MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10668
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3938 100
2 Original Caesar Cipher I 2705 100
3 Number Sequence — Part 2 I 1909 100
4 Caesar Encryption I 1291 100
5 Beaver Code I 1068 100
6 Letter to the Templars — Part 1 I 935 100
7 Number Sequence — Part 3 I 892 100
8 Letter to the Templars — Part 2 I 748 100
9 Number Sequence — Part 4 I 736 100
10 A hidden word I 735 100
11 Letter to the Templars — Part 3 II 634 1088
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 524 100
13 Monoalphabetic Substitution I 515 100
14 Cracking SHA1-Hashed Passwords II 483 1084
15 Factorization Cipher — Part 1 I 455 100
16 Grille Cipher I 433 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 367 100
18 Advent-Challenge — Part 1 I 361 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 315 100
20 Number Sequence — Part 8 I 312 100
21 One-Time Pad with Flaws I 286 100
22 Alice's Birthday Party (Part 1) II 271 1083
23 Snow White and the seven dwarfs I 266 100
24 Alice's Birthday Party (Part 2) II 266 1083
25 From Russia with Love I 256 100
26 Broadcasting and low exponent — RSA Attack II 212 1084
27 Modified Caesar Cipher I 207 100
28 How do you become a big cryptographer? I 201 100
29 M-138 — Part 1 I 185 100
30 Reserve Hand Procedure — Part 1 I 182 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 179 1083
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 177 1083
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 162 100
35 Enigma Messages with Repeated Letters — Part 1 I 159 100
36 Hybrid Encryption I II 154 1083
37 Nils away on travel I 152 100
38 RSA: Two different keys — same ciphertext II 147 1085
39 Pigpen with a twist — Part 1 I 144 100
40 Molehunt (Part 1/3) I 136 100
41 Factorization Cipher — Part 2 II 135 1085
42 ¿No Hablas Español? No problemo! I 135 100
43 The Book Code: A Challenge for Bookworms I 134 100
44 Molehunt (Part 2/3) I 131 100
45 Cryptanalysis Hacking Puzzles — Part 2 I 127 100
46 Number Sequence — Part 6 I 126 100
47 Enigma Part 1 II 125 1083
48 Autokey Cipher I 121 100
49 A Secret Message from Castle Mansfeld I 117 100
50 M-138 — Part 2 II 116 1096
51 Trifid Cipher I 114 100
52 A really long number sequence II 111 1085
53 ADFGVX — Part 2 I 109 100
54 Image Noise I 107 100
55 Playfair Encryption I 102 100
56 Playfair with hints about the grid I 101 100
57 ADFGVX — Part 1 I 101 100
58 Kaskade-S/T — Part 1 I 99 100
59 Double Columnar Transposition I 98 100
60 Enigma Combinatorics I 96 100
61 Number Sequence — Part 10 I 94 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
63 Heartbleed — Part 1 I 89 100
64 ECDH-Key Exchange for Beginners I 88 100
65 Number Sequence — Part 9 I 88 100
66 A hidden word — Part 2 I 86 100
67 Factorization Cipher — Part 3 II 86 1086
68 Zodiac Cipher I 84 100
69 Enigma Part 2 II 82 1083
70 Hill Cipher with Sudoku Key I 81 100
71 ORYX Stream Cipher Part I II 79 1083
72 The Last Note I 79 100
73 Partial Key Exposure with RSA — Part 1 II 79 1086
74 Number Sequence — Part 5 I 79 100
75 Molehunt (Part 3/3) II 76 1083
76 Number Sequence — Part 7 I 73 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Enigma Messages with Repeated Letters — Part 5 I 70 100
80 Enigma Messages I 70 100
81 Smartcard RSA II 69 1083
82 Multilingual Monoalphabetic Substitution I 68 100
83 Cascading Encryption — Part 1/3 I 66 100
84 BCR code (Book-Caesar-RSA) II 66 1087
85 Turing Bombe Enigma I I 65 100
86 Enigma Messages with Repeated Letters — Part 4 I 64 100
87 AES key — encoded in the machine readable zone of a European ePassport II 63 1086
88 Recycled One-Time Pad I 61 100
89 Heartbleed — Part 2 I 60 100
90 Unusual encryption using a diophantine equation II 59 1085
91 Monoalphabetic substitution with camouflage — Part 1 I 58 100
92 An Invisible Message I 55 100
93 M-138 — Part 3 II 53 1096
94 The Einstein Enigma II 52 1118
95 Modular Sequences I 51 100
96 Kaskade-S/T — Part 2 II 48 1083
97 Monoalphabetic substitution with camouflage — Part 2 II 47 1085
98 ORYX Stream Cipher Part II II 47 1083
99 RSA Factoring Challenge: RSA-704 II 47 0
100 News from Castle Mansfeld I 46 100
101 Unconcealed RSA messages II 46 1085
102 New Year's Greetings — Part 1 I 45 100
103 Keyshanc — Part 1 II 45 1087
104 Monoalphabetic substitution with camouflage — Part 4 I 45 100
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 43 1083
106 Summer Job II 43 1122
107 Monoalphabetic substitution with camouflage — Part 3 II 43 1085
108 RSA Factoring Challenge: RSA-210 II 42 0
109 Weakened Granit — Part 1 I 42 100
110 Strange Message from Thessaloniki I 42 100
111 New Year's Greetings — Part 2 I 42 100
112 Double Column Transposition — Part 4 II 41 1093
113 CMEA 1 II 40 1083
114 Music Code — Part 1 I 40 100
115 Music Code — Part 2 II 40 1084
116 New Year's Greetings — Part 3 I 39 100
117 Advent-Challenge — Part 2 II 39 1116
118 Double Column Transposition — Part 2 II 39 1093
119 An 'unhearable' message I 39 100
120 Pigpen with a twist — Part 2 II 37 1085
121 New Year's Greetings — Part 4 I 37 100
122 Ku Klux Klan X 36 var
123 Keyshanc — Part 2 II 35 1087
124 Double Column Transposition — Part 3 II 35 1093
125 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1083
126 Pigpen with a twist — Part 3 II 34 1085
127 Advent Challenge — Part 4 II 33 1116
128 Advent Challenge — Part 3 II 33 1116
129 Trendy Messenger II 31 1122
130 ORYX Stream Cipher — Part 3 (revised) II 30 1090
131 Homophonic Encryption — Part 1 II 30 1138
132 Heartbleed — Part 3 II 30 1094
133 Fastest in the West II 29 1122
134 Kaskade-S/T — Part 3 II 29 1083
135 Lattice Part 1 II 28 1083
136 CMEA 2 III 27 13089
137 Spanish Strip Cipher — Part 1 II 27 1092
138 Double Column Transposition — Part 1 II 27 1093
139 Monoalphabetic Substitution with Camouflage — Part 5 II 27 1086
140 RSA Factoring Challenge: RSA-220 II 26 0
141 Typex — Part 1 II 25 1089
142 Monoalphabetic Substitution with Nostradamus Flavor II 25 1134
143 Polyhomophonic Substitution — Part 1 I 25 100
144 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
145 Lightweight Introduction to Lattices — Part 1 I 23 101
146 RSA with Special d III 23 13083
147 Homophonic Encryption — Part 2 II 23 1139
148 Homophonic Encryption — Part 3 II 22 1139
149 Spanish Strip Cipher — Part 2 II 22 1092
150 Typex — Part 2 II 22 1089
151 RSA Factoring Challenge: RSA-230 II 22 0
152 Homophonic Encryption — Part 4 II 21 1139
153 Find the right route — Part 1 I 20 104
154 Handycipher made in love — Part 1 II 20 1134
155 Lightweight Introduction to Lattices — Part 2 I 18 101
156 Lightweight Introduction to Lattices — Part 3 II 18 1212
157 Breaking a Filter Generator II 17 1126
158 M-138 — Part 4 II 17 1096
159 AES ECB Wrong Encoding II 17 1116
160 Polyphonic Substitution Cipher — Part 1 II 16 1157
161 Concealed Messages — Vigenère's Night Sky X 16 var
162 The LoRa Cipher: Logic Randomness — Part 1 II 16 1170
163 Purple 1 II 16 1083
164 A Cloaked Substitution Cipher — Part 1 II 15 1147
165 Handycipher made in love — Part 2 II 15 1140
166 Weakened Handycipher — Part 1 II 15 1097
167 New Year's Greetings — Part 5 II 15 1102
168 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1104
169 Sigaba Part 1 II 15 1083
170 Weakened Handycipher — Part 3 II 14 1097
171 A Cloaked Substitution Cipher — Part 2 II 14 1147
172 Flawed Usage of a OTP Cipher by the BND II 14 1099
173 Polyhomophonic Substitution — Part 2 II 14 1178
174 Cipher ID — Part 1 II 13 1156
175 Polyphonic Substitution Cipher — Part 2 II 13 1164
176 Weakened Handycipher — Part 2 II 13 1097
177 Cascading Encryption — Part 2/3 II 13 1089
178 The T52 Sturgeon Challenge — Part 1 II 13 1144
179 Cascading Encryption — Part 3/3 II 12 1089
180 The T52 Sturgeon Challenge — Part 2 II 12 1144
181 RSA Factoring Challenge: RSA-240 III 12 0
182 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1084
183 Polyhomophonic Substitution — Part 3 II 11 1180
184 ORYX Stream Cipher — Part 4a II 11 1093
185 RSA Factoring Challenge: RSA-250 III 10 0
186 Akelarre Part 1 II 10 1083
187 The T52 Sturgeon Challenge — Part 3 II 10 1144
188 Kaskade-S/T — Part 5 II 10 1084
189 RSA Factoring Challenge: RSA-232 III 9 0
190 The T52 Sturgeon Challenge — Part 4 II 9 1144
191 Hilly — Part 1 II 8 1108
192 Double Column Transposition — Part 5 II 8 1093
193 The SZ42 Challenge — Part 1 II 8 1216
194 The SZ42 Challenge — Part 2 II 8 1224
195 The SZ42 Challenge — Part 3 II 7 1230
196 The SIGABA Challenge — Part 1 II 7 1172
197 The SIGABA Challenge — Part 2 II 7 1173
198 Handycipher — Part 2 II 7 1096
199 The SZ42 Challenge — Part 4 II 7 1241
200 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1111
201 Holographic Encryption — Part 1 II 6 1109
202 Handycipher — Part 3 III 6 13323
203 The SZ42 Challenge — Part 5 II 6 1244
204 "The Road" — Part 1 II 5 1130
205 The SIGABA Challenge — Part 3 III 5 14439
206 Handycipher — Part 6 III 5 13442
207 Handycipher — Part 5 III 5 13442
208 The T52 Sturgeon Challenge — Part 7 II 5 1146
209 The T52 Sturgeon Challenge — Part 12 II 5 1146
210 The SZ42 Challenge — Part 6 II 5 1281
211 Weakened Handycipher — Part 6 II 5 1104
212 Handycipher — Part 1 II 5 1096
213 The SZ42 Challenge — Part 8 II 5 1362
214 The T52 Sturgeon Challenge — Part 8 II 5 1146
215 Weakened Handycipher — Part 5 II 5 1104
216 Weakened Handycipher — Part 4 II 5 1104
217 The T52 Sturgeon Challenge — Part 11 II 5 1146
218 Handycipher — Part 4 III 4 13442
219 The SIGABA Challenge — Part 4 III 4 14454
220 Sigaba Part 2 III 4 13083
221 Spirale — Part 2 II 4 1099
222 Spirale — Part 1 II 4 1099
223 The T52 Sturgeon Challenge — Part 9 II 4 1146
224 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14530
225 The T52 Sturgeon Challenge — Part 10 II 4 1146
226 The T52 Sturgeon Challenge — Part 5 II 4 1146
227 Notes of an Italian Soldier X 4 var
228 The T52 Sturgeon Challenge — Part 6 II 4 1146
229 Weakened ElsieFour — Part 1 II 3 1120
230 The Vatican Challenge — Part 2 X 3 var
231 Holographic Encryption — Part 2 II 3 1109
232 The Vatican Challenge — Part 1 X 3 var
233 The SZ42 Challenge — Part 7 II 3 1344
234 Handycipher — Part 9 III 3 13507
235 Extended Handycipher — Part 2 II 3 1097
236 Spirale — Part 3 II 3 1099
237 Extended Handycipher — Part 4 III 3 13442
238 Extended Handycipher — Part 3 II 3 1097
239 Handycipher — Part 8 III 3 13507
240 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1161
241 Differential Cryptanalysis — Part 2 II 3 1166
242 Extended Handycipher — Part 5 III 3 13442
243 Extended Handycipher — Part 1 II 3 1097
244 The Heavy T52 Sturgeon Challenge — Part 7 III 2 14554
245 Unknown Author X 2 var
246 Double Column Transposition X 2 var
247 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14548
248 The SIGABA Challenge — Part 5 III 2 14475
249 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
250 Handycipher — Part 7 III 2 13507
251 ORYX Stream Cipher — Part 4b III 2 13261
252 Extended Handycipher — Part 6 III 2 13442
253 Weakened ElsieFour — Part 3 II 2 1114
254 ElsieFour — Part 1 III 2 13603
255 Handycipher — Part 10 II 1 1142
256 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1087
257 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1104
258 Beale Ciphers X 1 var
259 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14554
260 Hilly — Part 2 II 1 1114
261 Substitution Cipher with Non-Prefix Codes III 1 13111
262 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14576
263 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14140
264 The Vatican Challenge — Part 4 X 1 var
265 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14151
266 The Heavy T52 Sturgeon Challenge — Part 3 III 0 14177
267 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14560
268 The Vatican Challenge — Part 5 X 0 var
269 The Vatican Challenge — Part 3 X 0 var
270 The SIGABA Challenge — Part 6 III 0 14505
271 Double Column Transposition Reloaded — Part 1 III 0 13239
272 RSA Factoring Challenge: RSA-320 III 0 13140
273 RSA Factoring Challenge: RSA-330 III 0 13140
274 RSA Factoring Challenge: RSA-310 III 0 13140
275 RSA Factoring Challenge: RSA-1024 III 0 13140
276 RSA Factoring Challenge: RSA-300 III 0 13140
277 RSA Factoring Challenge: RSA-309 III 0 13140
278 RSA Factoring Challenge: RSA-340 III 0 13140
279 RSA Factoring Challenge: RSA-350 III 0 13140
280 RSA Factoring Challenge: RSA-390 III 0 13140
281 RSA Factoring Challenge: RSA-400 III 0 13140
282 RSA Factoring Challenge: RSA-380 III 0 13140
283 RSA Factoring Challenge: RSA-370 III 0 13140
284 RSA Factoring Challenge: RSA-360 III 0 13140
285 RSA Factoring Challenge: RSA-290 III 0 13140
286 RSA Factoring Challenge: RSA-280 III 0 13140
287 World Record Challenge: Break 65 Bits of AES III 0 13083
288 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13094
289 Kryptos X 0 var
290 Dorabella X 0 var
291 D'Agapeyeff X 0 var
292 Twelve-Year-Old Murder Case X 0 var
293 Kaskade-S/T — Part 4 II 0 1084
294 RSA Factoring Challenge: RSA-270 III 0 13140
295 RSA Factoring Challenge: RSA-896 III 0 13140
296 RSA Factoring Challenge: RSA-260 III 0 13140
297 The third ENIGMA M4 message X 0 var
298 Digital Signatures: DSA with Medium Fields III 0 13120
299 RSA Factoring Challenge: RSA-410 III 0 13140
300 RSA Factoring Challenge: RSA-420 III 0 13140
301 Double-Column Transposition/Granit — Part 3 II 0 1098
302 Spirale — Part 4 III 0 13362
303 Double-Column Transposition/Granit — Part 2 II 0 1098
304 Double-Column Transposition/Granit — Part 1 II 0 1098
305 Spanish Strip Cipher — Part 3 X 0 var
306 ORYX Stream Cipher — Part 4c III 0 13261
307 Weakened Granit — Part 2 II 0 1099
308 Weakened Granit — Part 3 II 0 1099
309 Weakened ElsieFour — Part 2 II 0 1120
310 "The Road" — Part 2 II 0 1130
311 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1104
312 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1104
313 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1104
314 Double Column Transposition Reloaded — Part 3 III 0 13239
315 Double Column Transposition Reloaded — Part 2 III 0 13239
316 RSA Factoring Challenge: RSA-460 III 0 13140
317 RSA Factoring Challenge: RSA-1536 III 0 13140
318 RSA Factoring Challenge: RSA-450 III 0 13140
319 RSA Factoring Challenge: RSA-440 III 0 13140
320 RSA Factoring Challenge: RSA-430 III 0 13140
321 RSA Factoring Challenge: RSA-470 III 0 13140
322 RSA Factoring Challenge: RSA-480 III 0 13140
323 RSA Factoring Challenge: RSA-2048 III 0 13140
324 ORYX Stream Cipher — Part 4d III 0 13212
325 RSA Factoring Challenge: RSA-617 III 0 13140
326 RSA Factoring Challenge: RSA-500 III 0 13140
327 RSA Factoring Challenge: RSA-490 III 0 13140
328 "The Road" — Part 3 II 0 1130
 
 
powered by the CrypTool project  CrypTool

 

   +++    [12:02 - 23.11.2020] Wokini solved the Level II challenge 'Not-so-Secret Message from Malawi — Part I (RSA)'    +++    [11:35 - 23.11.2020] Wokini solved the Level I challenge 'Number Sequence — Part 4'    +++    [11:34 - 23.11.2020] Wokini solved the Level I challenge 'Number Sequence — Part 3'    +++    [22:35 - 21.11.2020] Theofanidis solved the Level I challenge 'Find the right route — Part 1'    +++    [17:53 - 21.11.2020] george4096 solved the Level II challenge 'The SZ42 Challenge — Part 8'    +++