MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10936
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4061 100
2 Original Caesar Cipher I 2804 100
3 Number Sequence — Part 2 I 1983 100
4 Caesar Encryption I 1339 100
5 Beaver Code I 1105 100
6 Letter to the Templars — Part 1 I 965 100
7 Number Sequence — Part 3 I 934 100
8 Letter to the Templars — Part 2 I 776 100
9 Number Sequence — Part 4 I 771 100
10 A hidden word I 761 100
11 Letter to the Templars — Part 3 II 661 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 545 100
13 Monoalphabetic Substitution I 527 100
14 Cracking SHA1-Hashed Passwords II 498 1083
15 Factorization Cipher — Part 1 I 471 100
16 Grille Cipher I 453 100
17 Advent-Challenge — Part 1 I 391 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 374 100
19 Number Sequence — Part 8 I 340 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 320 100
21 One-Time Pad with Flaws I 294 100
22 Alice's Birthday Party (Part 1) II 279 1082
23 Snow White and the seven dwarfs I 276 100
24 Alice's Birthday Party (Part 2) II 272 1082
25 From Russia with Love I 262 100
26 Modified Caesar Cipher I 217 100
27 Broadcasting and low exponent — RSA Attack II 217 1083
28 How do you become a big cryptographer? I 210 100
29 M-138 — Part 1 I 193 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 184 1082
31 Not-so-Secret Message from Malawi — Part I (RSA) II 183 1082
32 Reserve Hand Procedure — Part 1 I 182 100
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 166 100
35 Enigma Messages with Repeated Letters — Part 1 I 160 100
36 Hybrid Encryption I II 159 1082
37 Nils away on travel I 154 100
38 RSA: Two different keys — same ciphertext II 150 1084
39 Pigpen with a twist — Part 1 I 145 100
40 Molehunt (Part 1/3) I 143 100
41 Factorization Cipher — Part 2 II 139 1084
42 The Book Code: A Challenge for Bookworms I 138 100
43 ¿No Hablas Español? No problemo! I 138 100
44 Molehunt (Part 2/3) I 136 100
45 Cryptanalysis Hacking Puzzles — Part 2 I 136 100
46 Number Sequence — Part 6 I 132 100
47 Autokey Cipher I 131 100
48 Enigma Part 1 II 127 1082
49 M-138 — Part 2 II 120 1094
50 A Secret Message from Castle Mansfeld I 119 100
51 Trifid Cipher I 114 100
52 Image Noise I 114 100
53 ADFGVX — Part 2 I 111 100
54 A really long number sequence II 111 1084
55 Playfair Encryption I 105 100
56 ADFGVX — Part 1 I 103 100
57 Kaskade-S/T — Part 1 I 102 100
58 Playfair with hints about the grid I 102 100
59 Double Columnar Transposition I 102 100
60 Enigma Combinatorics I 96 100
61 Number Sequence — Part 10 I 95 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 94 100
63 A hidden word — Part 2 I 94 100
64 Number Sequence — Part 9 I 91 100
65 Heartbleed — Part 1 I 90 100
66 ECDH-Key Exchange for Beginners I 89 100
67 Factorization Cipher — Part 3 II 88 1085
68 Zodiac Cipher I 88 100
69 Enigma Part 2 II 84 1082
70 Number Sequence — Part 5 I 83 100
71 Hill Cipher with Sudoku Key I 82 100
72 Partial Key Exposure with RSA — Part 1 II 81 1085
73 The Last Note I 80 100
74 ORYX Stream Cipher Part I II 79 1082
75 Molehunt (Part 3/3) II 79 1082
76 Number Sequence — Part 7 I 75 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Smartcard RSA II 71 1082
80 Enigma Messages with Repeated Letters — Part 5 I 70 100
81 Enigma Messages I 70 100
82 Multilingual Monoalphabetic Substitution I 69 100
83 Cascading Encryption — Part 1/3 I 67 100
84 BCR code (Book-Caesar-RSA) II 67 1086
85 AES key — encoded in the machine readable zone of a European ePassport II 66 1085
86 Turing Bombe Enigma I I 65 100
87 Enigma Messages with Repeated Letters — Part 4 I 64 100
88 Unusual encryption using a diophantine equation II 62 1084
89 Recycled One-Time Pad I 62 100
90 Heartbleed — Part 2 I 60 100
91 Monoalphabetic substitution with camouflage — Part 1 I 59 100
92 Modular Sequences I 57 100
93 An Invisible Message I 56 100
94 M-138 — Part 3 II 56 1094
95 The Einstein Enigma II 53 1113
96 RSA Factoring Challenge: RSA-704 II 50 0
97 Kaskade-S/T — Part 2 II 50 1083
98 News from Castle Mansfeld I 48 100
99 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
100 Unconcealed RSA messages II 48 1084
101 ORYX Stream Cipher Part II II 47 1082
102 Monoalphabetic substitution with camouflage — Part 4 I 46 100
103 New Year's Greetings — Part 1 I 45 100
104 Keyshanc — Part 1 II 45 1085
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 44 1082
106 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
107 Advent-Challenge — Part 2 II 44 1112
108 RSA Factoring Challenge: RSA-210 II 44 0
109 Double Column Transposition — Part 4 II 43 1092
110 Summer Job II 43 1117
111 Weakened Granit — Part 1 I 42 100
112 Strange Message from Thessaloniki I 42 100
113 New Year's Greetings — Part 2 I 42 100
114 CMEA 1 II 41 1082
115 Double Column Transposition — Part 2 II 41 1091
116 Music Code — Part 2 II 40 1083
117 New Year's Greetings — Part 3 I 40 100
118 Music Code — Part 1 I 40 100
119 An 'unhearable' message I 40 100
120 Find the right route — Part 1 I 39 101
121 New Year's Greetings — Part 4 I 38 100
122 Double Column Transposition — Part 3 II 37 1091
123 Pigpen with a twist — Part 2 II 37 1084
124 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1082
125 Advent Challenge — Part 4 II 36 1112
126 Advent Challenge — Part 3 II 36 1112
127 Ku Klux Klan X 36 var
128 Pigpen with a twist — Part 3 II 35 1084
129 Keyshanc — Part 2 II 35 1085
130 Homophonic Encryption — Part 1 II 32 1130
131 Lightweight Introduction to Lattices — Part 1 I 31 100
132 Kaskade-S/T — Part 3 II 31 1083
133 Trendy Messenger II 31 1117
134 Heartbleed — Part 3 II 30 1093
135 Fastest in the West II 30 1117
136 ORYX Stream Cipher — Part 3 (revised) II 30 1088
137 RSA Factoring Challenge: RSA-220 II 29 0
138 Double Column Transposition — Part 1 II 29 1091
139 Spanish Strip Cipher — Part 1 II 28 1091
140 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1085
141 Lattice Part 1 II 28 1083
142 CMEA 2 III 27 13074
143 Monoalphabetic Substitution with Nostradamus Flavor II 27 1126
144 Polyhomophonic Substitution — Part 1 I 27 100
145 RSA Factoring Challenge: RSA-230 II 26 0
146 Homophonic Encryption — Part 2 II 26 1130
147 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
148 Homophonic Encryption — Part 3 II 25 1130
149 Typex — Part 1 II 25 1088
150 Homophonic Encryption — Part 4 II 24 1130
151 Lightweight Introduction to Lattices — Part 2 I 23 100
152 RSA with Special d III 23 13068
153 M-138 — Part 4 II 23 1094
154 Typex — Part 2 II 22 1088
155 Spanish Strip Cipher — Part 2 II 22 1091
156 Handycipher made in love — Part 1 II 21 1126
157 Lightweight Introduction to Lattices — Part 3 II 21 1171
158 AES ECB Wrong Encoding II 18 1112
159 Polyphonic Substitution Cipher — Part 1 II 18 1143
160 Find the right route — Part 2 I 18 101
161 Breaking a Filter Generator II 18 1120
162 Purple 1 II 17 1082
163 The LoRa Cipher: Logic Randomness — Part 1 II 17 1151
164 Polyhomophonic Substitution — Part 2 II 16 1155
165 Concealed Messages — Vigenère's Night Sky X 16 var
166 Handycipher made in love — Part 2 II 16 1131
167 Weakened Handycipher — Part 1 II 15 1095
168 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1101
169 Cipher ID — Part 1 II 15 1143
170 Sigaba Part 1 II 15 1082
171 A Cloaked Substitution Cipher — Part 1 II 15 1136
172 Polyphonic Substitution Cipher — Part 2 II 15 1147
173 New Year's Greetings — Part 5 II 15 1100
174 A Cloaked Substitution Cipher — Part 2 II 14 1136
175 Flawed Usage of a OTP Cipher by the BND II 14 1097
176 RSA Factoring Challenge: RSA-240 III 14 0
177 Find the right route — Part 3 I 14 101
178 Weakened Handycipher — Part 3 II 14 1095
179 The T52 Sturgeon Challenge — Part 1 II 13 1134
180 Cascading Encryption — Part 2/3 II 13 1088
181 Weakened Handycipher — Part 2 II 13 1095
182 Cascading Encryption — Part 3/3 II 12 1088
183 Polyhomophonic Substitution — Part 3 II 12 1156
184 The T52 Sturgeon Challenge — Part 2 II 12 1134
185 RSA Factoring Challenge: RSA-250 III 12 0
186 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1083
187 ORYX Stream Cipher — Part 4a II 11 1091
188 RSA Factoring Challenge: RSA-232 III 11 0
189 The T52 Sturgeon Challenge — Part 3 II 10 1134
190 Akelarre Part 1 II 10 1082
191 Kaskade-S/T — Part 5 II 10 1083
192 The SZ42 Challenge — Part 2 II 9 1175
193 The SZ42 Challenge — Part 1 II 9 1172
194 The T52 Sturgeon Challenge — Part 4 II 9 1134
195 Double Column Transposition — Part 5 II 8 1092
196 Hilly — Part 1 II 8 1105
197 The SIGABA Challenge — Part 1 II 8 1152
198 The SZ42 Challenge — Part 4 II 7 1180
199 The SIGABA Challenge — Part 2 II 7 1152
200 Handycipher — Part 2 II 7 1095
201 The SZ42 Challenge — Part 3 II 7 1177
202 The T52 Sturgeon Challenge — Part 11 II 6 1136
203 The T52 Sturgeon Challenge — Part 12 II 6 1136
204 The T52 Sturgeon Challenge — Part 8 II 6 1136
205 Holographic Encryption — Part 1 II 6 1106
206 The SZ42 Challenge — Part 5 II 6 1181
207 Handycipher — Part 3 III 6 13294
208 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1108
209 The T52 Sturgeon Challenge — Part 10 II 5 1136
210 The T52 Sturgeon Challenge — Part 9 II 5 1136
211 Handycipher — Part 6 III 5 13403
212 "The Road" — Part 1 II 5 1123
213 Weakened Handycipher — Part 4 II 5 1101
214 The SZ42 Challenge — Part 8 II 5 1198
215 The SIGABA Challenge — Part 3 III 5 14168
216 The SZ42 Challenge — Part 6 II 5 1189
217 Handycipher — Part 5 III 5 13403
218 The T52 Sturgeon Challenge — Part 7 II 5 1136
219 Weakened Handycipher — Part 6 II 5 1101
220 Weakened Handycipher — Part 5 II 5 1101
221 Spirale — Part 1 II 5 1097
222 Handycipher — Part 1 II 5 1095
223 Spirale — Part 2 II 5 1097
224 The SIGABA Challenge — Part 4 III 4 14177
225 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14223
226 Spirale — Part 3 II 4 1097
227 The SZ42 Challenge — Part 7 II 4 1196
228 Handycipher — Part 4 III 4 13403
229 Sigaba Part 2 III 4 13068
230 The T52 Sturgeon Challenge — Part 6 II 4 1136
231 Notes of an Italian Soldier X 4 var
232 The T52 Sturgeon Challenge — Part 5 II 4 1136
233 Extended Handycipher — Part 3 II 3 1095
234 Differential Cryptanalysis — Part 2 II 3 1149
235 Extended Handycipher — Part 1 II 3 1095
236 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1145
237 The Vatican Challenge — Part 2 X 3 var
238 The Vatican Challenge — Part 1 X 3 var
239 Weakened ElsieFour — Part 1 II 3 1116
240 Extended Handycipher — Part 2 II 3 1095
241 Weakened ElsieFour — Part 3 II 3 1110
242 The SZ42 Challenge — Part 10 II 3 1251
243 The SZ42 Challenge — Part 9 II 3 1220
244 The SZ42 Challenge — Part 11 II 3 1251
245 Extended Handycipher — Part 5 III 3 13403
246 Extended Handycipher — Part 4 III 3 13403
247 Handycipher — Part 8 III 3 13461
248 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14236
249 Holographic Encryption — Part 2 II 3 1106
250 Handycipher — Part 9 III 3 13461
251 ElsieFour — Part 1 III 3 13546
252 The Heavy T52 Sturgeon Challenge — Part 3 III 2 14000
253 Extended Handycipher — Part 6 III 2 13403
254 ORYX Stream Cipher — Part 4b III 2 13236
255 The SIGABA Challenge — Part 5 III 2 14191
256 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14233
257 Handycipher — Part 7 III 2 13461
258 Unknown Author X 2 var
259 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
260 Double Column Transposition X 2 var
261 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
262 Substitution Cipher with Non-Prefix Codes III 1 13095
263 The SIGABA Challenge — Part 6 III 1 14207
264 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14248
265 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14234
266 Handycipher — Part 10 II 1 1133
267 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13974
268 The Vatican Challenge — Part 4 X 1 var
269 Hilly — Part 2 II 1 1110
270 Beale Ciphers X 1 var
271 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1101
272 Double-Column Transposition/Granit — Part 3 II 0 1096
273 RSA Factoring Challenge: RSA-400 III 0 13122
274 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1101
275 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1101
276 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1101
277 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14238
278 RSA Factoring Challenge: RSA-360 III 0 13122
279 Double-Column Transposition/Granit — Part 2 II 0 1096
280 RSA Factoring Challenge: RSA-380 III 0 13122
281 Double-Column Transposition/Granit — Part 1 II 0 1096
282 Kryptos X 0 var
283 RSA Factoring Challenge: RSA-370 III 0 13122
284 RSA Factoring Challenge: RSA-350 III 0 13122
285 RSA Factoring Challenge: RSA-390 III 0 13122
286 RSA Factoring Challenge: RSA-340 III 0 13122
287 Spirale — Part 4 III 0 13330
288 RSA Factoring Challenge: RSA-896 III 0 13122
289 RSA Factoring Challenge: RSA-270 III 0 13122
290 RSA Factoring Challenge: RSA-260 III 0 13122
291 Weakened Granit — Part 3 II 0 1097
292 Weakened Granit — Part 2 II 0 1097
293 RSA Factoring Challenge: RSA-280 III 0 13122
294 RSA Factoring Challenge: RSA-290 III 0 13122
295 RSA Factoring Challenge: RSA-320 III 0 13122
296 RSA Factoring Challenge: RSA-330 III 0 13122
297 RSA Factoring Challenge: RSA-310 III 0 13122
298 RSA Factoring Challenge: RSA-1024 III 0 13122
299 RSA Factoring Challenge: RSA-300 III 0 13122
300 RSA Factoring Challenge: RSA-309 III 0 13122
301 RSA Factoring Challenge: RSA-410 III 0 13122
302 RSA Factoring Challenge: RSA-420 III 0 13122
303 "The Road" — Part 3 II 0 1123
304 The Vatican Challenge — Part 5 X 0 var
305 "The Road" — Part 2 II 0 1123
306 Digital Signatures: DSA with Medium Fields III 0 13104
307 RSA Factoring Challenge: RSA-2048 III 0 13122
308 The third ENIGMA M4 message X 0 var
309 D'Agapeyeff X 0 var
310 The Vatican Challenge — Part 3 X 0 var
311 ORYX Stream Cipher — Part 4d III 0 13190
312 Double Column Transposition Reloaded — Part 1 III 0 13216
313 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13078
314 Twelve-Year-Old Murder Case X 0 var
315 Double Column Transposition Reloaded — Part 3 III 0 13216
316 Kaskade-S/T — Part 4 II 0 1083
317 RSA Factoring Challenge: RSA-617 III 0 13122
318 RSA Factoring Challenge: RSA-500 III 0 13122
319 World Record Challenge: Break 65 Bits of AES III 0 13068
320 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13982
321 RSA Factoring Challenge: RSA-450 III 0 13122
322 RSA Factoring Challenge: RSA-440 III 0 13122
323 RSA Factoring Challenge: RSA-430 III 0 13122
324 Weakened ElsieFour — Part 2 II 0 1116
325 ORYX Stream Cipher — Part 4c III 0 13236
326 RSA Factoring Challenge: RSA-460 III 0 13122
327 RSA Factoring Challenge: RSA-480 III 0 13122
328 RSA Factoring Challenge: RSA-490 III 0 13122
329 Spanish Strip Cipher — Part 3 X 0 var
330 Dorabella X 0 var
331 RSA Factoring Challenge: RSA-1536 III 0 13122
332 RSA Factoring Challenge: RSA-470 III 0 13122
333 Double Column Transposition Reloaded — Part 2 III 0 13216
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:18 - 16.04.2021] FoM solved the Level II challenge 'Unusual encryption using a diophantine equation'    +++    [00:03 - 16.04.2021] Ammonym solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [18:44 - 15.04.2021] anonym404 solved the Level I challenge 'Find the right route — Part 2'    +++    [18:38 - 15.04.2021] sir5 solved the Level I challenge 'Modified Caesar Cipher'    +++    [06:25 - 15.04.2021] sir5 solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++