MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8850
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3221 100
2 Original Caesar Cipher I 2141 100
3 Number Sequence — Part 2 I 1508 100
4 Caesar Encryption I 1078 100
5 Beaver Code I 832 100
6 Letter to the Templars — Part 1 I 743 100
7 Number Sequence — Part 3 I 697 100
8 Letter to the Templars — Part 2 I 592 100
9 Number Sequence — Part 4 I 555 100
10 A hidden word I 544 100
11 Letter to the Templars — Part 3 II 484 1096
12 Monoalphabetic Substitution I 455 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 417 100
14 Factorization Cipher — Part 1 I 374 100
15 Grille Cipher I 346 100
16 Cracking SHA1-Hashed Passwords II 343 1090
17 Homophonic Encryption Part 1 I 321 100
18 Homophonic Encryption Part 2 I 275 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 231 100
21 Alice's Birthday Party (Part 1) II 217 1088
22 Alice's Birthday Party (Part 2) II 208 1088
23 From Russia with Love I 202 100
24 Number Sequence — Part 8 I 196 100
25 Advent-Challenge — Part 1 I 184 100
26 How do you become a big cryptographer? I 171 100
27 Broadcasting and low exponent — RSA-Attack II 169 1091
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 162 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 148 1088
32 Classical Ciphers^3 I 144 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 141 1088
34 M-138 — Part 1 I 141 100
35 Enigma Messages with Repeated Letters — Part 1 I 139 100
36 Hybrid Encryption I II 126 1089
37 Nils away on travel I 125 100
38 Pigpen with a twist — Part 1 I 123 100
39 RSA: Two different keys — same ciphertext II 120 1091
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 115 100
42 Enigma Part 1 II 112 1088
43 Factorization Cipher — Part 2 II 112 1092
44 Molehunt (Part 2/3) I 111 100
45 A Secret Message from Castle Mansfeld I 109 100
46 ¿No Hablas Español? No problemo! I 107 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 97 1091
49 ADFGVX — Part 2 I 95 100
50 Kaskade-S/T — Part 1 I 90 100
51 Enigma Combinatorics I 87 100
52 ADFGVX — Part 1 I 87 100
53 Heartbleed — Part 1 I 85 100
54 Playfair Encryption I 85 100
55 Double Columnar Transposition I 83 100
56 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
57 M-138 — Part 2 II 83 1109
58 Number Sequence — Part 6 I 82 100
59 Image Noise I 81 100
60 Playfair with hints about the grid I 79 100
61 ECDH-Key Exchange for Beginners I 77 100
62 The Last Note I 73 100
63 ORYX Stream Cipher Part I II 72 1088
64 Factorization Cipher — Part 3 II 70 1093
65 A hidden word — Part 2 I 70 100
66 Enigma Part 2 II 70 1088
67 Zodiac Cipher I 70 100
68 Partial Key Exposure with RSA — Part 1 II 64 1093
69 Hill Cipher with Sudoku Key I 63 100
70 Enigma Messages with Repeated Letters — Part 3 I 63 100
71 Molehunt (Part 3/3) II 63 1089
72 Enigma Messages with Repeated Letters — Part 2 I 62 100
73 Number Sequence — Part 5 I 61 100
74 BCR code (Book-Caesar-RSA) II 60 1095
75 Smartcard RSA II 59 1089
76 Enigma Messages I 59 100
77 Multilingual Monoalphabetic Substitution I 58 100
78 Enigma Messages with Repeated Letters — Part 5 I 58 100
79 Cascading Encryption — Part 1/3 I 58 100
80 Heartbleed — Part 2 I 56 100
81 Turing Bombe Enigma I I 55 100
82 Enigma Messages with Repeated Letters — Part 4 I 54 100
83 AES key — encoded in the machine readable zone of a European ePassport II 53 1093
84 Recycled One-Time Pad I 50 100
85 An Invisible Message I 48 100
86 Unusual encryption using a diophantine equation II 48 1091
87 Monoalphabetic substitution with camouflage — Part 1 I 47 100
88 Kaskade-S/T — Part 2 II 44 1090
89 Number Sequence — Part 9 I 43 100
90 Number Sequence — Part 7 I 42 100
91 ORYX Stream Cipher Part II II 40 1088
92 Keyshanc — Part 1 II 40 1094
93 New Year's Greetings — Part 1 I 39 100
94 News from Castle Mansfeld I 38 100
95 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
96 Strange Message from Thessaloniki I 38 100
97 Number Sequence — Part 10 I 38 101
98 Monoalphabetic substitution with camouflage — Part 2 II 37 1092
99 Unconcealed RSA messages II 37 1092
100 Monoalphabetic substitution with camouflage — Part 4 I 37 100
101 Music Code — Part 1 I 36 100
102 Music Code — Part 2 II 36 1090
103 M-138 — Part 3 II 35 1109
104 New Year's Greetings — Part 2 I 35 100
105 Monoalphabetic substitution with camouflage — Part 3 II 35 1092
106 Weakened Granit — Part 1 I 35 100
107 Pigpen with a twist — Part 2 II 34 1091
108 An 'unhearable' message I 34 100
109 New Year's Greetings — Part 3 I 34 100
110 Ku Klux Klan X 34 var
111 RSA Factoring Challenge: RSA-704 II 33 0
112 Double Column Transposition — Part 2 II 33 1104
113 CMEA 1 II 33 1089
114 Double Column Transposition — Part 4 II 33 1105
115 New Year's Greetings — Part 4 I 33 100
116 Keyshanc — Part 2 II 32 1094
117 The Einstein Enigma II 32 1190
118 Pigpen with a twist — Part 3 II 31 1091
119 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
120 Double Column Transposition — Part 3 II 29 1104
121 Heartbleed — Part 3 II 28 1107
122 Kaskade-S/T — Part 3 II 28 1090
123 ORYX Stream Cipher — Part 3 (revised) II 26 1099
124 Advent-Challenge — Part 2 II 25 1177
125 RSA Factoring Challenge: RSA-210 II 25 0
126 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1093
127 Advent Challenge — Part 4 II 22 1178
128 Lattice Part 1 II 22 1090
129 CMEA 2 III 21 13196
130 Summer Job II 20 1262
131 Double Column Transposition — Part 1 II 20 1104
132 Typex — Part 1 II 20 1098
133 Advent Challenge — Part 3 II 20 1178
134 Spanish Strip Cipher — Part 1 II 19 1104
135 RSA with Special d III 19 13188
136 Trendy Messenger II 18 1262
137 Typex — Part 2 II 17 1098
138 Fastest in the West II 17 1262
139 Spanish Strip Cipher — Part 2 II 17 1104
140 Concealed Messages — Vigenère's Night Sky X 16 var
141 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1127
142 Purple 1 II 14 1089
143 M-138 — Part 4 II 13 1109
144 AES ECB Wrong Encoding II 13 1177
145 Flawed Usage of a OTP Cipher by the BND II 12 1115
146 New Year's Greetings — Part 5 II 12 1123
147 RSA Factoring Challenge: RSA-220 II 11 0
148 Sigaba Part 1 II 11 1088
149 ORYX Stream Cipher — Part 4a II 10 1104
150 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 10 1090
151 Cascading Encryption — Part 3/3 II 10 1098
152 Weakened Handycipher — Part 3 II 10 1113
153 Cascading Encryption — Part 2/3 II 10 1098
154 Weakened Handycipher — Part 1 II 10 1113
155 Kaskade-S/T — Part 5 II 9 1090
156 Weakened Handycipher — Part 2 II 9 1113
157 Akelarre Part 1 II 7 1089
158 Hilly — Part 1 II 5 1139
159 Double Column Transposition — Part 5 II 5 1105
160 Handycipher — Part 3 III 5 13557
161 Handycipher — Part 2 II 5 1111
162 Handycipher — Part 6 III 4 13799
163 Handycipher — Part 5 III 4 13799
164 Handycipher — Part 1 II 4 1111
165 Weakened Handycipher — Part 4 II 4 1127
166 Notes of an Italian Soldier X 4 var
167 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1152
168 Weakened Handycipher — Part 6 II 4 1127
169 Weakened Handycipher — Part 5 II 4 1127
170 The Vatikan Challenge — Part 2 X 3 var
171 Sigaba Part 2 III 3 13188
172 The Vatican Challenge — Part 1 X 3 var
173 Spirale — Part 1 II 3 1115
174 Holographic Encryption — Part 1 II 3 1144
175 Handycipher — Part 4 III 3 13799
176 Spirale — Part 2 II 3 1115
177 Spirale — Part 3 II 3 1115
178 Weakened ElsieFour — Part 3 II 2 1164
179 ORYX Stream Cipher — Part 4b III 2 13449
180 Double Column Transposition X 2 var
181 Extended Handycipher — Part 1 II 2 1111
182 Extended Handycipher — Part 3 II 2 1111
183 Extended Handycipher — Part 2 II 2 1111
184 Holographic Encryption — Part 2 II 2 1144
185 Handycipher — Part 8 III 2 13966
186 Handycipher — Part 9 III 2 13966
187 Extended Handycipher — Part 4 III 2 13799
188 Unknown Author X 2 var
189 Extended Handycipher — Part 5 III 2 13799
190 Handycipher — Part 7 III 1 13966
191 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1095
192 ElsieFour — Part 1 III 1 14308
193 Substitution Cipher with Non-Prefix Codes III 1 13226
194 Beale Ciphers X 1 var
195 Extended Handycipher — Part 6 III 1 13799
196 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1127
197 Weakened ElsieFour — Part 1 II 1 1224
198 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1127
199 Double Column Transposition Reloaded — Part 2 III 0 13414
200 Double Column Transposition Reloaded — Part 3 III 0 13414
201 Double Column Transposition Reloaded — Part 1 III 0 13414
202 RSA Factoring Challenge: RSA-617 III 0 13267
203 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1127
204 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1127
205 Hilly — Part 2 II 0 1166
206 RSA Factoring Challenge: RSA-490 III 0 13267
207 RSA Factoring Challenge: RSA-480 III 0 13267
208 RSA Factoring Challenge: RSA-240 III 0 13267
209 Weakened ElsieFour — Part 2 II 0 1224
210 RSA Factoring Challenge: RSA-230 II 0 1093
211 RSA Factoring Challenge: RSA-232 III 0 13267
212 RSA Factoring Challenge: RSA-250 III 0 13267
213 RSA Factoring Challenge: RSA-260 III 0 13267
214 Twelve-Year-Old Murder Case X 0 var
215 ORYX Stream Cipher — Part 4d III 0 13372
216 RSA Factoring Challenge: RSA-280 III 0 13267
217 RSA Factoring Challenge: RSA-896 III 0 13267
218 RSA Factoring Challenge: RSA-270 III 0 13267
219 Kryptos X 0 var
220 Kaskade-S/T — Part 4 II 0 1090
221 RSA Factoring Challenge: RSA-290 III 0 13267
222 RSA Factoring Challenge: RSA-440 III 0 13267
223 RSA Factoring Challenge: RSA-2048 III 0 13267
224 ORYX Stream Cipher — Part 4c III 0 13449
225 RSA Factoring Challenge: RSA-350 III 0 13267
226 RSA Factoring Challenge: RSA-340 III 0 13267
227 World Record Challenge: Break 65 Bits of AES III 0 13188
228 The third ENIGMA M4 message X 0 var
229 Spanish Strip Cipher — Part 3 X 0 var
230 RSA Factoring Challenge: RSA-360 III 0 13267
231 RSA Factoring Challenge: RSA-370 III 0 13267
232 RSA Factoring Challenge: RSA-400 III 0 13267
233 RSA Factoring Challenge: RSA-430 III 0 13267
234 RSA Factoring Challenge: RSA-410 III 0 13267
235 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13202
236 RSA Factoring Challenge: RSA-390 III 0 13267
237 Dorabella X 0 var
238 RSA Factoring Challenge: RSA-380 III 0 13267
239 Double-Column Transposition/Granit — Part 1 II 0 1114
240 Double-Column Transposition/Granit — Part 2 II 0 1114
241 Digital Signatures: DSA with Medium Fields III 0 13239
242 RSA Factoring Challenge: RSA-310 III 0 13267
243 Weakened Granit — Part 3 II 0 1116
244 RSA Factoring Challenge: RSA-1024 III 0 13267
245 RSA Factoring Challenge: RSA-309 III 0 13267
246 RSA Factoring Challenge: RSA-1536 III 0 13267
247 RSA Factoring Challenge: RSA-420 III 0 13267
248 RSA Factoring Challenge: RSA-300 III 0 13267
249 Weakened Granit — Part 2 II 0 1116
250 RSA Factoring Challenge: RSA-320 III 0 13267
251 RSA Factoring Challenge: RSA-450 III 0 13267
252 D'Agapeyeff X 0 var
253 Double-Column Transposition/Granit — Part 3 II 0 1114
254 RSA Factoring Challenge: RSA-460 III 0 13267
255 RSA Factoring Challenge: RSA-500 III 0 13267
256 RSA Factoring Challenge: RSA-330 III 0 13267
257 Spirale — Part 4 III 0 13629
258 RSA Factoring Challenge: RSA-470 III 0 13267
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:08 - 16.08.2018] fabricio solved the Level I challenge 'Number Sequence — Part 4'    +++    [17:56 - 16.08.2018] leojaardim solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [17:52 - 16.08.2018] leojaardim solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [03:21 - 16.08.2018] Dopamina solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [01:06 - 16.08.2018] ltc solved the Level I challenge 'Advent-Challenge — Part 1'    +++