MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10993
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4085 100
2 Original Caesar Cipher I 2825 100
3 Number Sequence — Part 2 I 1993 100
4 Caesar Encryption I 1348 100
5 Beaver Code I 1115 100
6 Letter to the Templars — Part 1 I 972 100
7 Number Sequence — Part 3 I 937 100
8 Letter to the Templars — Part 2 I 781 100
9 Number Sequence — Part 4 I 775 100
10 A hidden word I 766 100
11 Letter to the Templars — Part 3 II 665 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 549 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 499 1083
15 Factorization Cipher — Part 1 I 473 100
16 Grille Cipher I 454 100
17 Advent-Challenge — Part 1 I 392 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 376 100
19 Number Sequence — Part 8 I 343 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 323 100
21 One-Time Pad with Flaws I 296 100
22 Alice's Birthday Party (Part 1) II 279 1082
23 Snow White and the seven dwarfs I 277 100
24 Alice's Birthday Party (Part 2) II 272 1082
25 From Russia with Love I 264 100
26 Modified Caesar Cipher I 218 100
27 Broadcasting and low exponent — RSA Attack II 217 1083
28 How do you become a big cryptographer? I 212 100
29 M-138 — Part 1 I 195 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 184 1082
31 Not-so-Secret Message from Malawi — Part I (RSA) II 184 1082
32 Reserve Hand Procedure — Part 1 I 184 100
33 Letter from the Alleged Countess Julie von Ortenburg I 168 100
34 Classical Ciphers^3 I 166 100
35 Enigma Messages with Repeated Letters — Part 1 I 160 100
36 Hybrid Encryption I II 159 1082
37 Nils away on travel I 154 100
38 RSA: Two different keys — same ciphertext II 151 1083
39 Pigpen with a twist — Part 1 I 146 100
40 Molehunt (Part 1/3) I 145 100
41 ¿No Hablas Español? No problemo! I 141 100
42 Factorization Cipher — Part 2 II 140 1084
43 Cryptanalysis Hacking Puzzles — Part 2 I 139 100
44 The Book Code: A Challenge for Bookworms I 138 100
45 Molehunt (Part 2/3) I 137 100
46 Number Sequence — Part 6 I 135 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 127 1082
49 M-138 — Part 2 II 122 1094
50 A Secret Message from Castle Mansfeld I 120 100
51 Image Noise I 118 100
52 Trifid Cipher I 115 100
53 A really long number sequence II 112 1084
54 ADFGVX — Part 2 I 112 100
55 Playfair Encryption I 105 100
56 ADFGVX — Part 1 I 105 100
57 Playfair with hints about the grid I 103 100
58 Double Columnar Transposition I 102 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 10 I 97 100
61 Enigma Combinatorics I 96 100
62 A hidden word — Part 2 I 96 100
63 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 94 100
64 Number Sequence — Part 9 I 93 100
65 Zodiac Cipher I 90 100
66 Heartbleed — Part 1 I 90 100
67 Factorization Cipher — Part 3 II 89 1084
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 87 100
70 Enigma Part 2 II 85 1082
71 Hill Cipher with Sudoku Key I 82 100
72 Partial Key Exposure with RSA — Part 1 II 81 1085
73 The Last Note I 81 100
74 Molehunt (Part 3/3) II 80 1082
75 ORYX Stream Cipher Part I II 79 1082
76 Number Sequence — Part 7 I 77 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Enigma Messages I 71 100
80 Smartcard RSA II 71 1082
81 Enigma Messages with Repeated Letters — Part 5 I 70 100
82 Multilingual Monoalphabetic Substitution I 69 100
83 AES key — encoded in the machine readable zone of a European ePassport II 67 1084
84 BCR code (Book-Caesar-RSA) II 67 1086
85 Cascading Encryption — Part 1/3 I 67 100
86 Turing Bombe Enigma I I 66 100
87 Enigma Messages with Repeated Letters — Part 4 I 64 100
88 Unusual encryption using a diophantine equation II 62 1084
89 Recycled One-Time Pad I 62 100
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 Modular Sequences I 57 100
93 M-138 — Part 3 II 57 1094
94 An Invisible Message I 56 100
95 The Einstein Enigma II 55 1113
96 Kaskade-S/T — Part 2 II 50 1082
97 News from Castle Mansfeld I 50 100
98 RSA Factoring Challenge: RSA-704 II 50 0
99 Unconcealed RSA messages II 48 1084
100 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
101 ORYX Stream Cipher Part II II 47 1082
102 New Year's Greetings — Part 1 I 46 100
103 Monoalphabetic substitution with camouflage — Part 4 I 46 100
104 Advent-Challenge — Part 2 II 45 1111
105 Keyshanc — Part 1 II 45 1085
106 Strange Message from Thessaloniki I 44 100
107 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 44 1082
108 RSA Factoring Challenge: RSA-210 II 44 0
109 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
110 Double Column Transposition — Part 4 II 44 1091
111 Summer Job II 44 1116
112 New Year's Greetings — Part 2 I 43 100
113 CMEA 1 II 42 1082
114 Weakened Granit — Part 1 I 42 100
115 Double Column Transposition — Part 2 II 41 1091
116 New Year's Greetings — Part 3 I 41 100
117 Find the right route — Part 1 I 41 101
118 Music Code — Part 2 II 40 1083
119 An 'unhearable' message I 40 100
120 Music Code — Part 1 I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Pigpen with a twist — Part 2 II 38 1084
123 Double Column Transposition — Part 3 II 37 1091
124 Advent Challenge — Part 3 II 37 1112
125 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1082
126 Advent Challenge — Part 4 II 36 1112
127 Pigpen with a twist — Part 3 II 36 1084
128 Ku Klux Klan X 36 var
129 Keyshanc — Part 2 II 35 1085
130 Lightweight Introduction to Lattices — Part 1 I 32 100
131 Homophonic Encryption — Part 1 II 32 1129
132 Kaskade-S/T — Part 3 II 31 1082
133 Trendy Messenger II 31 1116
134 Heartbleed — Part 3 II 30 1092
135 ORYX Stream Cipher — Part 3 (revised) II 30 1088
136 Fastest in the West II 30 1116
137 Double Column Transposition — Part 1 II 29 1091
138 RSA Factoring Challenge: RSA-220 II 29 0
139 Lattice Part 1 II 28 1082
140 Spanish Strip Cipher — Part 1 II 28 1091
141 Polyhomophonic Substitution — Part 1 I 28 100
142 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1085
143 Monoalphabetic Substitution with Nostradamus Flavor II 28 1125
144 CMEA 2 III 27 13071
145 Homophonic Encryption — Part 2 II 26 1129
146 RSA Factoring Challenge: RSA-230 II 26 0
147 M-138 — Part 4 II 25 1094
148 Homophonic Encryption — Part 3 II 25 1129
149 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
150 Typex — Part 1 II 25 1087
151 Homophonic Encryption — Part 4 II 24 1129
152 Wheatstone Cryptograph — Part 1 I 23 106
153 RSA with Special d III 23 13066
154 Lightweight Introduction to Lattices — Part 2 I 23 100
155 Spanish Strip Cipher — Part 2 II 22 1091
156 Typex — Part 2 II 22 1088
157 Handycipher made in love — Part 1 II 21 1125
158 Lightweight Introduction to Lattices — Part 3 II 21 1167
159 Find the right route — Part 2 I 19 101
160 Polyphonic Substitution Cipher — Part 1 II 19 1141
161 Breaking a Filter Generator II 18 1120
162 AES ECB Wrong Encoding II 18 1111
163 Purple 1 II 18 1082
164 Polyhomophonic Substitution — Part 2 II 17 1153
165 The LoRa Cipher: Logic Randomness — Part 1 II 17 1149
166 Sigaba Part 1 II 16 1082
167 Handycipher made in love — Part 2 II 16 1130
168 Polyphonic Substitution Cipher — Part 2 II 16 1146
169 Concealed Messages — Vigenère's Night Sky X 16 var
170 A Cloaked Substitution Cipher — Part 1 II 15 1135
171 Cipher ID — Part 1 II 15 1141
172 Weakened Handycipher — Part 1 II 15 1095
173 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1101
174 New Year's Greetings — Part 5 II 15 1099
175 Find the right route — Part 3 I 15 101
176 Flawed Usage of a OTP Cipher by the BND II 14 1096
177 Weakened Handycipher — Part 3 II 14 1095
178 A Cloaked Substitution Cipher — Part 2 II 14 1135
179 RSA Factoring Challenge: RSA-240 III 14 0
180 The T52 Sturgeon Challenge — Part 1 II 13 1133
181 Weakened Handycipher — Part 2 II 13 1095
182 Polyhomophonic Substitution — Part 3 II 13 1154
183 Cascading Encryption — Part 2/3 II 13 1088
184 Cascading Encryption — Part 3/3 II 12 1088
185 RSA Factoring Challenge: RSA-250 III 12 0
186 The T52 Sturgeon Challenge — Part 2 II 12 1133
187 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1083
188 ORYX Stream Cipher — Part 4a II 11 1091
189 RSA Factoring Challenge: RSA-232 III 11 0
190 Kaskade-S/T — Part 5 II 10 1083
191 The T52 Sturgeon Challenge — Part 3 II 10 1133
192 Akelarre Part 1 II 10 1082
193 The SZ42 Challenge — Part 2 II 9 1171
194 The SZ42 Challenge — Part 1 II 9 1168
195 The T52 Sturgeon Challenge — Part 4 II 9 1133
196 Hilly — Part 1 II 8 1104
197 The SIGABA Challenge — Part 1 II 8 1150
198 The SIGABA Challenge — Part 2 II 8 1150
199 Double Column Transposition — Part 5 II 8 1092
200 The SZ42 Challenge — Part 4 II 7 1175
201 The SZ42 Challenge — Part 3 II 7 1173
202 Handycipher — Part 2 II 7 1094
203 Handycipher — Part 3 III 6 13290
204 The T52 Sturgeon Challenge — Part 12 II 6 1134
205 The T52 Sturgeon Challenge — Part 8 II 6 1134
206 The T52 Sturgeon Challenge — Part 11 II 6 1134
207 Holographic Encryption — Part 1 II 6 1106
208 The SZ42 Challenge — Part 5 II 6 1176
209 The SIGABA Challenge — Part 3 III 6 14138
210 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1108
211 The T52 Sturgeon Challenge — Part 10 II 5 1134
212 The T52 Sturgeon Challenge — Part 9 II 5 1134
213 Weakened Handycipher — Part 4 II 5 1101
214 Handycipher — Part 6 III 5 13398
215 The T52 Sturgeon Challenge — Part 7 II 5 1134
216 The SZ42 Challenge — Part 6 II 5 1183
217 The SZ42 Challenge — Part 8 II 5 1191
218 Weakened Handycipher — Part 6 II 5 1101
219 "The Road" — Part 1 II 5 1122
220 Weakened Handycipher — Part 5 II 5 1101
221 Spirale — Part 2 II 5 1096
222 Sigaba Part 2 III 5 13066
223 Spirale — Part 1 II 5 1096
224 Handycipher — Part 5 III 5 13398
225 Handycipher — Part 1 II 5 1094
226 The SZ42 Challenge — Part 7 II 4 1190
227 The T52 Sturgeon Challenge — Part 5 II 4 1134
228 Spirale — Part 3 II 4 1096
229 The T52 Sturgeon Challenge — Part 6 II 4 1134
230 Handycipher — Part 4 III 4 13398
231 The SIGABA Challenge — Part 4 III 4 14147
232 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14189
233 Notes of an Italian Soldier X 4 var
234 Differential Cryptanalysis — Part 2 II 3 1147
235 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14202
236 Extended Handycipher — Part 3 II 3 1095
237 The Vatican Challenge — Part 2 X 3 var
238 Weakened ElsieFour — Part 3 II 3 1110
239 Extended Handycipher — Part 1 II 3 1095
240 Weakened ElsieFour — Part 1 II 3 1115
241 The Vatican Challenge — Part 1 X 3 var
242 Extended Handycipher — Part 2 II 3 1095
243 The SZ42 Challenge — Part 9 II 3 1209
244 Handycipher — Part 9 III 3 13455
245 Handycipher — Part 8 III 3 13455
246 The SZ42 Challenge — Part 11 II 3 1233
247 Extended Handycipher — Part 4 III 3 13398
248 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1144
249 The SZ42 Challenge — Part 10 II 3 1233
250 ElsieFour — Part 1 III 3 13538
251 Holographic Encryption — Part 2 II 3 1106
252 Extended Handycipher — Part 5 III 3 13398
253 ORYX Stream Cipher — Part 4b III 2 13232
254 The SIGABA Challenge — Part 5 III 2 14160
255 Extended Handycipher — Part 6 III 2 13398
256 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13978
257 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
258 Unknown Author X 2 var
259 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14199
260 Handycipher — Part 7 III 2 13455
261 Double Column Transposition X 2 var
262 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14213
263 The SIGABA Challenge — Part 6 III 1 14174
264 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13953
265 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14200
266 Beale Ciphers X 1 var
267 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
268 Hilly — Part 2 II 1 1110
269 Substitution Cipher with Non-Prefix Codes III 1 13092
270 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1101
271 Handycipher — Part 10 II 1 1132
272 The Vatican Challenge — Part 4 X 1 var
273 RSA Factoring Challenge: RSA-410 III 0 13120
274 RSA Factoring Challenge: RSA-420 III 0 13120
275 RSA Factoring Challenge: RSA-430 III 0 13120
276 RSA Factoring Challenge: RSA-440 III 0 13120
277 RSA Factoring Challenge: RSA-400 III 0 13120
278 RSA Factoring Challenge: RSA-390 III 0 13120
279 RSA Factoring Challenge: RSA-380 III 0 13120
280 RSA Factoring Challenge: RSA-1024 III 0 13120
281 RSA Factoring Challenge: RSA-290 III 0 13120
282 RSA Factoring Challenge: RSA-300 III 0 13120
283 RSA Factoring Challenge: RSA-309 III 0 13120
284 RSA Factoring Challenge: RSA-280 III 0 13120
285 RSA Factoring Challenge: RSA-896 III 0 13120
286 RSA Factoring Challenge: RSA-260 III 0 13120
287 RSA Factoring Challenge: RSA-270 III 0 13120
288 RSA Factoring Challenge: RSA-450 III 0 13120
289 RSA Factoring Challenge: RSA-310 III 0 13120
290 RSA Factoring Challenge: RSA-360 III 0 13120
291 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14203
292 RSA Factoring Challenge: RSA-350 III 0 13120
293 RSA Factoring Challenge: RSA-340 III 0 13120
294 RSA Factoring Challenge: RSA-320 III 0 13120
295 RSA Factoring Challenge: RSA-330 III 0 13120
296 RSA Factoring Challenge: RSA-370 III 0 13120
297 The Vatican Challenge — Part 5 X 0 var
298 World Record Challenge: Break 65 Bits of AES III 0 13066
299 Weakened ElsieFour — Part 2 II 0 1115
300 Double-Column Transposition/Granit — Part 1 II 0 1096
301 Dorabella X 0 var
302 ORYX Stream Cipher — Part 4c III 0 13232
303 "The Road" — Part 3 II 0 1122
304 "The Road" — Part 2 II 0 1122
305 Spanish Strip Cipher — Part 3 X 0 var
306 Double-Column Transposition/Granit — Part 2 II 0 1096
307 Kryptos X 0 var
308 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1101
309 Weakened Granit — Part 2 II 0 1097
310 Weakened Granit — Part 3 II 0 1097
311 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1101
312 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1101
313 Double-Column Transposition/Granit — Part 3 II 0 1096
314 Spirale — Part 4 III 0 13325
315 D'Agapeyeff X 0 var
316 Double Column Transposition Reloaded — Part 3 III 0 13212
317 RSA Factoring Challenge: RSA-500 III 0 13120
318 RSA Factoring Challenge: RSA-617 III 0 13120
319 RSA Factoring Challenge: RSA-2048 III 0 13120
320 RSA Factoring Challenge: RSA-490 III 0 13120
321 RSA Factoring Challenge: RSA-480 III 0 13120
322 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13962
323 RSA Factoring Challenge: RSA-1536 III 0 13120
324 RSA Factoring Challenge: RSA-470 III 0 13120
325 The third ENIGMA M4 message X 0 var
326 Digital Signatures: DSA with Medium Fields III 0 13101
327 ORYX Stream Cipher — Part 4d III 0 13187
328 Double Column Transposition Reloaded — Part 1 III 0 13212
329 Double Column Transposition Reloaded — Part 2 III 0 13212
330 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13076
331 Twelve-Year-Old Murder Case X 0 var
332 Kaskade-S/T — Part 4 II 0 1083
333 The Vatican Challenge — Part 3 X 0 var
334 RSA Factoring Challenge: RSA-460 III 0 13120
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:11 - 07.05.2021] ExAstris solved the Level I challenge 'Image Noise'    +++    [22:39 - 06.05.2021] Konubixe solved the Level I challenge 'A modified homophonic cipher with reduced alphabets — Part 2'    +++    [22:01 - 06.05.2021] Jericho solved the Level I challenge 'ADFGVX — Part 1'    +++    [21:25 - 06.05.2021] Jericho solved the Level I challenge '¿No Hablas Español? No problemo!'    +++    [21:00 - 06.05.2021] Jericho solved the Level I challenge 'A hidden word — Part 2'    +++