MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11193
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4158 100
2 Original Caesar Cipher I 2876 100
3 Number Sequence — Part 2 I 2032 100
4 Caesar Encryption I 1369 100
5 Beaver Code I 1136 100
6 Letter to the Templars — Part 1 I 991 100
7 Number Sequence — Part 3 I 951 100
8 Letter to the Templars — Part 2 I 796 100
9 Number Sequence — Part 4 I 785 100
10 A hidden word I 783 100
11 Letter to the Templars — Part 3 II 685 1085
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 557 100
13 Monoalphabetic Substitution I 531 100
14 Cracking SHA1-Hashed Passwords II 515 1082
15 Factorization Cipher — Part 1 I 479 100
16 Grille Cipher I 459 100
17 Advent-Challenge — Part 1 I 397 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 351 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 299 100
22 Alice's Birthday Party (Part 1) II 286 1081
23 Alice's Birthday Party (Part 2) II 280 1081
24 Snow White and the seven dwarfs I 279 100
25 From Russia with Love I 265 100
26 Broadcasting and low exponent — RSA Attack II 222 1082
27 Modified Caesar Cipher I 219 100
28 How do you become a big cryptographer? I 215 100
29 M-138 — Part 1 I 200 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 191 1081
31 Not-so-Secret Message from Malawi — Part I (RSA) II 188 1081
32 Reserve Hand Procedure — Part 1 I 186 100
33 Classical Ciphers^3 I 169 100
34 Letter from the Alleged Countess Julie von Ortenburg I 168 100
35 Hybrid Encryption I II 165 1081
36 Enigma Messages with Repeated Letters — Part 1 I 164 100
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 152 1083
39 Pigpen with a twist — Part 1 I 148 100
40 Cryptanalysis Hacking Puzzles — Part 2 I 148 100
41 Molehunt (Part 1/3) I 146 100
42 Factorization Cipher — Part 2 II 144 1083
43 ¿No Hablas Español? No problemo! I 143 100
44 Number Sequence — Part 6 I 143 100
45 The Book Code: A Challenge for Bookworms I 141 100
46 Molehunt (Part 2/3) I 138 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 128 1081
49 M-138 — Part 2 II 125 1092
50 Image Noise I 120 100
51 A Secret Message from Castle Mansfeld I 120 100
52 Trifid Cipher I 116 100
53 A really long number sequence II 114 1083
54 ADFGVX — Part 2 I 114 100
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 107 100
57 Double Columnar Transposition I 105 100
58 Playfair with hints about the grid I 105 100
59 Number Sequence — Part 9 I 104 100
60 Kaskade-S/T — Part 1 I 102 100
61 Number Sequence — Part 10 I 100 100
62 Enigma Combinatorics I 98 100
63 A hidden word — Part 2 I 97 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 95 100
65 Zodiac Cipher I 92 100
66 Factorization Cipher — Part 3 II 90 1083
67 Heartbleed — Part 1 I 90 100
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 88 100
70 Hill Cipher with Sudoku Key I 87 100
71 Enigma Part 2 II 86 1081
72 The Last Note I 83 100
73 Number Sequence — Part 7 I 83 100
74 Partial Key Exposure with RSA — Part 1 II 82 1084
75 Molehunt (Part 3/3) II 80 1081
76 ORYX Stream Cipher Part I II 79 1081
77 Enigma Messages with Repeated Letters — Part 2 I 76 100
78 Enigma Messages with Repeated Letters — Part 3 I 76 100
79 AES key — encoded in the machine readable zone of a European ePassport II 75 1084
80 Enigma Messages I 73 100
81 Enigma Messages with Repeated Letters — Part 5 I 73 100
82 Multilingual Monoalphabetic Substitution I 72 100
83 Smartcard RSA II 71 1081
84 BCR code (Book-Caesar-RSA) II 70 1085
85 Enigma Messages with Repeated Letters — Part 4 I 68 100
86 Turing Bombe Enigma I I 68 100
87 Cascading Encryption — Part 1/3 I 67 100
88 Unusual encryption using a diophantine equation II 63 1083
89 Recycled One-Time Pad I 63 100
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 Modular Sequences I 58 100
93 M-138 — Part 3 II 57 1092
94 An Invisible Message I 56 100
95 The Einstein Enigma II 56 1109
96 RSA Factoring Challenge: RSA-704 II 55 0
97 Find the right route — Part 1 I 53 100
98 News from Castle Mansfeld I 51 100
99 Kaskade-S/T — Part 2 II 50 1082
100 Unconcealed RSA messages II 49 1083
101 Monoalphabetic substitution with camouflage — Part 2 II 48 1083
102 ORYX Stream Cipher Part II II 47 1081
103 Summer Job II 47 1112
104 New Year's Greetings — Part 1 I 47 100
105 RSA Factoring Challenge: RSA-210 II 47 0
106 Monoalphabetic substitution with camouflage — Part 4 I 46 100
107 Strange Message from Thessaloniki I 46 100
108 Keyshanc — Part 1 II 46 1084
109 Advent-Challenge — Part 2 II 45 1108
110 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 45 1081
111 Double Column Transposition — Part 4 II 44 1090
112 Monoalphabetic substitution with camouflage — Part 3 II 44 1083
113 New Year's Greetings — Part 2 I 43 100
114 Weakened Granit — Part 1 I 43 100
115 CMEA 1 II 42 1081
116 Music Code — Part 2 II 41 1082
117 Music Code — Part 1 I 41 100
118 New Year's Greetings — Part 3 I 41 100
119 Double Column Transposition — Part 2 II 41 1090
120 An 'unhearable' message I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Ku Klux Klan X 38 var
123 Not-so-Secret Message from Malawi — Part II (ECC) II 38 1081
124 Lightweight Introduction to Lattices — Part 1 I 38 100
125 Pigpen with a twist — Part 2 II 38 1083
126 Advent Challenge — Part 3 II 38 1108
127 Advent Challenge — Part 4 II 37 1108
128 Double Column Transposition — Part 3 II 37 1090
129 Keyshanc — Part 2 II 36 1084
130 Homophonic Encryption — Part 1 II 36 1123
131 Pigpen with a twist — Part 3 II 36 1083
132 Wheatstone Cryptograph — Part 1 I 33 101
133 Heartbleed — Part 3 II 33 1091
134 Kaskade-S/T — Part 3 II 32 1082
135 Homophonic Encryption — Part 2 II 31 1123
136 Polyhomophonic Substitution — Part 1 I 31 100
137 Trendy Messenger II 31 1112
138 Fastest in the West II 31 1112
139 RSA Factoring Challenge: RSA-220 II 31 0
140 ORYX Stream Cipher — Part 3 (revised) II 30 1087
141 Lattice Part 1 II 30 1082
142 Homophonic Encryption — Part 3 II 30 1123
143 Spanish Strip Cipher — Part 1 II 30 1090
144 Homophonic Encryption — Part 4 II 29 1123
145 Double Column Transposition — Part 1 II 29 1090
146 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1084
147 RSA Factoring Challenge: RSA-230 II 28 0
148 Monoalphabetic Substitution with Nostradamus Flavor II 28 1120
149 CMEA 2 III 27 13057
150 Lightweight Introduction to Lattices — Part 2 I 27 100
151 M-138 — Part 4 II 26 1092
152 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
153 Spanish Strip Cipher — Part 2 II 26 1090
154 Typex — Part 1 II 25 1086
155 Lightweight Introduction to Lattices — Part 3 II 25 1149
156 Handycipher made in love — Part 1 II 23 1120
157 RSA with Special d III 23 13051
158 Typex — Part 2 II 22 1087
159 Find the right route — Part 2 I 22 100
160 AES ECB Wrong Encoding II 21 1108
161 Polyphonic Substitution Cipher — Part 1 II 20 1132
162 Polyhomophonic Substitution — Part 2 II 19 1140
163 Breaking a Filter Generator II 19 1115
164 The LoRa Cipher: Logic Randomness — Part 1 II 19 1137
165 Purple 1 II 18 1081
166 Find the right route — Part 3 I 18 100
167 Polyphonic Substitution Cipher — Part 2 II 17 1135
168 Handycipher made in love — Part 2 II 17 1123
169 RSA Factoring Challenge: RSA-240 III 17 0
170 RSA Factoring Challenge: RSA-250 III 16 0
171 Concealed Messages — Vigenère's Night Sky X 16 var
172 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1099
173 The T52 Sturgeon Challenge — Part 1 II 16 1126
174 Sigaba Part 1 II 16 1081
175 RSA Factoring Challenge: RSA-232 III 15 0
176 Cipher ID — Part 1 II 15 1132
177 Flawed Usage of a OTP Cipher by the BND II 15 1095
178 The T52 Sturgeon Challenge — Part 2 II 15 1126
179 Weakened Handycipher — Part 1 II 15 1094
180 A Cloaked Substitution Cipher — Part 1 II 15 1127
181 New Year's Greetings — Part 5 II 15 1097
182 Weakened Handycipher — Part 3 II 14 1094
183 Polyhomophonic Substitution — Part 3 II 14 1141
184 Cascading Encryption — Part 2/3 II 14 1087
185 A Cloaked Substitution Cipher — Part 2 II 14 1127
186 Weakened Handycipher — Part 2 II 13 1094
187 Cascading Encryption — Part 3/3 II 12 1087
188 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
189 The T52 Sturgeon Challenge — Part 3 II 12 1126
190 The SZ42 Challenge — Part 1 II 11 1150
191 ORYX Stream Cipher — Part 4a II 11 1090
192 Akelarre Part 1 II 10 1081
193 The SZ42 Challenge — Part 2 II 10 1151
194 The T52 Sturgeon Challenge — Part 4 II 10 1126
195 Kaskade-S/T — Part 5 II 10 1082
196 Hilly — Part 1 II 9 1102
197 The SZ42 Challenge — Part 4 II 9 1154
198 The SIGABA Challenge — Part 1 II 9 1138
199 The T52 Sturgeon Challenge — Part 8 II 8 1127
200 The SIGABA Challenge — Part 2 II 8 1138
201 The SZ42 Challenge — Part 5 II 8 1154
202 The SZ42 Challenge — Part 3 II 8 1152
203 Double Column Transposition — Part 5 II 8 1090
204 The T52 Sturgeon Challenge — Part 12 II 7 1127
205 The T52 Sturgeon Challenge — Part 11 II 7 1127
206 The SZ42 Challenge — Part 8 II 7 1162
207 The SZ42 Challenge — Part 6 II 7 1158
208 Handycipher — Part 2 II 7 1093
209 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1105
210 The T52 Sturgeon Challenge — Part 9 II 6 1127
211 Holographic Encryption — Part 1 II 6 1103
212 The T52 Sturgeon Challenge — Part 7 II 6 1127
213 The SIGABA Challenge — Part 3 III 6 13973
214 Handycipher — Part 3 III 6 13264
215 The SZ42 Challenge — Part 7 II 6 1161
216 The T52 Sturgeon Challenge — Part 6 II 6 1127
217 The SZ42 Challenge — Part 9 II 6 1170
218 The T52 Sturgeon Challenge — Part 5 II 6 1127
219 The T52 Sturgeon Challenge — Part 10 II 5 1127
220 Weakened Handycipher — Part 5 II 5 1099
221 "The Road" — Part 1 II 5 1117
222 Weakened Handycipher — Part 4 II 5 1099
223 The SIGABA Challenge — Part 4 III 5 13978
224 Sigaba Part 2 III 5 13051
225 Weakened Handycipher — Part 6 II 5 1099
226 Handycipher — Part 1 II 5 1093
227 Spirale — Part 2 II 5 1095
228 Handycipher — Part 5 III 5 13363
229 Handycipher — Part 6 III 5 13363
230 Spirale — Part 1 II 5 1095
231 Spirale — Part 3 II 4 1095
232 Weakened ElsieFour — Part 3 II 4 1106
233 Wheatstone Cryptograph — Part 2 II 4 1213
234 ElsieFour — Part 1 III 4 13489
235 Weakened ElsieFour — Part 1 II 4 1111
236 Notes of an Italian Soldier X 4 var
237 Handycipher — Part 4 III 4 13363
238 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14007
239 The SZ42 Challenge — Part 11 II 3 1178
240 Differential Cryptanalysis — Part 2 II 3 1136
241 The SZ42 Challenge — Part 10 II 3 1178
242 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14016
243 The Vatican Challenge — Part 2 X 3 var
244 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1134
245 The Vatican Challenge — Part 1 X 3 var
246 Extended Handycipher — Part 4 III 3 13363
247 Extended Handycipher — Part 1 II 3 1093
248 Handycipher — Part 8 III 3 13414
249 Extended Handycipher — Part 2 II 3 1093
250 Handycipher — Part 9 III 3 13414
251 Holographic Encryption — Part 2 II 3 1103
252 Extended Handycipher — Part 3 II 3 1093
253 Extended Handycipher — Part 5 III 3 13363
254 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14013
255 Unknown Author X 2 var
256 The SIGABA Challenge — Part 5 III 2 13986
257 Extended Handycipher — Part 6 III 2 13363
258 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
259 ORYX Stream Cipher — Part 4b III 2 13210
260 SIGABA CSP-889 — Part 3 III 2 14970
261 SIGABA CSP-2900 — Part 1 II 2 1273
262 SIGABA CSP-2900 — Part 2 II 2 1273
263 SIGABA CSP-2900 — Part 3 III 2 15539
264 SIGABA CSP-889 — Part 2 II 2 1219
265 SIGABA CSP-889 — Part 1 II 2 1219
266 Double Column Transposition X 2 var
267 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13855
268 Handycipher — Part 7 III 2 13414
269 The Vatican Challenge — Part 4 X 1 var
270 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14023
271 Handycipher — Part 10 II 1 1125
272 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14015
273 The SIGABA Challenge — Part 6 III 1 13998
274 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13835
275 Substitution Cipher with Non-Prefix Codes III 1 13077
276 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1085
277 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1099
278 Beale Ciphers X 1 var
279 Hilly — Part 2 II 1 1107
280 RSA Factoring Challenge: RSA-450 III 0 13103
281 ORYX Stream Cipher — Part 4d III 0 13167
282 ORYX Stream Cipher — Part 4c III 0 13210
283 Kaskade-S/T — Part 4 II 0 1082
284 RSA Factoring Challenge: RSA-460 III 0 13103
285 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1099
286 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14018
287 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1099
288 RSA Factoring Challenge: RSA-430 III 0 13103
289 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13061
290 RSA Factoring Challenge: RSA-440 III 0 13103
291 Twelve-Year-Old Murder Case X 0 var
292 Spanish Strip Cipher — Part 3 X 0 var
293 Kryptos X 0 var
294 RSA Factoring Challenge: RSA-470 III 0 13103
295 RSA Factoring Challenge: RSA-617 III 0 13103
296 D'Agapeyeff X 0 var
297 Weakened ElsieFour — Part 2 II 0 1111
298 RSA Factoring Challenge: RSA-2048 III 0 13103
299 The third ENIGMA M4 message X 0 var
300 Digital Signatures: DSA with Medium Fields III 0 13085
301 RSA Factoring Challenge: RSA-500 III 0 13103
302 Double Column Transposition Reloaded — Part 1 III 0 13191
303 Dorabella X 0 var
304 RSA Factoring Challenge: RSA-420 III 0 13103
305 RSA Factoring Challenge: RSA-480 III 0 13103
306 RSA Factoring Challenge: RSA-490 III 0 13103
307 Double Column Transposition Reloaded — Part 2 III 0 13191
308 Double Column Transposition Reloaded — Part 3 III 0 13191
309 RSA Factoring Challenge: RSA-1536 III 0 13103
310 RSA Factoring Challenge: RSA-410 III 0 13103
311 RSA Factoring Challenge: RSA-1024 III 0 13103
312 Weakened Granit — Part 2 II 0 1095
313 RSA Factoring Challenge: RSA-310 III 0 13103
314 Spirale — Part 4 III 0 13296
315 Double-Column Transposition/Granit — Part 2 II 0 1094
316 Double-Column Transposition/Granit — Part 3 II 0 1094
317 Weakened Granit — Part 3 II 0 1095
318 RSA Factoring Challenge: RSA-309 III 0 13103
319 The Vatican Challenge — Part 5 X 0 var
320 The Vatican Challenge — Part 3 X 0 var
321 RSA Factoring Challenge: RSA-896 III 0 13103
322 RSA Factoring Challenge: RSA-280 III 0 13103
323 RSA Factoring Challenge: RSA-300 III 0 13103
324 RSA Factoring Challenge: RSA-290 III 0 13103
325 Double-Column Transposition/Granit — Part 1 II 0 1094
326 RSA Factoring Challenge: RSA-320 III 0 13103
327 RSA Factoring Challenge: RSA-370 III 0 13103
328 RSA Factoring Challenge: RSA-360 III 0 13103
329 RSA Factoring Challenge: RSA-380 III 0 13103
330 RSA Factoring Challenge: RSA-390 III 0 13103
331 RSA Factoring Challenge: RSA-270 III 0 13103
332 RSA Factoring Challenge: RSA-400 III 0 13103
333 RSA Factoring Challenge: RSA-350 III 0 13103
334 RSA Factoring Challenge: RSA-340 III 0 13103
335 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13841
336 RSA Factoring Challenge: RSA-260 III 0 13103
337 World Record Challenge: Break 65 Bits of AES III 0 13051
338 "The Road" — Part 3 II 0 1117
339 RSA Factoring Challenge: RSA-330 III 0 13103
340 "The Road" — Part 2 II 0 1117
341 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1099
 
 
powered by the CrypTool project  CrypTool

 

   +++    [14:53 - 27.09.2021] jenniferdecastro solved the Level I challenge 'A hidden word'    +++    [14:28 - 27.09.2021] Mercer solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [09:52 - 26.09.2021] CRYbaby solved the Level I challenge 'How do you become a big cryptographer?'    +++    [17:29 - 25.09.2021] gemmath solved the Level I challenge 'Letter to the Templars — Part 1'    +++    [17:22 - 25.09.2021] Surtees solved the Level I challenge 'Original Caesar Cipher'    +++