MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11001
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4090 100
2 Original Caesar Cipher I 2827 100
3 Number Sequence — Part 2 I 1995 100
4 Caesar Encryption I 1349 100
5 Beaver Code I 1115 100
6 Letter to the Templars — Part 1 I 972 100
7 Number Sequence — Part 3 I 937 100
8 Letter to the Templars — Part 2 I 781 100
9 Number Sequence — Part 4 I 775 100
10 A hidden word I 766 100
11 Letter to the Templars — Part 3 II 665 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 549 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 499 1083
15 Factorization Cipher — Part 1 I 473 100
16 Grille Cipher I 454 100
17 Advent-Challenge — Part 1 I 392 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 343 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 296 100
22 Alice's Birthday Party (Part 1) II 279 1082
23 Snow White and the seven dwarfs I 277 100
24 Alice's Birthday Party (Part 2) II 272 1082
25 From Russia with Love I 264 100
26 Modified Caesar Cipher I 218 100
27 Broadcasting and low exponent — RSA Attack II 217 1083
28 How do you become a big cryptographer? I 212 100
29 M-138 — Part 1 I 195 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 184 1082
31 Not-so-Secret Message from Malawi — Part I (RSA) II 184 1082
32 Reserve Hand Procedure — Part 1 I 184 100
33 Letter from the Alleged Countess Julie von Ortenburg I 168 100
34 Classical Ciphers^3 I 167 100
35 Enigma Messages with Repeated Letters — Part 1 I 161 100
36 Hybrid Encryption I II 159 1082
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 151 1083
39 Pigpen with a twist — Part 1 I 147 100
40 Molehunt (Part 1/3) I 145 100
41 ¿No Hablas Español? No problemo! I 141 100
42 The Book Code: A Challenge for Bookworms I 140 100
43 Cryptanalysis Hacking Puzzles — Part 2 I 140 100
44 Factorization Cipher — Part 2 II 140 1084
45 Molehunt (Part 2/3) I 137 100
46 Number Sequence — Part 6 I 136 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 127 1082
49 M-138 — Part 2 II 122 1094
50 A Secret Message from Castle Mansfeld I 120 100
51 Image Noise I 119 100
52 Trifid Cipher I 115 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 112 1084
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 106 100
57 Playfair with hints about the grid I 104 100
58 Double Columnar Transposition I 103 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 10 I 99 100
61 Enigma Combinatorics I 96 100
62 A hidden word — Part 2 I 96 100
63 Number Sequence — Part 9 I 95 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 94 100
65 Zodiac Cipher I 91 100
66 Heartbleed — Part 1 I 90 100
67 Factorization Cipher — Part 3 II 89 1084
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 87 100
70 Enigma Part 2 II 86 1082
71 Hill Cipher with Sudoku Key I 82 100
72 Partial Key Exposure with RSA — Part 1 II 81 1085
73 The Last Note I 81 100
74 Molehunt (Part 3/3) II 80 1082
75 ORYX Stream Cipher Part I II 79 1082
76 Number Sequence — Part 7 I 77 100
77 Enigma Messages with Repeated Letters — Part 3 I 74 100
78 Enigma Messages with Repeated Letters — Part 2 I 73 100
79 Enigma Messages I 71 100
80 Enigma Messages with Repeated Letters — Part 5 I 71 100
81 Smartcard RSA II 71 1082
82 Multilingual Monoalphabetic Substitution I 69 100
83 BCR code (Book-Caesar-RSA) II 67 1086
84 AES key — encoded in the machine readable zone of a European ePassport II 67 1084
85 Cascading Encryption — Part 1/3 I 67 100
86 Turing Bombe Enigma I I 66 100
87 Enigma Messages with Repeated Letters — Part 4 I 65 100
88 Unusual encryption using a diophantine equation II 62 1083
89 Recycled One-Time Pad I 62 100
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 Modular Sequences I 57 100
93 M-138 — Part 3 II 57 1094
94 An Invisible Message I 56 100
95 The Einstein Enigma II 55 1112
96 RSA Factoring Challenge: RSA-704 II 51 0
97 News from Castle Mansfeld I 51 100
98 Kaskade-S/T — Part 2 II 50 1082
99 Unconcealed RSA messages II 49 1084
100 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
101 ORYX Stream Cipher Part II II 47 1082
102 Monoalphabetic substitution with camouflage — Part 4 I 46 100
103 New Year's Greetings — Part 1 I 46 100
104 Keyshanc — Part 1 II 45 1085
105 Advent-Challenge — Part 2 II 45 1111
106 RSA Factoring Challenge: RSA-210 II 45 0
107 Double Column Transposition — Part 4 II 44 1091
108 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
109 Strange Message from Thessaloniki I 44 100
110 Summer Job II 44 1116
111 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 44 1082
112 New Year's Greetings — Part 2 I 43 100
113 Weakened Granit — Part 1 I 43 100
114 Find the right route — Part 1 I 42 100
115 CMEA 1 II 42 1082
116 Double Column Transposition — Part 2 II 41 1091
117 New Year's Greetings — Part 3 I 41 100
118 Music Code — Part 2 II 40 1083
119 An 'unhearable' message I 40 100
120 Music Code — Part 1 I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Pigpen with a twist — Part 2 II 38 1083
123 Advent Challenge — Part 3 II 37 1111
124 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1082
125 Double Column Transposition — Part 3 II 37 1091
126 Advent Challenge — Part 4 II 36 1111
127 Ku Klux Klan X 36 var
128 Pigpen with a twist — Part 3 II 36 1083
129 Keyshanc — Part 2 II 35 1085
130 Homophonic Encryption — Part 1 II 34 1128
131 Lightweight Introduction to Lattices — Part 1 I 32 100
132 Kaskade-S/T — Part 3 II 31 1082
133 Trendy Messenger II 31 1116
134 ORYX Stream Cipher — Part 3 (revised) II 30 1088
135 Spanish Strip Cipher — Part 1 II 30 1091
136 RSA Factoring Challenge: RSA-220 II 30 0
137 Fastest in the West II 30 1116
138 Polyhomophonic Substitution — Part 1 I 30 100
139 Heartbleed — Part 3 II 30 1092
140 Double Column Transposition — Part 1 II 29 1091
141 Homophonic Encryption — Part 2 II 29 1129
142 Homophonic Encryption — Part 3 II 28 1129
143 Lattice Part 1 II 28 1082
144 Monoalphabetic Substitution with Nostradamus Flavor II 28 1125
145 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1085
146 RSA Factoring Challenge: RSA-230 II 27 0
147 CMEA 2 III 27 13070
148 Homophonic Encryption — Part 4 II 27 1129
149 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
150 M-138 — Part 4 II 25 1094
151 Typex — Part 1 II 25 1087
152 Wheatstone Cryptograph — Part 1 I 24 104
153 Spanish Strip Cipher — Part 2 II 24 1091
154 Lightweight Introduction to Lattices — Part 2 I 23 100
155 Lightweight Introduction to Lattices — Part 3 II 23 1166
156 RSA with Special d III 23 13065
157 Typex — Part 2 II 22 1088
158 Handycipher made in love — Part 1 II 21 1125
159 Find the right route — Part 2 I 20 101
160 Polyphonic Substitution Cipher — Part 1 II 19 1140
161 AES ECB Wrong Encoding II 18 1111
162 Polyhomophonic Substitution — Part 2 II 18 1152
163 Breaking a Filter Generator II 18 1119
164 Purple 1 II 18 1082
165 The LoRa Cipher: Logic Randomness — Part 1 II 17 1148
166 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1101
167 Concealed Messages — Vigenère's Night Sky X 16 var
168 Polyphonic Substitution Cipher — Part 2 II 16 1145
169 Sigaba Part 1 II 16 1082
170 Find the right route — Part 3 I 16 101
171 RSA Factoring Challenge: RSA-240 III 16 0
172 Handycipher made in love — Part 2 II 16 1129
173 A Cloaked Substitution Cipher — Part 1 II 15 1134
174 New Year's Greetings — Part 5 II 15 1099
175 Weakened Handycipher — Part 1 II 15 1095
176 Cipher ID — Part 1 II 15 1140
177 Weakened Handycipher — Part 3 II 14 1095
178 Flawed Usage of a OTP Cipher by the BND II 14 1096
179 RSA Factoring Challenge: RSA-250 III 14 0
180 A Cloaked Substitution Cipher — Part 2 II 14 1135
181 RSA Factoring Challenge: RSA-232 III 13 0
182 The T52 Sturgeon Challenge — Part 1 II 13 1132
183 Weakened Handycipher — Part 2 II 13 1095
184 Cascading Encryption — Part 2/3 II 13 1088
185 Polyhomophonic Substitution — Part 3 II 13 1153
186 The T52 Sturgeon Challenge — Part 2 II 12 1133
187 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1083
188 Cascading Encryption — Part 3/3 II 12 1088
189 ORYX Stream Cipher — Part 4a II 11 1091
190 The T52 Sturgeon Challenge — Part 3 II 10 1133
191 Kaskade-S/T — Part 5 II 10 1083
192 Akelarre Part 1 II 10 1082
193 The SZ42 Challenge — Part 1 II 9 1167
194 The SZ42 Challenge — Part 2 II 9 1169
195 The T52 Sturgeon Challenge — Part 4 II 9 1133
196 The SIGABA Challenge — Part 2 II 8 1149
197 Double Column Transposition — Part 5 II 8 1092
198 The SIGABA Challenge — Part 1 II 8 1149
199 Hilly — Part 1 II 8 1104
200 The SZ42 Challenge — Part 4 II 7 1173
201 Handycipher — Part 2 II 7 1094
202 The SZ42 Challenge — Part 3 II 7 1171
203 Holographic Encryption — Part 1 II 6 1106
204 The T52 Sturgeon Challenge — Part 12 II 6 1134
205 The T52 Sturgeon Challenge — Part 11 II 6 1134
206 The T52 Sturgeon Challenge — Part 8 II 6 1134
207 The SZ42 Challenge — Part 5 II 6 1174
208 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1107
209 Handycipher — Part 3 III 6 13288
210 The SIGABA Challenge — Part 3 III 6 14125
211 Weakened Handycipher — Part 4 II 5 1101
212 Weakened Handycipher — Part 5 II 5 1101
213 The SIGABA Challenge — Part 4 III 5 14133
214 The T52 Sturgeon Challenge — Part 9 II 5 1134
215 Weakened Handycipher — Part 6 II 5 1101
216 The T52 Sturgeon Challenge — Part 7 II 5 1134
217 Handycipher — Part 6 III 5 13395
218 The SZ42 Challenge — Part 8 II 5 1188
219 The SZ42 Challenge — Part 6 II 5 1181
220 "The Road" — Part 1 II 5 1122
221 The T52 Sturgeon Challenge — Part 10 II 5 1134
222 Spirale — Part 2 II 5 1096
223 Spirale — Part 1 II 5 1096
224 Sigaba Part 2 III 5 13065
225 Handycipher — Part 5 III 5 13395
226 Handycipher — Part 1 II 5 1094
227 Handycipher — Part 4 III 4 13395
228 The T52 Sturgeon Challenge — Part 5 II 4 1134
229 Spirale — Part 3 II 4 1096
230 The SZ42 Challenge — Part 7 II 4 1187
231 Weakened ElsieFour — Part 1 II 4 1115
232 The T52 Sturgeon Challenge — Part 6 II 4 1134
233 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14174
234 Notes of an Italian Soldier X 4 var
235 Extended Handycipher — Part 2 II 3 1095
236 Extended Handycipher — Part 1 II 3 1095
237 Extended Handycipher — Part 3 II 3 1095
238 Extended Handycipher — Part 5 III 3 13395
239 The Vatican Challenge — Part 2 X 3 var
240 The Vatican Challenge — Part 1 X 3 var
241 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1143
242 Weakened ElsieFour — Part 3 II 3 1109
243 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14185
244 Handycipher — Part 8 III 3 13452
245 The SZ42 Challenge — Part 10 II 3 1226
246 The SZ42 Challenge — Part 11 II 3 1226
247 Extended Handycipher — Part 4 III 3 13395
248 Handycipher — Part 9 III 3 13452
249 Differential Cryptanalysis — Part 2 II 3 1146
250 Holographic Encryption — Part 2 II 3 1106
251 ElsieFour — Part 1 III 3 13534
252 The SZ42 Challenge — Part 9 II 3 1205
253 The SIGABA Challenge — Part 5 III 2 14145
254 ORYX Stream Cipher — Part 4b III 2 13231
255 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14182
256 Unknown Author X 2 var
257 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
258 Double Column Transposition X 2 var
259 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13969
260 Handycipher — Part 7 III 2 13452
261 Extended Handycipher — Part 6 III 2 13395
262 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14185
263 Handycipher — Part 10 II 1 1131
264 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1101
265 The SIGABA Challenge — Part 6 III 1 14160
266 Substitution Cipher with Non-Prefix Codes III 1 13091
267 The Vatican Challenge — Part 4 X 1 var
268 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14197
269 Hilly — Part 2 II 1 1110
270 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
271 Beale Ciphers X 1 var
272 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13944
273 RSA Factoring Challenge: RSA-450 III 0 13119
274 RSA Factoring Challenge: RSA-390 III 0 13119
275 RSA Factoring Challenge: RSA-380 III 0 13119
276 RSA Factoring Challenge: RSA-430 III 0 13119
277 RSA Factoring Challenge: RSA-440 III 0 13119
278 RSA Factoring Challenge: RSA-410 III 0 13119
279 RSA Factoring Challenge: RSA-420 III 0 13119
280 RSA Factoring Challenge: RSA-400 III 0 13119
281 RSA Factoring Challenge: RSA-310 III 0 13119
282 RSA Factoring Challenge: RSA-290 III 0 13119
283 RSA Factoring Challenge: RSA-300 III 0 13119
284 RSA Factoring Challenge: RSA-280 III 0 13119
285 RSA Factoring Challenge: RSA-896 III 0 13119
286 RSA Factoring Challenge: RSA-260 III 0 13119
287 RSA Factoring Challenge: RSA-270 III 0 13119
288 RSA Factoring Challenge: RSA-309 III 0 13119
289 RSA Factoring Challenge: RSA-1024 III 0 13119
290 RSA Factoring Challenge: RSA-360 III 0 13119
291 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14188
292 RSA Factoring Challenge: RSA-350 III 0 13119
293 RSA Factoring Challenge: RSA-340 III 0 13119
294 RSA Factoring Challenge: RSA-320 III 0 13119
295 RSA Factoring Challenge: RSA-330 III 0 13119
296 RSA Factoring Challenge: RSA-370 III 0 13119
297 The Vatican Challenge — Part 5 X 0 var
298 Dorabella X 0 var
299 Weakened ElsieFour — Part 2 II 0 1115
300 Double-Column Transposition/Granit — Part 1 II 0 1096
301 World Record Challenge: Break 65 Bits of AES III 0 13065
302 ORYX Stream Cipher — Part 4c III 0 13231
303 D'Agapeyeff X 0 var
304 "The Road" — Part 3 II 0 1122
305 "The Road" — Part 2 II 0 1122
306 Double-Column Transposition/Granit — Part 2 II 0 1096
307 Double-Column Transposition/Granit — Part 3 II 0 1096
308 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1101
309 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1101
310 Weakened Granit — Part 3 II 0 1097
311 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1101
312 Weakened Granit — Part 2 II 0 1097
313 Kryptos X 0 var
314 Spirale — Part 4 III 0 13323
315 Spanish Strip Cipher — Part 3 X 0 var
316 Double Column Transposition Reloaded — Part 3 III 0 13211
317 RSA Factoring Challenge: RSA-500 III 0 13119
318 RSA Factoring Challenge: RSA-617 III 0 13119
319 RSA Factoring Challenge: RSA-2048 III 0 13119
320 RSA Factoring Challenge: RSA-490 III 0 13119
321 RSA Factoring Challenge: RSA-480 III 0 13119
322 RSA Factoring Challenge: RSA-1536 III 0 13119
323 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13951
324 RSA Factoring Challenge: RSA-470 III 0 13119
325 The third ENIGMA M4 message X 0 var
326 Digital Signatures: DSA with Medium Fields III 0 13100
327 ORYX Stream Cipher — Part 4d III 0 13186
328 Double Column Transposition Reloaded — Part 1 III 0 13211
329 Double Column Transposition Reloaded — Part 2 III 0 13211
330 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13074
331 The Vatican Challenge — Part 3 X 0 var
332 Kaskade-S/T — Part 4 II 0 1083
333 Twelve-Year-Old Murder Case X 0 var
334 RSA Factoring Challenge: RSA-460 III 0 13119
 
 
powered by the CrypTool project  CrypTool

 

   +++    [10:11 - 17.05.2021] tlon solved the Level I challenge 'Number Sequence'    +++    [03:53 - 17.05.2021] ExAstris solved the Level II challenge 'Lightweight Introduction to Lattices — Part 3'    +++    [22:05 - 16.05.2021] madness solved the Level II challenge 'Unconcealed RSA messages'    +++    [19:40 - 16.05.2021] Konubixe solved the Level I challenge 'ADFGVX — Part 2'    +++    [18:42 - 16.05.2021] rcw8892 solved the Level I challenge 'A modified homophonic cipher with reduced alphabets — Part 2'    +++