MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10776
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3988 100
2 Original Caesar Cipher I 2748 100
3 Number Sequence — Part 2 I 1943 100
4 Caesar Encryption I 1314 100
5 Beaver Code I 1085 100
6 Letter to the Templars — Part 1 I 949 100
7 Number Sequence — Part 3 I 913 100
8 Letter to the Templars — Part 2 I 759 100
9 Number Sequence — Part 4 I 756 100
10 A hidden word I 747 100
11 Letter to the Templars — Part 3 II 644 1087
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 532 100
13 Monoalphabetic Substitution I 519 100
14 Cracking SHA1-Hashed Passwords II 488 1083
15 Factorization Cipher — Part 1 I 461 100
16 Grille Cipher I 441 100
17 Advent-Challenge — Part 1 I 378 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 368 100
19 Number Sequence — Part 8 I 328 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 316 100
21 One-Time Pad with Flaws I 289 100
22 Alice's Birthday Party (Part 1) II 275 1082
23 Alice's Birthday Party (Part 2) II 269 1082
24 Snow White and the seven dwarfs I 268 100
25 From Russia with Love I 256 100
26 Broadcasting and low exponent — RSA Attack II 213 1084
27 Modified Caesar Cipher I 211 100
28 How do you become a big cryptographer? I 204 100
29 M-138 — Part 1 I 186 100
30 Reserve Hand Procedure — Part 1 I 182 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 181 1082
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 179 1082
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 163 100
35 Enigma Messages with Repeated Letters — Part 1 I 160 100
36 Hybrid Encryption I II 154 1082
37 Nils away on travel I 152 100
38 RSA: Two different keys — same ciphertext II 149 1084
39 Pigpen with a twist — Part 1 I 144 100
40 Factorization Cipher — Part 2 II 138 1085
41 Molehunt (Part 1/3) I 138 100
42 The Book Code: A Challenge for Bookworms I 136 100
43 ¿No Hablas Español? No problemo! I 135 100
44 Molehunt (Part 2/3) I 133 100
45 Cryptanalysis Hacking Puzzles — Part 2 I 129 100
46 Number Sequence — Part 6 I 127 100
47 Autokey Cipher I 126 100
48 Enigma Part 1 II 125 1082
49 A Secret Message from Castle Mansfeld I 118 100
50 M-138 — Part 2 II 116 1095
51 Trifid Cipher I 114 100
52 A really long number sequence II 111 1084
53 Image Noise I 110 100
54 ADFGVX — Part 2 I 110 100
55 ADFGVX — Part 1 I 102 100
56 Playfair Encryption I 102 100
57 Playfair with hints about the grid I 101 100
58 Kaskade-S/T — Part 1 I 100 100
59 Double Columnar Transposition I 98 100
60 Enigma Combinatorics I 96 100
61 Number Sequence — Part 10 I 95 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
63 ECDH-Key Exchange for Beginners I 89 100
64 Number Sequence — Part 9 I 89 100
65 Heartbleed — Part 1 I 89 100
66 A hidden word — Part 2 I 88 100
67 Factorization Cipher — Part 3 II 87 1085
68 Zodiac Cipher I 85 100
69 Enigma Part 2 II 83 1082
70 Number Sequence — Part 5 I 81 100
71 Hill Cipher with Sudoku Key I 81 100
72 ORYX Stream Cipher Part I II 79 1082
73 Partial Key Exposure with RSA — Part 1 II 79 1085
74 The Last Note I 79 100
75 Molehunt (Part 3/3) II 76 1082
76 Number Sequence — Part 7 I 75 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Smartcard RSA II 70 1082
80 Enigma Messages I 70 100
81 Enigma Messages with Repeated Letters — Part 5 I 70 100
82 Multilingual Monoalphabetic Substitution I 69 100
83 Cascading Encryption — Part 1/3 I 66 100
84 BCR code (Book-Caesar-RSA) II 66 1087
85 Turing Bombe Enigma I I 65 100
86 AES key — encoded in the machine readable zone of a European ePassport II 65 1085
87 Enigma Messages with Repeated Letters — Part 4 I 64 100
88 Recycled One-Time Pad I 62 100
89 Unusual encryption using a diophantine equation II 60 1084
90 Heartbleed — Part 2 I 60 100
91 Monoalphabetic substitution with camouflage — Part 1 I 58 100
92 An Invisible Message I 56 100
93 Modular Sequences I 55 100
94 M-138 — Part 3 II 53 1095
95 The Einstein Enigma II 52 1116
96 Kaskade-S/T — Part 2 II 49 1083
97 News from Castle Mansfeld I 48 100
98 ORYX Stream Cipher Part II II 47 1082
99 RSA Factoring Challenge: RSA-704 II 47 0
100 Monoalphabetic substitution with camouflage — Part 2 II 47 1085
101 Unconcealed RSA messages II 47 1085
102 Keyshanc — Part 1 II 45 1086
103 Monoalphabetic substitution with camouflage — Part 4 I 45 100
104 New Year's Greetings — Part 1 I 45 100
105 Monoalphabetic substitution with camouflage — Part 3 II 43 1085
106 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 43 1083
107 Summer Job II 43 1120
108 Advent-Challenge — Part 2 II 42 1114
109 New Year's Greetings — Part 2 I 42 100
110 Weakened Granit — Part 1 I 42 100
111 Strange Message from Thessaloniki I 42 100
112 Double Column Transposition — Part 4 II 42 1092
113 RSA Factoring Challenge: RSA-210 II 42 0
114 Music Code — Part 1 I 40 100
115 Music Code — Part 2 II 40 1084
116 CMEA 1 II 40 1083
117 Double Column Transposition — Part 2 II 40 1092
118 An 'unhearable' message I 39 100
119 New Year's Greetings — Part 3 I 39 100
120 Pigpen with a twist — Part 2 II 37 1084
121 New Year's Greetings — Part 4 I 37 100
122 Ku Klux Klan X 36 var
123 Advent Challenge — Part 4 II 35 1114
124 Keyshanc — Part 2 II 35 1086
125 Advent Challenge — Part 3 II 35 1114
126 Double Column Transposition — Part 3 II 35 1092
127 Pigpen with a twist — Part 3 II 34 1084
128 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1082
129 Trendy Messenger II 31 1120
130 Homophonic Encryption — Part 1 II 31 1135
131 Heartbleed — Part 3 II 30 1093
132 ORYX Stream Cipher — Part 3 (revised) II 30 1089
133 Fastest in the West II 30 1120
134 Kaskade-S/T — Part 3 II 29 1083
135 Lattice Part 1 II 28 1083
136 Find the right route — Part 1 I 28 101
137 CMEA 2 III 27 13083
138 Double Column Transposition — Part 1 II 27 1092
139 Monoalphabetic Substitution with Camouflage — Part 5 II 27 1086
140 Spanish Strip Cipher — Part 1 II 27 1092
141 Monoalphabetic Substitution with Nostradamus Flavor II 27 1130
142 Polyhomophonic Substitution — Part 1 I 26 100
143 RSA Factoring Challenge: RSA-220 II 26 0
144 Lightweight Introduction to Lattices — Part 1 I 26 100
145 Typex — Part 1 II 25 1088
146 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
147 Homophonic Encryption — Part 2 II 24 1135
148 Homophonic Encryption — Part 3 II 23 1135
149 RSA with Special d III 23 13077
150 Typex — Part 2 II 22 1089
151 RSA Factoring Challenge: RSA-230 II 22 0
152 Homophonic Encryption — Part 4 II 22 1135
153 Spanish Strip Cipher — Part 2 II 22 1092
154 Lightweight Introduction to Lattices — Part 2 I 21 100
155 Lightweight Introduction to Lattices — Part 3 II 20 1191
156 Handycipher made in love — Part 1 II 20 1130
157 Polyphonic Substitution Cipher — Part 1 II 17 1150
158 AES ECB Wrong Encoding II 17 1114
159 Breaking a Filter Generator II 17 1124
160 M-138 — Part 4 II 17 1095
161 The LoRa Cipher: Logic Randomness — Part 1 II 17 1161
162 Purple 1 II 16 1082
163 Concealed Messages — Vigenère's Night Sky X 16 var
164 Sigaba Part 1 II 15 1082
165 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1103
166 New Year's Greetings — Part 5 II 15 1101
167 Weakened Handycipher — Part 1 II 15 1097
168 Polyhomophonic Substitution — Part 2 II 15 1167
169 A Cloaked Substitution Cipher — Part 1 II 15 1142
170 Handycipher made in love — Part 2 II 15 1136
171 Cipher ID — Part 1 II 14 1150
172 Weakened Handycipher — Part 3 II 14 1097
173 Flawed Usage of a OTP Cipher by the BND II 14 1098
174 A Cloaked Substitution Cipher — Part 2 II 14 1143
175 Polyphonic Substitution Cipher — Part 2 II 14 1156
176 Cascading Encryption — Part 2/3 II 13 1089
177 Weakened Handycipher — Part 2 II 13 1097
178 The T52 Sturgeon Challenge — Part 1 II 13 1139
179 Polyhomophonic Substitution — Part 3 II 12 1168
180 The T52 Sturgeon Challenge — Part 2 II 12 1140
181 Cascading Encryption — Part 3/3 II 12 1089
182 RSA Factoring Challenge: RSA-240 III 12 0
183 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1083
184 ORYX Stream Cipher — Part 4a II 11 1092
185 The T52 Sturgeon Challenge — Part 3 II 10 1140
186 RSA Factoring Challenge: RSA-250 III 10 0
187 Kaskade-S/T — Part 5 II 10 1083
188 Find the right route — Part 3 I 10 104
189 Akelarre Part 1 II 10 1082
190 RSA Factoring Challenge: RSA-232 III 9 0
191 The T52 Sturgeon Challenge — Part 4 II 9 1140
192 Double Column Transposition — Part 5 II 8 1093
193 The SZ42 Challenge — Part 2 II 8 1197
194 The SZ42 Challenge — Part 1 II 8 1193
195 Find the right route — Part 2 I 8 103
196 Hilly — Part 1 II 8 1106
197 The SZ42 Challenge — Part 3 II 7 1201
198 Handycipher — Part 2 II 7 1096
199 The SIGABA Challenge — Part 1 II 7 1162
200 The SZ42 Challenge — Part 4 II 7 1206
201 The SIGABA Challenge — Part 2 II 7 1163
202 The T52 Sturgeon Challenge — Part 12 II 6 1141
203 Holographic Encryption — Part 1 II 6 1108
204 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1110
205 The T52 Sturgeon Challenge — Part 8 II 6 1141
206 The SZ42 Challenge — Part 5 II 6 1209
207 The T52 Sturgeon Challenge — Part 11 II 6 1141
208 Handycipher — Part 3 III 6 13311
209 Handycipher — Part 5 III 5 13426
210 The SZ42 Challenge — Part 8 II 5 1245
211 Handycipher — Part 6 III 5 13426
212 The SIGABA Challenge — Part 3 III 5 14312
213 Weakened Handycipher — Part 4 II 5 1103
214 Weakened Handycipher — Part 6 II 5 1103
215 The SZ42 Challenge — Part 6 II 5 1224
216 The T52 Sturgeon Challenge — Part 7 II 5 1141
217 "The Road" — Part 1 II 5 1127
218 The T52 Sturgeon Challenge — Part 10 II 5 1141
219 Spirale — Part 1 II 5 1098
220 Weakened Handycipher — Part 5 II 5 1103
221 Spirale — Part 2 II 5 1098
222 Handycipher — Part 1 II 5 1096
223 The T52 Sturgeon Challenge — Part 9 II 5 1141
224 Notes of an Italian Soldier X 4 var
225 The SIGABA Challenge — Part 4 III 4 14324
226 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14385
227 Handycipher — Part 4 III 4 13426
228 The SZ42 Challenge — Part 7 II 4 1242
229 The T52 Sturgeon Challenge — Part 5 II 4 1141
230 Spirale — Part 3 II 4 1098
231 The T52 Sturgeon Challenge — Part 6 II 4 1141
232 Sigaba Part 2 III 4 13077
233 The Vatican Challenge — Part 2 X 3 var
234 The Vatican Challenge — Part 1 X 3 var
235 Extended Handycipher — Part 3 II 3 1096
236 Extended Handycipher — Part 1 II 3 1096
237 The SZ42 Challenge — Part 9 II 3 1327
238 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14403
239 Weakened ElsieFour — Part 3 II 3 1112
240 Differential Cryptanalysis — Part 2 II 3 1158
241 Weakened ElsieFour — Part 1 II 3 1118
242 Extended Handycipher — Part 2 II 3 1096
243 Extended Handycipher — Part 4 III 3 13426
244 Handycipher — Part 9 III 3 13487
245 Handycipher — Part 8 III 3 13487
246 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1154
247 Holographic Encryption — Part 2 II 3 1108
248 ElsieFour — Part 1 III 3 13579
249 Extended Handycipher — Part 5 III 3 13426
250 Double Column Transposition X 2 var
251 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
252 Handycipher — Part 7 III 2 13487
253 Extended Handycipher — Part 6 III 2 13426
254 ORYX Stream Cipher — Part 4b III 2 13250
255 The Heavy T52 Sturgeon Challenge — Part 3 III 2 14097
256 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14398
257 The SIGABA Challenge — Part 5 III 2 14342
258 Unknown Author X 2 var
259 Handycipher — Part 10 II 1 1138
260 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1103
261 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
262 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14419
263 Beale Ciphers X 1 var
264 Substitution Cipher with Non-Prefix Codes III 1 13104
265 The Vatican Challenge — Part 4 X 1 var
266 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14065
267 Hilly — Part 2 II 1 1113
268 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14401
269 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14076
270 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14405
271 The Vatican Challenge — Part 3 X 0 var
272 The SIGABA Challenge — Part 6 III 0 14363
273 The Vatican Challenge — Part 5 X 0 var
274 Double Column Transposition Reloaded — Part 3 III 0 13230
275 RSA Factoring Challenge: RSA-320 III 0 13133
276 RSA Factoring Challenge: RSA-330 III 0 13133
277 RSA Factoring Challenge: RSA-310 III 0 13133
278 RSA Factoring Challenge: RSA-1024 III 0 13133
279 RSA Factoring Challenge: RSA-300 III 0 13133
280 RSA Factoring Challenge: RSA-309 III 0 13133
281 RSA Factoring Challenge: RSA-340 III 0 13133
282 RSA Factoring Challenge: RSA-350 III 0 13133
283 RSA Factoring Challenge: RSA-390 III 0 13133
284 RSA Factoring Challenge: RSA-400 III 0 13133
285 RSA Factoring Challenge: RSA-380 III 0 13133
286 RSA Factoring Challenge: RSA-370 III 0 13133
287 RSA Factoring Challenge: RSA-360 III 0 13133
288 RSA Factoring Challenge: RSA-290 III 0 13133
289 RSA Factoring Challenge: RSA-280 III 0 13133
290 World Record Challenge: Break 65 Bits of AES III 0 13077
291 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13087
292 Kryptos X 0 var
293 Dorabella X 0 var
294 D'Agapeyeff X 0 var
295 Twelve-Year-Old Murder Case X 0 var
296 Kaskade-S/T — Part 4 II 0 1083
297 RSA Factoring Challenge: RSA-270 III 0 13133
298 RSA Factoring Challenge: RSA-896 III 0 13133
299 RSA Factoring Challenge: RSA-260 III 0 13133
300 The third ENIGMA M4 message X 0 var
301 Digital Signatures: DSA with Medium Fields III 0 13114
302 RSA Factoring Challenge: RSA-410 III 0 13133
303 RSA Factoring Challenge: RSA-420 III 0 13133
304 Double-Column Transposition/Granit — Part 3 II 0 1097
305 Spirale — Part 4 III 0 13349
306 Double-Column Transposition/Granit — Part 2 II 0 1097
307 Double-Column Transposition/Granit — Part 1 II 0 1097
308 Spanish Strip Cipher — Part 3 X 0 var
309 ORYX Stream Cipher — Part 4c III 0 13250
310 Weakened Granit — Part 2 II 0 1098
311 Weakened Granit — Part 3 II 0 1098
312 Weakened ElsieFour — Part 2 II 0 1118
313 "The Road" — Part 2 II 0 1127
314 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1103
315 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1103
316 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1103
317 Double Column Transposition Reloaded — Part 2 III 0 13230
318 Double Column Transposition Reloaded — Part 1 III 0 13230
319 RSA Factoring Challenge: RSA-460 III 0 13133
320 RSA Factoring Challenge: RSA-1536 III 0 13133
321 RSA Factoring Challenge: RSA-450 III 0 13133
322 RSA Factoring Challenge: RSA-440 III 0 13133
323 RSA Factoring Challenge: RSA-430 III 0 13133
324 RSA Factoring Challenge: RSA-470 III 0 13133
325 RSA Factoring Challenge: RSA-480 III 0 13133
326 RSA Factoring Challenge: RSA-2048 III 0 13133
327 ORYX Stream Cipher — Part 4d III 0 13203
328 RSA Factoring Challenge: RSA-617 III 0 13133
329 RSA Factoring Challenge: RSA-500 III 0 13133
330 RSA Factoring Challenge: RSA-490 III 0 13133
331 "The Road" — Part 3 II 0 1127
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:39 - 20.01.2021] Greko solved the Level I challenge 'Image Noise'    +++    [17:18 - 20.01.2021] Elivator solved the Level I challenge 'Number Sequence'    +++    [16:27 - 20.01.2021] Greko solved the Level I challenge 'Number Sequence — Part 7'    +++    [15:25 - 20.01.2021] SighBrrr solved the Level I challenge 'Number Sequence — Part 2'    +++    [02:48 - 20.01.2021] SighBrrr solved the Level I challenge 'Number Sequence'    +++