MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10841
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4016 100
2 Original Caesar Cipher I 2772 100
3 Number Sequence — Part 2 I 1962 100
4 Caesar Encryption I 1323 100
5 Beaver Code I 1091 100
6 Letter to the Templars — Part 1 I 955 100
7 Number Sequence — Part 3 I 920 100
8 Letter to the Templars — Part 2 I 764 100
9 Number Sequence — Part 4 I 763 100
10 A hidden word I 749 100
11 Letter to the Templars — Part 3 II 650 1087
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 536 100
13 Monoalphabetic Substitution I 520 100
14 Cracking SHA1-Hashed Passwords II 492 1083
15 Factorization Cipher — Part 1 I 464 100
16 Grille Cipher I 444 100
17 Advent-Challenge — Part 1 I 380 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 370 100
19 Number Sequence — Part 8 I 331 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 318 100
21 One-Time Pad with Flaws I 293 100
22 Alice's Birthday Party (Part 1) II 277 1082
23 Snow White and the seven dwarfs I 271 100
24 Alice's Birthday Party (Part 2) II 271 1082
25 From Russia with Love I 257 100
26 Broadcasting and low exponent — RSA Attack II 216 1084
27 Modified Caesar Cipher I 215 100
28 How do you become a big cryptographer? I 205 100
29 M-138 — Part 1 I 189 100
30 Reserve Hand Procedure — Part 1 I 182 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 182 1082
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 181 1082
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 164 100
35 Enigma Messages with Repeated Letters — Part 1 I 160 100
36 Hybrid Encryption I II 158 1082
37 Nils away on travel I 152 100
38 RSA: Two different keys — same ciphertext II 150 1084
39 Pigpen with a twist — Part 1 I 144 100
40 Molehunt (Part 1/3) I 141 100
41 Factorization Cipher — Part 2 II 139 1085
42 The Book Code: A Challenge for Bookworms I 137 100
43 ¿No Hablas Español? No problemo! I 136 100
44 Molehunt (Part 2/3) I 135 100
45 Cryptanalysis Hacking Puzzles — Part 2 I 131 100
46 Number Sequence — Part 6 I 129 100
47 Enigma Part 1 II 127 1082
48 Autokey Cipher I 127 100
49 M-138 — Part 2 II 118 1094
50 A Secret Message from Castle Mansfeld I 118 100
51 Trifid Cipher I 114 100
52 A really long number sequence II 111 1084
53 ADFGVX — Part 2 I 111 100
54 Image Noise I 111 100
55 ADFGVX — Part 1 I 103 100
56 Playfair Encryption I 103 100
57 Kaskade-S/T — Part 1 I 101 100
58 Playfair with hints about the grid I 101 100
59 Double Columnar Transposition I 100 100
60 Enigma Combinatorics I 96 100
61 Number Sequence — Part 10 I 95 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
63 Number Sequence — Part 9 I 91 100
64 A hidden word — Part 2 I 89 100
65 Heartbleed — Part 1 I 89 100
66 ECDH-Key Exchange for Beginners I 89 100
67 Factorization Cipher — Part 3 II 88 1085
68 Zodiac Cipher I 86 100
69 Enigma Part 2 II 84 1082
70 Partial Key Exposure with RSA — Part 1 II 81 1085
71 Hill Cipher with Sudoku Key I 81 100
72 Number Sequence — Part 5 I 81 100
73 ORYX Stream Cipher Part I II 79 1082
74 The Last Note I 79 100
75 Molehunt (Part 3/3) II 78 1082
76 Number Sequence — Part 7 I 75 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Smartcard RSA II 71 1082
80 Enigma Messages I 70 100
81 Enigma Messages with Repeated Letters — Part 5 I 70 100
82 Multilingual Monoalphabetic Substitution I 69 100
83 BCR code (Book-Caesar-RSA) II 67 1087
84 Cascading Encryption — Part 1/3 I 67 100
85 AES key — encoded in the machine readable zone of a European ePassport II 66 1085
86 Turing Bombe Enigma I I 65 100
87 Enigma Messages with Repeated Letters — Part 4 I 64 100
88 Recycled One-Time Pad I 62 100
89 Unusual encryption using a diophantine equation II 61 1084
90 Heartbleed — Part 2 I 60 100
91 Monoalphabetic substitution with camouflage — Part 1 I 59 100
92 An Invisible Message I 56 100
93 Modular Sequences I 55 100
94 M-138 — Part 3 II 54 1094
95 The Einstein Enigma II 52 1115
96 Kaskade-S/T — Part 2 II 50 1083
97 RSA Factoring Challenge: RSA-704 II 49 0
98 News from Castle Mansfeld I 48 100
99 Monoalphabetic substitution with camouflage — Part 2 II 48 1085
100 Unconcealed RSA messages II 48 1084
101 ORYX Stream Cipher Part II II 47 1082
102 Monoalphabetic substitution with camouflage — Part 4 I 46 100
103 New Year's Greetings — Part 1 I 45 100
104 Keyshanc — Part 1 II 45 1086
105 Monoalphabetic substitution with camouflage — Part 3 II 44 1085
106 Advent-Challenge — Part 2 II 44 1113
107 RSA Factoring Challenge: RSA-210 II 44 0
108 Summer Job II 43 1119
109 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 43 1083
110 Strange Message from Thessaloniki I 42 100
111 Double Column Transposition — Part 4 II 42 1092
112 New Year's Greetings — Part 2 I 42 100
113 Weakened Granit — Part 1 I 42 100
114 CMEA 1 II 41 1082
115 Music Code — Part 1 I 40 100
116 An 'unhearable' message I 40 100
117 Double Column Transposition — Part 2 II 40 1092
118 Music Code — Part 2 II 40 1083
119 New Year's Greetings — Part 3 I 39 100
120 New Year's Greetings — Part 4 I 37 100
121 Pigpen with a twist — Part 2 II 37 1084
122 Advent Challenge — Part 3 II 36 1113
123 Not-so-Secret Message from Malawi — Part II (ECC) II 36 1082
124 Ku Klux Klan X 36 var
125 Advent Challenge — Part 4 II 36 1113
126 Double Column Transposition — Part 3 II 35 1092
127 Pigpen with a twist — Part 3 II 35 1084
128 Keyshanc — Part 2 II 35 1086
129 Find the right route — Part 1 I 33 101
130 Homophonic Encryption — Part 1 II 32 1133
131 Kaskade-S/T — Part 3 II 31 1083
132 Trendy Messenger II 31 1119
133 ORYX Stream Cipher — Part 3 (revised) II 30 1089
134 Heartbleed — Part 3 II 30 1093
135 Fastest in the West II 30 1119
136 RSA Factoring Challenge: RSA-220 II 29 0
137 Lightweight Introduction to Lattices — Part 1 I 29 100
138 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1085
139 Spanish Strip Cipher — Part 1 II 28 1092
140 Double Column Transposition — Part 1 II 28 1092
141 Lattice Part 1 II 28 1083
142 CMEA 2 III 27 13079
143 Monoalphabetic Substitution with Nostradamus Flavor II 27 1129
144 Polyhomophonic Substitution — Part 1 I 26 100
145 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
146 Homophonic Encryption — Part 2 II 25 1133
147 Typex — Part 1 II 25 1088
148 RSA Factoring Challenge: RSA-230 II 25 0
149 Homophonic Encryption — Part 3 II 24 1133
150 Homophonic Encryption — Part 4 II 23 1133
151 RSA with Special d III 23 13073
152 Spanish Strip Cipher — Part 2 II 22 1092
153 Lightweight Introduction to Lattices — Part 2 I 22 100
154 Typex — Part 2 II 22 1088
155 Lightweight Introduction to Lattices — Part 3 II 21 1181
156 Handycipher made in love — Part 1 II 21 1129
157 M-138 — Part 4 II 19 1094
158 Polyphonic Substitution Cipher — Part 1 II 18 1147
159 Breaking a Filter Generator II 17 1122
160 Purple 1 II 17 1082
161 AES ECB Wrong Encoding II 17 1113
162 The LoRa Cipher: Logic Randomness — Part 1 II 17 1156
163 Concealed Messages — Vigenère's Night Sky X 16 var
164 Handycipher made in love — Part 2 II 16 1134
165 Polyhomophonic Substitution — Part 2 II 16 1161
166 A Cloaked Substitution Cipher — Part 1 II 15 1140
167 New Year's Greetings — Part 5 II 15 1100
168 Sigaba Part 1 II 15 1082
169 Polyphonic Substitution Cipher — Part 2 II 15 1152
170 Weakened Handycipher — Part 1 II 15 1096
171 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1102
172 Cipher ID — Part 1 II 14 1147
173 A Cloaked Substitution Cipher — Part 2 II 14 1140
174 RSA Factoring Challenge: RSA-240 III 14 0
175 Flawed Usage of a OTP Cipher by the BND II 14 1097
176 Weakened Handycipher — Part 3 II 14 1096
177 The T52 Sturgeon Challenge — Part 1 II 13 1137
178 Cascading Encryption — Part 2/3 II 13 1088
179 Weakened Handycipher — Part 2 II 13 1096
180 Find the right route — Part 3 I 13 102
181 Polyhomophonic Substitution — Part 3 II 12 1163
182 RSA Factoring Challenge: RSA-250 III 12 0
183 The T52 Sturgeon Challenge — Part 2 II 12 1137
184 Find the right route — Part 2 I 12 101
185 Cascading Encryption — Part 3/3 II 12 1088
186 ORYX Stream Cipher — Part 4a II 11 1092
187 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1083
188 RSA Factoring Challenge: RSA-232 III 11 0
189 The T52 Sturgeon Challenge — Part 3 II 10 1137
190 Kaskade-S/T — Part 5 II 10 1083
191 Akelarre Part 1 II 10 1082
192 The T52 Sturgeon Challenge — Part 4 II 9 1137
193 Double Column Transposition — Part 5 II 8 1092
194 Hilly — Part 1 II 8 1106
195 The SZ42 Challenge — Part 2 II 8 1186
196 The SZ42 Challenge — Part 1 II 8 1183
197 The SIGABA Challenge — Part 2 II 7 1158
198 The SZ42 Challenge — Part 4 II 7 1193
199 The SIGABA Challenge — Part 1 II 7 1158
200 Handycipher — Part 2 II 7 1095
201 The SZ42 Challenge — Part 3 II 7 1189
202 The T52 Sturgeon Challenge — Part 8 II 6 1139
203 Handycipher — Part 3 III 6 13304
204 Holographic Encryption — Part 1 II 6 1107
205 The T52 Sturgeon Challenge — Part 12 II 6 1139
206 The T52 Sturgeon Challenge — Part 11 II 6 1139
207 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1109
208 The SZ42 Challenge — Part 5 II 6 1195
209 "The Road" — Part 1 II 5 1125
210 The T52 Sturgeon Challenge — Part 9 II 5 1139
211 Handycipher — Part 5 III 5 13416
212 Handycipher — Part 6 III 5 13416
213 The T52 Sturgeon Challenge — Part 10 II 5 1139
214 The T52 Sturgeon Challenge — Part 7 II 5 1139
215 The SZ42 Challenge — Part 8 II 5 1220
216 The SZ42 Challenge — Part 6 II 5 1206
217 The SIGABA Challenge — Part 3 III 5 14246
218 Weakened Handycipher — Part 6 II 5 1102
219 Weakened Handycipher — Part 5 II 5 1102
220 Weakened Handycipher — Part 4 II 5 1102
221 Spirale — Part 1 II 5 1097
222 Spirale — Part 2 II 5 1097
223 Handycipher — Part 1 II 5 1095
224 The SZ42 Challenge — Part 7 II 4 1217
225 The SIGABA Challenge — Part 4 III 4 14257
226 Spirale — Part 3 II 4 1097
227 Sigaba Part 2 III 4 13073
228 Handycipher — Part 4 III 4 13416
229 The T52 Sturgeon Challenge — Part 6 II 4 1139
230 The T52 Sturgeon Challenge — Part 5 II 4 1139
231 Notes of an Italian Soldier X 4 var
232 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14310
233 Differential Cryptanalysis — Part 2 II 3 1154
234 The Vatican Challenge — Part 1 X 3 var
235 Weakened ElsieFour — Part 1 II 3 1117
236 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1150
237 The Vatican Challenge — Part 2 X 3 var
238 Weakened ElsieFour — Part 3 II 3 1111
239 Extended Handycipher — Part 2 II 3 1096
240 Extended Handycipher — Part 1 II 3 1096
241 Extended Handycipher — Part 3 II 3 1096
242 ElsieFour — Part 1 III 3 13564
243 The SZ42 Challenge — Part 10 II 3 1349
244 Extended Handycipher — Part 5 III 3 13416
245 Extended Handycipher — Part 4 III 3 13416
246 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14326
247 The SZ42 Challenge — Part 9 II 3 1259
248 Holographic Encryption — Part 2 II 3 1107
249 Handycipher — Part 8 III 3 13476
250 Handycipher — Part 9 III 3 13476
251 The Heavy T52 Sturgeon Challenge — Part 3 III 2 14054
252 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
253 ORYX Stream Cipher — Part 4b III 2 13244
254 The SIGABA Challenge — Part 5 III 2 14272
255 Unknown Author X 2 var
256 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14322
257 Double Column Transposition X 2 var
258 Handycipher — Part 7 III 2 13476
259 Extended Handycipher — Part 6 III 2 13416
260 Substitution Cipher with Non-Prefix Codes III 1 13100
261 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
262 The SIGABA Challenge — Part 6 III 1 14291
263 The SZ42 Challenge — Part 11 II 1 1349
264 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14340
265 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14324
266 Handycipher — Part 10 II 1 1136
267 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14024
268 The Vatican Challenge — Part 4 X 1 var
269 Hilly — Part 2 II 1 1112
270 Beale Ciphers X 1 var
271 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1102
272 Double-Column Transposition/Granit — Part 3 II 0 1097
273 RSA Factoring Challenge: RSA-400 III 0 13128
274 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1102
275 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1102
276 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1102
277 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14328
278 RSA Factoring Challenge: RSA-360 III 0 13128
279 Double-Column Transposition/Granit — Part 2 II 0 1097
280 RSA Factoring Challenge: RSA-380 III 0 13128
281 Double-Column Transposition/Granit — Part 1 II 0 1097
282 Kryptos X 0 var
283 RSA Factoring Challenge: RSA-370 III 0 13128
284 RSA Factoring Challenge: RSA-350 III 0 13128
285 RSA Factoring Challenge: RSA-390 III 0 13128
286 RSA Factoring Challenge: RSA-340 III 0 13128
287 Spirale — Part 4 III 0 13341
288 RSA Factoring Challenge: RSA-896 III 0 13128
289 RSA Factoring Challenge: RSA-270 III 0 13128
290 RSA Factoring Challenge: RSA-260 III 0 13128
291 Weakened Granit — Part 3 II 0 1098
292 Weakened Granit — Part 2 II 0 1098
293 RSA Factoring Challenge: RSA-280 III 0 13128
294 RSA Factoring Challenge: RSA-290 III 0 13128
295 RSA Factoring Challenge: RSA-320 III 0 13128
296 RSA Factoring Challenge: RSA-330 III 0 13128
297 RSA Factoring Challenge: RSA-310 III 0 13128
298 RSA Factoring Challenge: RSA-1024 III 0 13128
299 RSA Factoring Challenge: RSA-300 III 0 13128
300 RSA Factoring Challenge: RSA-309 III 0 13128
301 RSA Factoring Challenge: RSA-410 III 0 13128
302 RSA Factoring Challenge: RSA-420 III 0 13128
303 "The Road" — Part 3 II 0 1125
304 The Vatican Challenge — Part 5 X 0 var
305 "The Road" — Part 2 II 0 1125
306 Digital Signatures: DSA with Medium Fields III 0 13109
307 RSA Factoring Challenge: RSA-2048 III 0 13128
308 The third ENIGMA M4 message X 0 var
309 D'Agapeyeff X 0 var
310 The Vatican Challenge — Part 3 X 0 var
311 ORYX Stream Cipher — Part 4d III 0 13198
312 Double Column Transposition Reloaded — Part 1 III 0 13224
313 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13083
314 Twelve-Year-Old Murder Case X 0 var
315 Double Column Transposition Reloaded — Part 3 III 0 13224
316 Kaskade-S/T — Part 4 II 0 1083
317 RSA Factoring Challenge: RSA-617 III 0 13128
318 RSA Factoring Challenge: RSA-500 III 0 13128
319 World Record Challenge: Break 65 Bits of AES III 0 13073
320 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14034
321 RSA Factoring Challenge: RSA-450 III 0 13128
322 RSA Factoring Challenge: RSA-440 III 0 13128
323 RSA Factoring Challenge: RSA-430 III 0 13128
324 Weakened ElsieFour — Part 2 II 0 1117
325 ORYX Stream Cipher — Part 4c III 0 13244
326 RSA Factoring Challenge: RSA-460 III 0 13128
327 RSA Factoring Challenge: RSA-480 III 0 13128
328 RSA Factoring Challenge: RSA-490 III 0 13128
329 Spanish Strip Cipher — Part 3 X 0 var
330 Dorabella X 0 var
331 RSA Factoring Challenge: RSA-1536 III 0 13128
332 RSA Factoring Challenge: RSA-470 III 0 13128
333 Double Column Transposition Reloaded — Part 2 III 0 13224
 
 
powered by the CrypTool project  CrypTool

 

   +++    [07:15 - 26.02.2021] gerdw solved the Level II challenge 'Kaskade-S/T — Part 3'    +++    [03:22 - 26.02.2021] madness solved the Level II challenge 'Advent Challenge — Part 4'    +++    [03:03 - 26.02.2021] madness solved the Level II challenge 'Advent Challenge — Part 3'    +++    [00:19 - 26.02.2021] madness solved the Level II challenge 'Advent-Challenge — Part 2'    +++    [21:12 - 25.02.2021] Wokini solved the Level I challenge 'Molehunt (Part 2/3)'    +++