MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11116
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4125 100
2 Original Caesar Cipher I 2855 100
3 Number Sequence — Part 2 I 2013 100
4 Caesar Encryption I 1358 100
5 Beaver Code I 1128 100
6 Letter to the Templars — Part 1 I 983 100
7 Number Sequence — Part 3 I 942 100
8 Letter to the Templars — Part 2 I 792 100
9 Number Sequence — Part 4 I 781 100
10 A hidden word I 777 100
11 Letter to the Templars — Part 3 II 677 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 555 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 513 1082
15 Factorization Cipher — Part 1 I 477 100
16 Grille Cipher I 458 100
17 Advent-Challenge — Part 1 I 393 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 349 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 299 100
22 Alice's Birthday Party (Part 1) II 285 1081
23 Alice's Birthday Party (Part 2) II 279 1081
24 Snow White and the seven dwarfs I 279 100
25 From Russia with Love I 264 100
26 Broadcasting and low exponent — RSA Attack II 222 1083
27 Modified Caesar Cipher I 218 100
28 How do you become a big cryptographer? I 214 100
29 M-138 — Part 1 I 199 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 190 1081
31 Not-so-Secret Message from Malawi — Part I (RSA) II 186 1081
32 Reserve Hand Procedure — Part 1 I 186 100
33 Classical Ciphers^3 I 169 100
34 Letter from the Alleged Countess Julie von Ortenburg I 168 100
35 Hybrid Encryption I II 165 1081
36 Enigma Messages with Repeated Letters — Part 1 I 162 100
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 152 1083
39 Pigpen with a twist — Part 1 I 148 100
40 Molehunt (Part 1/3) I 146 100
41 Cryptanalysis Hacking Puzzles — Part 2 I 145 100
42 Factorization Cipher — Part 2 II 143 1084
43 ¿No Hablas Español? No problemo! I 143 100
44 The Book Code: A Challenge for Bookworms I 141 100
45 Number Sequence — Part 6 I 141 100
46 Molehunt (Part 2/3) I 138 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 128 1081
49 M-138 — Part 2 II 124 1093
50 Image Noise I 120 100
51 A Secret Message from Castle Mansfeld I 120 100
52 Trifid Cipher I 116 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 114 1083
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 107 100
57 Playfair with hints about the grid I 105 100
58 Double Columnar Transposition I 104 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 9 I 101 100
61 Number Sequence — Part 10 I 100 100
62 Enigma Combinatorics I 98 100
63 A hidden word — Part 2 I 97 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 95 100
65 Zodiac Cipher I 92 100
66 Factorization Cipher — Part 3 II 90 1084
67 Heartbleed — Part 1 I 90 100
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 88 100
70 Hill Cipher with Sudoku Key I 87 100
71 Enigma Part 2 II 86 1081
72 Number Sequence — Part 7 I 83 100
73 Partial Key Exposure with RSA — Part 1 II 82 1084
74 The Last Note I 82 100
75 Molehunt (Part 3/3) II 80 1081
76 ORYX Stream Cipher Part I II 79 1081
77 Enigma Messages with Repeated Letters — Part 2 I 75 100
78 Enigma Messages with Repeated Letters — Part 3 I 75 100
79 AES key — encoded in the machine readable zone of a European ePassport II 73 1084
80 Enigma Messages with Repeated Letters — Part 5 I 72 100
81 Smartcard RSA II 71 1081
82 Multilingual Monoalphabetic Substitution I 71 100
83 Enigma Messages I 71 100
84 BCR code (Book-Caesar-RSA) II 68 1086
85 Enigma Messages with Repeated Letters — Part 4 I 67 100
86 Turing Bombe Enigma I I 67 100
87 Cascading Encryption — Part 1/3 I 67 100
88 Unusual encryption using a diophantine equation II 63 1083
89 Recycled One-Time Pad I 63 100
90 Heartbleed — Part 2 I 60 100
91 Monoalphabetic substitution with camouflage — Part 1 I 60 100
92 Modular Sequences I 58 100
93 M-138 — Part 3 II 57 1093
94 An Invisible Message I 56 100
95 The Einstein Enigma II 56 1111
96 RSA Factoring Challenge: RSA-704 II 52 0
97 News from Castle Mansfeld I 51 100
98 Kaskade-S/T — Part 2 II 50 1082
99 Find the right route — Part 1 I 49 100
100 Unconcealed RSA messages II 49 1083
101 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
102 New Year's Greetings — Part 1 I 47 100
103 Summer Job II 47 1114
104 ORYX Stream Cipher Part II II 47 1081
105 Strange Message from Thessaloniki I 46 100
106 Monoalphabetic substitution with camouflage — Part 4 I 46 100
107 RSA Factoring Challenge: RSA-210 II 45 0
108 Advent-Challenge — Part 2 II 45 1109
109 Keyshanc — Part 1 II 45 1085
110 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 45 1082
111 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
112 Double Column Transposition — Part 4 II 44 1091
113 Weakened Granit — Part 1 I 43 100
114 New Year's Greetings — Part 2 I 43 100
115 CMEA 1 II 42 1081
116 Double Column Transposition — Part 2 II 41 1090
117 Music Code — Part 2 II 41 1082
118 Music Code — Part 1 I 41 100
119 New Year's Greetings — Part 3 I 41 100
120 An 'unhearable' message I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Advent Challenge — Part 3 II 38 1109
123 Ku Klux Klan X 38 var
124 Pigpen with a twist — Part 2 II 38 1083
125 Advent Challenge — Part 4 II 37 1109
126 Lightweight Introduction to Lattices — Part 1 I 37 100
127 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1081
128 Double Column Transposition — Part 3 II 37 1090
129 Pigpen with a twist — Part 3 II 36 1083
130 Homophonic Encryption — Part 1 II 36 1125
131 Keyshanc — Part 2 II 35 1085
132 Wheatstone Cryptograph — Part 1 I 33 101
133 Heartbleed — Part 3 II 33 1092
134 Homophonic Encryption — Part 2 II 31 1125
135 Kaskade-S/T — Part 3 II 31 1082
136 Polyhomophonic Substitution — Part 1 I 31 100
137 Trendy Messenger II 31 1114
138 Fastest in the West II 31 1114
139 RSA Factoring Challenge: RSA-220 II 30 0
140 Lattice Part 1 II 30 1082
141 Homophonic Encryption — Part 3 II 30 1125
142 Spanish Strip Cipher — Part 1 II 30 1090
143 ORYX Stream Cipher — Part 3 (revised) II 30 1088
144 Double Column Transposition — Part 1 II 29 1090
145 Homophonic Encryption — Part 4 II 29 1125
146 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1084
147 Monoalphabetic Substitution with Nostradamus Flavor II 28 1122
148 Lightweight Introduction to Lattices — Part 2 I 27 100
149 RSA Factoring Challenge: RSA-230 II 27 0
150 CMEA 2 III 27 13063
151 Spanish Strip Cipher — Part 2 II 26 1090
152 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
153 M-138 — Part 4 II 25 1093
154 Lightweight Introduction to Lattices — Part 3 II 25 1156
155 Typex — Part 1 II 25 1087
156 RSA with Special d III 23 13057
157 Handycipher made in love — Part 1 II 22 1122
158 Typex — Part 2 II 22 1087
159 Find the right route — Part 2 I 21 100
160 Polyphonic Substitution Cipher — Part 1 II 20 1135
161 AES ECB Wrong Encoding II 20 1109
162 The LoRa Cipher: Logic Randomness — Part 1 II 19 1142
163 Breaking a Filter Generator II 19 1117
164 Polyhomophonic Substitution — Part 2 II 19 1145
165 Purple 1 II 18 1081
166 Polyphonic Substitution Cipher — Part 2 II 17 1139
167 Handycipher made in love — Part 2 II 17 1126
168 Find the right route — Part 3 I 17 100
169 Sigaba Part 1 II 16 1081
170 RSA Factoring Challenge: RSA-240 III 16 0
171 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1100
172 Concealed Messages — Vigenère's Night Sky X 16 var
173 RSA Factoring Challenge: RSA-250 III 15 0
174 Weakened Handycipher — Part 1 II 15 1094
175 New Year's Greetings — Part 5 II 15 1098
176 A Cloaked Substitution Cipher — Part 1 II 15 1130
177 The T52 Sturgeon Challenge — Part 1 II 15 1128
178 Flawed Usage of a OTP Cipher by the BND II 15 1095
179 Cipher ID — Part 1 II 15 1135
180 Cascading Encryption — Part 2/3 II 14 1087
181 Polyhomophonic Substitution — Part 3 II 14 1145
182 A Cloaked Substitution Cipher — Part 2 II 14 1130
183 RSA Factoring Challenge: RSA-232 III 14 0
184 The T52 Sturgeon Challenge — Part 2 II 14 1129
185 Weakened Handycipher — Part 3 II 14 1094
186 Weakened Handycipher — Part 2 II 13 1094
187 Cascading Encryption — Part 3/3 II 12 1087
188 The T52 Sturgeon Challenge — Part 3 II 12 1129
189 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
190 ORYX Stream Cipher — Part 4a II 11 1090
191 The SZ42 Challenge — Part 2 II 10 1158
192 Akelarre Part 1 II 10 1081
193 The SZ42 Challenge — Part 1 II 10 1156
194 Kaskade-S/T — Part 5 II 10 1082
195 The T52 Sturgeon Challenge — Part 4 II 10 1129
196 The SZ42 Challenge — Part 4 II 9 1161
197 Hilly — Part 1 II 9 1103
198 The SIGABA Challenge — Part 1 II 8 1142
199 The T52 Sturgeon Challenge — Part 8 II 8 1130
200 The SZ42 Challenge — Part 3 II 8 1159
201 The SIGABA Challenge — Part 2 II 8 1143
202 The SZ42 Challenge — Part 5 II 8 1162
203 Double Column Transposition — Part 5 II 8 1091
204 The T52 Sturgeon Challenge — Part 11 II 7 1130
205 The T52 Sturgeon Challenge — Part 12 II 7 1130
206 The SZ42 Challenge — Part 6 II 7 1166
207 The SZ42 Challenge — Part 8 II 7 1171
208 Handycipher — Part 2 II 7 1093
209 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1106
210 Holographic Encryption — Part 1 II 6 1104
211 The T52 Sturgeon Challenge — Part 7 II 6 1130
212 Handycipher — Part 3 III 6 13274
213 The SIGABA Challenge — Part 3 III 6 14033
214 The SZ42 Challenge — Part 7 II 6 1170
215 The T52 Sturgeon Challenge — Part 9 II 6 1130
216 Weakened Handycipher — Part 5 II 5 1100
217 Weakened Handycipher — Part 6 II 5 1100
218 The T52 Sturgeon Challenge — Part 10 II 5 1130
219 The SIGABA Challenge — Part 4 III 5 14040
220 Weakened Handycipher — Part 4 II 5 1100
221 The T52 Sturgeon Challenge — Part 6 II 5 1130
222 "The Road" — Part 1 II 5 1119
223 The T52 Sturgeon Challenge — Part 5 II 5 1130
224 Handycipher — Part 6 III 5 13376
225 Handycipher — Part 1 II 5 1093
226 The SZ42 Challenge — Part 9 II 5 1181
227 Sigaba Part 2 III 5 13057
228 Handycipher — Part 5 III 5 13376
229 Spirale — Part 1 II 5 1095
230 Spirale — Part 2 II 5 1095
231 ElsieFour — Part 1 III 4 13509
232 Notes of an Italian Soldier X 4 var
233 Spirale — Part 3 II 4 1095
234 Weakened ElsieFour — Part 1 II 4 1113
235 Wheatstone Cryptograph — Part 2 II 4 1256
236 Weakened ElsieFour — Part 3 II 4 1108
237 Handycipher — Part 4 III 4 13376
238 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14074
239 Extended Handycipher — Part 1 II 3 1094
240 Handycipher — Part 9 III 3 13430
241 Extended Handycipher — Part 4 III 3 13376
242 The Vatican Challenge — Part 1 X 3 var
243 Extended Handycipher — Part 2 II 3 1094
244 The Vatican Challenge — Part 2 X 3 var
245 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1137
246 The SZ42 Challenge — Part 10 II 3 1193
247 Holographic Encryption — Part 2 II 3 1104
248 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14084
249 Handycipher — Part 8 III 3 13430
250 Extended Handycipher — Part 3 II 3 1094
251 The SZ42 Challenge — Part 11 II 3 1193
252 Extended Handycipher — Part 5 III 3 13376
253 Differential Cryptanalysis — Part 2 II 3 1140
254 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
255 Unknown Author X 2 var
256 SIGABA CSP-889 — Part 1 II 2 1270
257 ORYX Stream Cipher — Part 4b III 2 13219
258 SIGABA CSP-889 — Part 2 II 2 1270
259 SIGABA CSP-889 — Part 3 III 2 15510
260 Double Column Transposition X 2 var
261 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13901
262 Extended Handycipher — Part 6 III 2 13376
263 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14081
264 Handycipher — Part 7 III 2 13430
265 The SIGABA Challenge — Part 5 III 2 14050
266 Substitution Cipher with Non-Prefix Codes III 1 13083
267 Hilly — Part 2 II 1 1108
268 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1085
269 Handycipher — Part 10 II 1 1127
270 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14092
271 Beale Ciphers X 1 var
272 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1100
273 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13879
274 The SIGABA Challenge — Part 6 III 1 14062
275 The Vatican Challenge — Part 4 X 1 var
276 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14082
277 RSA Factoring Challenge: RSA-896 III 0 13110
278 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13887
279 RSA Factoring Challenge: RSA-260 III 0 13110
280 RSA Factoring Challenge: RSA-270 III 0 13110
281 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14085
282 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13067
283 RSA Factoring Challenge: RSA-360 III 0 13110
284 Double-Column Transposition/Granit — Part 3 II 0 1095
285 Spirale — Part 4 III 0 13308
286 Double-Column Transposition/Granit — Part 2 II 0 1095
287 Double-Column Transposition/Granit — Part 1 II 0 1095
288 RSA Factoring Challenge: RSA-470 III 0 13110
289 RSA Factoring Challenge: RSA-1536 III 0 13110
290 RSA Factoring Challenge: RSA-460 III 0 13110
291 RSA Factoring Challenge: RSA-440 III 0 13110
292 RSA Factoring Challenge: RSA-430 III 0 13110
293 RSA Factoring Challenge: RSA-450 III 0 13110
294 Weakened Granit — Part 3 II 0 1096
295 Weakened Granit — Part 2 II 0 1096
296 RSA Factoring Challenge: RSA-480 III 0 13110
297 RSA Factoring Challenge: RSA-490 III 0 13110
298 Kaskade-S/T — Part 4 II 0 1082
299 Spanish Strip Cipher — Part 3 X 0 var
300 Double Column Transposition Reloaded — Part 3 III 0 13199
301 Double Column Transposition Reloaded — Part 2 III 0 13199
302 Double Column Transposition Reloaded — Part 1 III 0 13199
303 ORYX Stream Cipher — Part 4c III 0 13219
304 Digital Signatures: DSA with Medium Fields III 0 13092
305 RSA Factoring Challenge: RSA-500 III 0 13110
306 World Record Challenge: Break 65 Bits of AES III 0 13057
307 RSA Factoring Challenge: RSA-617 III 0 13110
308 RSA Factoring Challenge: RSA-2048 III 0 13110
309 The third ENIGMA M4 message X 0 var
310 RSA Factoring Challenge: RSA-420 III 0 13110
311 RSA Factoring Challenge: RSA-410 III 0 13110
312 "The Road" — Part 2 II 0 1119
313 "The Road" — Part 3 II 0 1119
314 RSA Factoring Challenge: RSA-310 III 0 13110
315 Dorabella X 0 var
316 RSA Factoring Challenge: RSA-320 III 0 13110
317 D'Agapeyeff X 0 var
318 RSA Factoring Challenge: RSA-1024 III 0 13110
319 RSA Factoring Challenge: RSA-280 III 0 13110
320 The Vatican Challenge — Part 3 X 0 var
321 RSA Factoring Challenge: RSA-290 III 0 13110
322 RSA Factoring Challenge: RSA-300 III 0 13110
323 RSA Factoring Challenge: RSA-309 III 0 13110
324 RSA Factoring Challenge: RSA-330 III 0 13110
325 RSA Factoring Challenge: RSA-340 III 0 13110
326 RSA Factoring Challenge: RSA-400 III 0 13110
327 Kryptos X 0 var
328 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1100
329 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1100
330 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1100
331 RSA Factoring Challenge: RSA-390 III 0 13110
332 ORYX Stream Cipher — Part 4d III 0 13175
333 Weakened ElsieFour — Part 2 II 0 1113
334 RSA Factoring Challenge: RSA-350 III 0 13110
335 Twelve-Year-Old Murder Case X 0 var
336 RSA Factoring Challenge: RSA-370 III 0 13110
337 RSA Factoring Challenge: RSA-380 III 0 13110
338 The Vatican Challenge — Part 5 X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [21:13 - 29.07.2021] thatbusybeaver solved the Level II challenge 'RSA Factoring Challenge: RSA-704'    +++    [20:41 - 29.07.2021] thatbusybeaver solved the Level II challenge 'Summer Job'    +++    [07:46 - 29.07.2021] thatbusybeaver solved the Level II challenge 'Enigma Part 1'    +++    [07:42 - 29.07.2021] thatbusybeaver solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [07:33 - 29.07.2021] thatbusybeaver solved the Level I challenge 'Letter to the Templars — Part 2'    +++