MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11057
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4109 100
2 Original Caesar Cipher I 2837 100
3 Number Sequence — Part 2 I 2000 100
4 Caesar Encryption I 1351 100
5 Beaver Code I 1117 100
6 Letter to the Templars — Part 1 I 974 100
7 Number Sequence — Part 3 I 938 100
8 Letter to the Templars — Part 2 I 782 100
9 Number Sequence — Part 4 I 776 100
10 A hidden word I 768 100
11 Letter to the Templars — Part 3 II 666 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 549 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 508 1082
15 Factorization Cipher — Part 1 I 473 100
16 Grille Cipher I 454 100
17 Advent-Challenge — Part 1 I 392 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 344 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 297 100
22 Alice's Birthday Party (Part 1) II 279 1081
23 Snow White and the seven dwarfs I 278 100
24 Alice's Birthday Party (Part 2) II 272 1081
25 From Russia with Love I 264 100
26 Modified Caesar Cipher I 218 100
27 Broadcasting and low exponent — RSA Attack II 217 1083
28 How do you become a big cryptographer? I 214 100
29 M-138 — Part 1 I 195 100
30 Reserve Hand Procedure — Part 1 I 186 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 184 1081
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 184 1081
33 Classical Ciphers^3 I 169 100
34 Letter from the Alleged Countess Julie von Ortenburg I 168 100
35 Enigma Messages with Repeated Letters — Part 1 I 161 100
36 Hybrid Encryption I II 159 1081
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 151 1083
39 Pigpen with a twist — Part 1 I 147 100
40 Molehunt (Part 1/3) I 145 100
41 ¿No Hablas Español? No problemo! I 141 100
42 Cryptanalysis Hacking Puzzles — Part 2 I 141 100
43 The Book Code: A Challenge for Bookworms I 141 100
44 Factorization Cipher — Part 2 II 140 1084
45 Molehunt (Part 2/3) I 137 100
46 Number Sequence — Part 6 I 136 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 127 1081
49 M-138 — Part 2 II 122 1093
50 A Secret Message from Castle Mansfeld I 120 100
51 Image Noise I 119 100
52 Trifid Cipher I 116 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 112 1083
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 107 100
57 Playfair with hints about the grid I 105 100
58 Double Columnar Transposition I 103 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 10 I 100 100
61 Enigma Combinatorics I 96 100
62 A hidden word — Part 2 I 96 100
63 Number Sequence — Part 9 I 95 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 94 100
65 Zodiac Cipher I 91 100
66 Heartbleed — Part 1 I 90 100
67 ECDH-Key Exchange for Beginners I 89 100
68 Factorization Cipher — Part 3 II 89 1084
69 Number Sequence — Part 5 I 88 100
70 Enigma Part 2 II 86 1081
71 Hill Cipher with Sudoku Key I 84 100
72 Partial Key Exposure with RSA — Part 1 II 81 1084
73 The Last Note I 81 100
74 Molehunt (Part 3/3) II 80 1081
75 ORYX Stream Cipher Part I II 79 1081
76 Number Sequence — Part 7 I 77 100
77 Enigma Messages with Repeated Letters — Part 2 I 74 100
78 Enigma Messages with Repeated Letters — Part 3 I 74 100
79 Enigma Messages with Repeated Letters — Part 5 I 72 100
80 Enigma Messages I 71 100
81 Smartcard RSA II 71 1081
82 Multilingual Monoalphabetic Substitution I 69 100
83 AES key — encoded in the machine readable zone of a European ePassport II 67 1084
84 Cascading Encryption — Part 1/3 I 67 100
85 BCR code (Book-Caesar-RSA) II 67 1086
86 Turing Bombe Enigma I I 66 100
87 Enigma Messages with Repeated Letters — Part 4 I 66 100
88 Recycled One-Time Pad I 62 100
89 Unusual encryption using a diophantine equation II 62 1083
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 M-138 — Part 3 II 57 1093
93 Modular Sequences I 57 100
94 An Invisible Message I 56 100
95 The Einstein Enigma II 55 1112
96 News from Castle Mansfeld I 51 100
97 RSA Factoring Challenge: RSA-704 II 51 0
98 Kaskade-S/T — Part 2 II 50 1082
99 Unconcealed RSA messages II 49 1084
100 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
101 ORYX Stream Cipher Part II II 47 1081
102 New Year's Greetings — Part 1 I 46 100
103 Monoalphabetic substitution with camouflage — Part 4 I 46 100
104 RSA Factoring Challenge: RSA-210 II 45 0
105 Advent-Challenge — Part 2 II 45 1110
106 Strange Message from Thessaloniki I 45 100
107 Summer Job II 45 1115
108 Keyshanc — Part 1 II 45 1085
109 Double Column Transposition — Part 4 II 44 1091
110 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 44 1082
111 Find the right route — Part 1 I 44 100
112 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
113 Weakened Granit — Part 1 I 43 100
114 New Year's Greetings — Part 2 I 43 100
115 CMEA 1 II 42 1082
116 New Year's Greetings — Part 3 I 41 100
117 Double Column Transposition — Part 2 II 41 1091
118 An 'unhearable' message I 40 100
119 Music Code — Part 1 I 40 100
120 Music Code — Part 2 II 40 1083
121 New Year's Greetings — Part 4 I 39 100
122 Advent Challenge — Part 3 II 38 1111
123 Pigpen with a twist — Part 2 II 38 1083
124 Double Column Transposition — Part 3 II 37 1091
125 Ku Klux Klan X 37 var
126 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1081
127 Advent Challenge — Part 4 II 36 1110
128 Pigpen with a twist — Part 3 II 36 1083
129 Lightweight Introduction to Lattices — Part 1 I 36 100
130 Keyshanc — Part 2 II 35 1085
131 Homophonic Encryption — Part 1 II 35 1127
132 Trendy Messenger II 31 1115
133 Polyhomophonic Substitution — Part 1 I 31 100
134 Kaskade-S/T — Part 3 II 31 1082
135 RSA Factoring Challenge: RSA-220 II 30 0
136 ORYX Stream Cipher — Part 3 (revised) II 30 1088
137 Spanish Strip Cipher — Part 1 II 30 1090
138 Wheatstone Cryptograph — Part 1 I 30 102
139 Homophonic Encryption — Part 2 II 30 1127
140 Fastest in the West II 30 1115
141 Heartbleed — Part 3 II 30 1092
142 Homophonic Encryption — Part 3 II 29 1127
143 Double Column Transposition — Part 1 II 29 1091
144 Lattice Part 1 II 28 1082
145 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1085
146 Monoalphabetic Substitution with Nostradamus Flavor II 28 1124
147 Homophonic Encryption — Part 4 II 28 1127
148 RSA Factoring Challenge: RSA-230 II 27 0
149 CMEA 2 III 27 13067
150 Spanish Strip Cipher — Part 2 II 26 1090
151 Lightweight Introduction to Lattices — Part 2 I 26 100
152 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
153 M-138 — Part 4 II 25 1093
154 Typex — Part 1 II 25 1087
155 Lightweight Introduction to Lattices — Part 3 II 24 1161
156 RSA with Special d III 23 13062
157 Handycipher made in love — Part 1 II 22 1124
158 Typex — Part 2 II 22 1087
159 Polyphonic Substitution Cipher — Part 1 II 20 1138
160 Find the right route — Part 2 I 20 101
161 AES ECB Wrong Encoding II 20 1110
162 Polyhomophonic Substitution — Part 2 II 19 1148
163 Breaking a Filter Generator II 19 1118
164 The LoRa Cipher: Logic Randomness — Part 1 II 19 1145
165 Purple 1 II 18 1081
166 Handycipher made in love — Part 2 II 17 1128
167 Polyphonic Substitution Cipher — Part 2 II 17 1142
168 Concealed Messages — Vigenère's Night Sky X 16 var
169 RSA Factoring Challenge: RSA-240 III 16 0
170 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1100
171 Sigaba Part 1 II 16 1081
172 Find the right route — Part 3 I 16 101
173 New Year's Greetings — Part 5 II 15 1099
174 Cipher ID — Part 1 II 15 1138
175 A Cloaked Substitution Cipher — Part 1 II 15 1132
176 Weakened Handycipher — Part 1 II 15 1095
177 The T52 Sturgeon Challenge — Part 1 II 15 1130
178 RSA Factoring Challenge: RSA-250 III 14 0
179 A Cloaked Substitution Cipher — Part 2 II 14 1133
180 Flawed Usage of a OTP Cipher by the BND II 14 1096
181 Cascading Encryption — Part 2/3 II 14 1087
182 Weakened Handycipher — Part 3 II 14 1095
183 Polyhomophonic Substitution — Part 3 II 14 1149
184 RSA Factoring Challenge: RSA-232 III 13 0
185 Weakened Handycipher — Part 2 II 13 1095
186 The T52 Sturgeon Challenge — Part 2 II 13 1131
187 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
188 Cascading Encryption — Part 3/3 II 12 1087
189 The T52 Sturgeon Challenge — Part 3 II 11 1131
190 ORYX Stream Cipher — Part 4a II 11 1091
191 Akelarre Part 1 II 10 1082
192 Kaskade-S/T — Part 5 II 10 1083
193 The T52 Sturgeon Challenge — Part 4 II 9 1131
194 Hilly — Part 1 II 9 1104
195 The SZ42 Challenge — Part 1 II 9 1162
196 The SZ42 Challenge — Part 2 II 9 1164
197 Double Column Transposition — Part 5 II 8 1091
198 The SIGABA Challenge — Part 2 II 8 1146
199 The SIGABA Challenge — Part 1 II 8 1146
200 The SZ42 Challenge — Part 3 II 7 1165
201 Handycipher — Part 2 II 7 1094
202 The SZ42 Challenge — Part 4 II 7 1168
203 The T52 Sturgeon Challenge — Part 12 II 6 1132
204 The T52 Sturgeon Challenge — Part 11 II 6 1132
205 The T52 Sturgeon Challenge — Part 8 II 6 1132
206 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1107
207 Holographic Encryption — Part 1 II 6 1105
208 The SZ42 Challenge — Part 5 II 6 1169
209 The SIGABA Challenge — Part 3 III 6 14084
210 Handycipher — Part 3 III 6 13282
211 Weakened Handycipher — Part 4 II 5 1100
212 "The Road" — Part 1 II 5 1121
213 The T52 Sturgeon Challenge — Part 9 II 5 1132
214 Weakened Handycipher — Part 5 II 5 1100
215 Weakened Handycipher — Part 6 II 5 1100
216 The SIGABA Challenge — Part 4 III 5 14091
217 Handycipher — Part 5 III 5 13387
218 The T52 Sturgeon Challenge — Part 10 II 5 1132
219 The T52 Sturgeon Challenge — Part 7 II 5 1132
220 Handycipher — Part 6 III 5 13387
221 The SZ42 Challenge — Part 8 II 5 1180
222 The SZ42 Challenge — Part 6 II 5 1174
223 Spirale — Part 2 II 5 1096
224 Sigaba Part 2 III 5 13062
225 Spirale — Part 1 II 5 1096
226 Handycipher — Part 1 II 5 1094
227 Spirale — Part 3 II 4 1096
228 Handycipher — Part 4 III 4 13387
229 Weakened ElsieFour — Part 1 II 4 1114
230 The SZ42 Challenge — Part 7 II 4 1179
231 The T52 Sturgeon Challenge — Part 5 II 4 1132
232 The T52 Sturgeon Challenge — Part 6 II 4 1132
233 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14129
234 The SZ42 Challenge — Part 9 II 4 1193
235 Notes of an Italian Soldier X 4 var
236 Wheatstone Cryptograph — Part 2 II 3 1344
237 Extended Handycipher — Part 3 II 3 1094
238 The SZ42 Challenge — Part 11 II 3 1209
239 Extended Handycipher — Part 2 II 3 1094
240 Differential Cryptanalysis — Part 2 II 3 1143
241 The SZ42 Challenge — Part 10 II 3 1209
242 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1140
243 Extended Handycipher — Part 1 II 3 1094
244 The Vatican Challenge — Part 2 X 3 var
245 The Vatican Challenge — Part 1 X 3 var
246 Extended Handycipher — Part 4 III 3 13387
247 Handycipher — Part 9 III 3 13442
248 Extended Handycipher — Part 5 III 3 13387
249 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14140
250 Holographic Encryption — Part 2 II 3 1105
251 Handycipher — Part 8 III 3 13442
252 ElsieFour — Part 1 III 3 13523
253 Weakened ElsieFour — Part 3 II 3 1109
254 SIGABA CSP-889 — Part 3 III 2 16705
255 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
256 ORYX Stream Cipher — Part 4b III 2 13226
257 The SIGABA Challenge — Part 5 III 2 14102
258 Extended Handycipher — Part 6 III 2 13387
259 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13938
260 Handycipher — Part 7 III 2 13442
261 SIGABA CSP-889 — Part 2 II 2 1406
262 SIGABA CSP-889 — Part 1 II 2 1406
263 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14137
264 Double Column Transposition X 2 var
265 Unknown Author X 2 var
266 Substitution Cipher with Non-Prefix Codes III 1 13088
267 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1085
268 The Vatican Challenge — Part 4 X 1 var
269 Handycipher — Part 10 II 1 1129
270 The SIGABA Challenge — Part 6 III 1 14116
271 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14138
272 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14150
273 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13915
274 Hilly — Part 2 II 1 1109
275 Beale Ciphers X 1 var
276 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1100
277 RSA Factoring Challenge: RSA-270 III 0 13115
278 RSA Factoring Challenge: RSA-260 III 0 13115
279 RSA Factoring Challenge: RSA-896 III 0 13115
280 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13071
281 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14141
282 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13923
283 RSA Factoring Challenge: RSA-360 III 0 13115
284 Double-Column Transposition/Granit — Part 3 II 0 1095
285 Spirale — Part 4 III 0 13317
286 Double-Column Transposition/Granit — Part 2 II 0 1095
287 Double-Column Transposition/Granit — Part 1 II 0 1095
288 RSA Factoring Challenge: RSA-470 III 0 13115
289 RSA Factoring Challenge: RSA-1536 III 0 13115
290 RSA Factoring Challenge: RSA-460 III 0 13115
291 RSA Factoring Challenge: RSA-440 III 0 13115
292 RSA Factoring Challenge: RSA-430 III 0 13115
293 RSA Factoring Challenge: RSA-450 III 0 13115
294 Weakened Granit — Part 3 II 0 1096
295 Weakened Granit — Part 2 II 0 1096
296 RSA Factoring Challenge: RSA-480 III 0 13115
297 RSA Factoring Challenge: RSA-490 III 0 13115
298 Kaskade-S/T — Part 4 II 0 1083
299 Spanish Strip Cipher — Part 3 X 0 var
300 Double Column Transposition Reloaded — Part 3 III 0 13206
301 Double Column Transposition Reloaded — Part 2 III 0 13206
302 Double Column Transposition Reloaded — Part 1 III 0 13206
303 ORYX Stream Cipher — Part 4c III 0 13226
304 Digital Signatures: DSA with Medium Fields III 0 13096
305 RSA Factoring Challenge: RSA-500 III 0 13115
306 World Record Challenge: Break 65 Bits of AES III 0 13062
307 RSA Factoring Challenge: RSA-617 III 0 13115
308 RSA Factoring Challenge: RSA-2048 III 0 13115
309 The third ENIGMA M4 message X 0 var
310 RSA Factoring Challenge: RSA-420 III 0 13115
311 RSA Factoring Challenge: RSA-410 III 0 13115
312 "The Road" — Part 2 II 0 1121
313 "The Road" — Part 3 II 0 1121
314 RSA Factoring Challenge: RSA-310 III 0 13115
315 Dorabella X 0 var
316 RSA Factoring Challenge: RSA-320 III 0 13115
317 D'Agapeyeff X 0 var
318 RSA Factoring Challenge: RSA-1024 III 0 13115
319 RSA Factoring Challenge: RSA-280 III 0 13115
320 The Vatican Challenge — Part 3 X 0 var
321 RSA Factoring Challenge: RSA-290 III 0 13115
322 RSA Factoring Challenge: RSA-300 III 0 13115
323 RSA Factoring Challenge: RSA-309 III 0 13115
324 RSA Factoring Challenge: RSA-330 III 0 13115
325 RSA Factoring Challenge: RSA-340 III 0 13115
326 RSA Factoring Challenge: RSA-400 III 0 13115
327 Kryptos X 0 var
328 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1100
329 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1100
330 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1100
331 RSA Factoring Challenge: RSA-390 III 0 13115
332 ORYX Stream Cipher — Part 4d III 0 13181
333 Weakened ElsieFour — Part 2 II 0 1114
334 RSA Factoring Challenge: RSA-350 III 0 13115
335 Twelve-Year-Old Murder Case X 0 var
336 RSA Factoring Challenge: RSA-370 III 0 13115
337 RSA Factoring Challenge: RSA-380 III 0 13115
338 The Vatican Challenge — Part 5 X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:13 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [04:01 - 17.06.2021] madness solved the Level II challenge 'Handycipher made in love — Part 1'    +++    [01:02 - 17.06.2021] RogueRamblers solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++    [13:38 - 16.06.2021] E01814058 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [13:37 - 16.06.2021] E01814263 solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++