 'A hidden word'    +++    [14:27 - 19.10.2018] Wolvitor solved the Level I challenge 'Letter to the Templars — Part 1'    +++    [13:46 - 19.10.2018] Wolvitor solved the Level I challenge 'Beaver Code'    +++    [01:15 - 19.10.2018] CrolCCrol solved the Level I challenge 'Number Sequence — Part 2'    +++