MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

6972
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2478 100
2 Original Caesar Cipher I 1580 100
3 Number Sequence — Part 2 I 1103 100
4 Caesar Encryption I 834 100
5 Beaver Code I 592 100
6 Letter to the Templars — Part 1 I 542 100
7 Number Sequence — Part 3 I 507 100
8 Letter to the Templars — Part 2 I 443 100
9 Number Sequence — Part 4 I 404 100
10 Monoalphabetic Substitution I 387 100
11 A hidden word I 359 100
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 341 100
13 Letter to the Templars — Part 3 II 329 1112
14 Factorization Cipher — Part 1 I 303 100
15 Grille Cipher I 270 100
16 Homophonic Encryption Part 1 I 270 100
17 Homophonic Encryption Part 2 I 235 100
18 Cracking SHA1-Hashed Passwords II 233 1101
19 One-Time Pad with Flaws I 211 100
20 Snow White and the seven dwarfs I 189 100
21 Alice's Birthday Party (Part 1) II 165 1098
22 Alice's Birthday Party (Part 2) II 156 1098
23 From Russia with Love I 144 100
24 Reserve Hand Procedure — Part 1 I 137 100
25 Modified Caesar Cipher I 137 100
26 How do you become a big cryptographer? I 128 100
27 Letter from the Alleged Countess Julie von Ortenburg I 127 100
28 Classical Ciphers^3 I 123 100
29 Broadcasting and low exponent — RSA-Attack II 119 1103
30 Not-so-Secret Message from Malawi — Part I (RSA) II 112 1098
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 104 1098
32 Pigpen with a twist — Part 1 I 101 100
33 Enigma Messages with Repeated Letters — Part 1 I 101 100
34 The Book Code: A Challenge for Bookworms I 98 100
35 Hybrid Encryption I II 97 1099
36 M-138 — Part 1 I 94 100
37 A Secret Message from Castle Mansfeld I 94 100
38 RSA: Two different keys — same ciphertext II 94 1103
39 Molehunt (Part 1/3) I 92 100
40 Enigma Part 1 II 92 1098
41 Factorization Cipher — Part 2 II 91 1105
42 Molehunt (Part 2/3) I 91 100
43 Nils away on travel I 88 100
44 A really long number sequence II 81 1103
45 Kaskade-S/T — Part 1 I 77 100
46 Trifid Cipher I 77 100
47 ¿No Hablas Español? No problemo! I 74 100
48 ADFGVX — Part 2 I 74 100
49 Enigma Combinatorics I 70 100
50 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 67 100
51 Playfair Encryption I 66 100
52 ADFGVX — Part 1 I 65 100
53 Playfair with hints about the grid I 64 100
54 Number Sequence — Part 8 I 64 101
55 ECDH-Key Exchange for Beginners I 64 100
56 Double Columnar Transposition I 61 100
57 Zodiac Cipher I 61 100
58 ORYX Stream Cipher Part I II 59 1098
59 Enigma Part 2 II 58 1098
60 Heartbleed — Part 1 I 56 100
61 Molehunt (Part 3/3) II 54 1098
62 Factorization Cipher — Part 3 II 54 1106
63 M-138 — Part 2 II 54 1151
64 Smartcard RSA II 53 1098
65 Partial Key Exposure with RSA — Part 1 II 49 1106
66 Turing Bombe Enigma I I 49 100
67 Enigma Messages with Repeated Letters — Part 2 I 48 100
68 Enigma Messages with Repeated Letters — Part 3 I 47 100
69 Hill Cipher with Sudoku Key I 47 100
70 BCR code (Book-Caesar-RSA) II 47 1111
71 A hidden word — Part 2 I 45 100
72 Enigma Messages I 45 100
73 Enigma Messages with Repeated Letters — Part 5 I 44 100
74 Number Sequence — Part 5 I 43 100
75 Number Sequence — Part 6 I 43 100
76 The Last Note I 43 100
77 Cascading Encryption — Part 1/3 I 43 100
78 Multilingual Monoalphabetic Substitution I 42 100
79 An Invisible Message I 41 100
80 AES key — encoded in the machine readable zone of a European ePassport II 40 1106
81 Recycled One-Time Pad I 40 100
82 Enigma Messages with Repeated Letters — Part 4 I 39 100
83 Heartbleed — Part 2 I 38 100
84 Monoalphabetic substitution with camouflage — Part 1 I 36 100
85 Unusual encryption using a diophantine equation II 35 1103
86 Kaskade-S/T — Part 2 II 35 1100
87 Keyshanc — Part 1 II 33 1108
88 ORYX Stream Cipher Part II II 33 1098
89 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 32 1100
90 Strange Message from Thessaloniki I 31 100
91 Music Code — Part 1 I 30 100
92 Music Code — Part 2 II 30 1101
93 Monoalphabetic substitution with camouflage — Part 4 I 29 100
94 Image Noise I 29 101
95 Unconcealed RSA messages II 28 1104
96 Pigpen with a twist — Part 2 II 28 1103
97 RSA Factoring Challenge: RSA-704 II 27 0
98 An 'unhearable' message I 27 100
99 Monoalphabetic substitution with camouflage — Part 2 II 26 1105
100 Ku Klux Klan X 26 var
101 News from Castle Mansfeld I 25 101
102 Double Column Transposition — Part 4 II 25 1134
103 Number Sequence — Part 7 I 25 100
104 Keyshanc — Part 2 II 25 1108
105 Monoalphabetic substitution with camouflage — Part 3 II 24 1105
106 Not-so-Secret Message from Malawi — Part II (ECC) II 24 1098
107 Pigpen with a twist — Part 3 II 24 1103
108 Double Column Transposition — Part 2 II 23 1133
109 Kaskade-S/T — Part 3 II 21 1100
110 ORYX Stream Cipher — Part 3 (revised) II 20 1119
111 CMEA 1 II 20 1099
112 Weakened Granit — Part 1 I 20 101
113 RSA Factoring Challenge: RSA-210 II 19 0
114 M-138 — Part 3 II 18 1151
115 Double Column Transposition — Part 3 II 18 1133
116 Lattice Part 1 II 18 1100
117 Typex — Part 1 II 17 1116
118 Heartbleed — Part 3 II 17 1141
119 Monoalphabetic Substitution with Camouflage — Part 5 II 16 1107
120 Spanish Strip Cipher — Part 1 II 16 1131
121 CMEA 2 III 16 13368
122 RSA with Special d III 15 13355
123 Typex — Part 2 II 15 1117
124 Concealed Messages — Vigenère's Night Sky X 13 var
125 Double Column Transposition — Part 1 II 13 1132
126 Spanish Strip Cipher — Part 2 II 12 1131
127 Purple 1 II 11 1098
128 Cascading Encryption — Part 2/3 II 9 1116
129 Cascading Encryption — Part 3/3 II 9 1117
130 Sigaba Part 1 II 8 1098
131 Kaskade-S/T — Part 5 II 8 1101
132 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1101
133 Weakened Handycipher — Part 3 II 7 1171
134 Akelarre Part 1 II 6 1099
135 Weakened Handycipher — Part 1 II 6 1171
136 Weakened Handycipher — Part 2 II 6 1171
137 Flawed Usage of a OTP Cipher by the BND II 6 1195
138 M-138 — Part 4 II 5 1151
139 ORYX Stream Cipher — Part 4a II 5 1132
140 Double Column Transposition — Part 5 II 4 1136
141 Notes of an Italian Soldier X 4 var
142 Unknown Author X 2 var
143 Handycipher — Part 2 II 2 1160
144 Sigaba Part 2 III 2 13355
145 Double Column Transposition X 2 var
146 Handycipher — Part 1 II 2 1160
147 Handycipher — Part 3 III 2 14255
148 Extended Handycipher — Part 3 II 1 1163
149 Extended Handycipher — Part 1 II 1 1163
150 Extended Handycipher — Part 2 II 1 1163
151 Beale Ciphers X 1 var
152 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1109
153 Spirale — Part 3 II 1 1195
154 Spirale — Part 2 II 1 1195
155 ORYX Stream Cipher — Part 4b III 1 13879
156 Substitution Cipher with Non-Prefix Codes III 1 13416
157 Spirale — Part 1 II 1 1195
158 Weakened Granit — Part 3 II 0 1208
159 Double-Column Transposition/Granit — Part 3 II 0 1181
160 ORYX Stream Cipher — Part 4c III 0 13879
161 Double-Column Transposition/Granit — Part 1 II 0 1181
162 Spirale — Part 4 II 0 1195
163 Double-Column Transposition/Granit — Part 2 II 0 1181
164 Weakened Granit — Part 2 II 0 1208
165 Spanish Strip Cipher — Part 3 X 0 var
166 RSA Factoring Challenge: RSA-380 III 0 13486
167 RSA Factoring Challenge: RSA-270 III 0 13486
168 RSA Factoring Challenge: RSA-896 III 0 13486
169 RSA Factoring Challenge: RSA-260 III 0 13486
170 RSA Factoring Challenge: RSA-250 III 0 13486
171 RSA Factoring Challenge: RSA-240 III 0 13486
172 RSA Factoring Challenge: RSA-280 III 0 13486
173 RSA Factoring Challenge: RSA-290 III 0 13486
174 RSA Factoring Challenge: RSA-310 III 0 13486
175 RSA Factoring Challenge: RSA-1024 III 0 13486
176 RSA Factoring Challenge: RSA-309 III 0 13486
177 RSA Factoring Challenge: RSA-300 III 0 13486
178 RSA Factoring Challenge: RSA-232 III 0 13486
179 RSA Factoring Challenge: RSA-230 II 0 1106
180 World Record Challenge: Break 65 Bits of AES III 0 13355
181 Kryptos X 0 var
182 Dorabella X 0 var
183 D'Agapeyeff X 0 var
184 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13377
185 Twelve-Year-Old Murder Case X 0 var
186 RSA Factoring Challenge: RSA-220 II 0 1106
187 The third ENIGMA M4 message X 0 var
188 Digital Signatures: DSA with Medium Fields III 0 13438
189 Kaskade-S/T — Part 4 II 0 1101
190 RSA Factoring Challenge: RSA-320 III 0 13486
191 RSA Factoring Challenge: RSA-330 III 0 13486
192 RSA Factoring Challenge: RSA-490 III 0 13486
193 RSA Factoring Challenge: RSA-480 III 0 13486
194 RSA Factoring Challenge: RSA-470 III 0 13486
195 RSA Factoring Challenge: RSA-1536 III 0 13486
196 RSA Factoring Challenge: RSA-500 III 0 13486
197 RSA Factoring Challenge: RSA-617 III 0 13486
198 Double Column Transposition Reloaded — Part 2 III 0 13790
199 Double Column Transposition Reloaded — Part 1 III 0 13790
200 ORYX Stream Cipher — Part 4d III 0 13692
201 RSA Factoring Challenge: RSA-2048 III 0 13486
202 RSA Factoring Challenge: RSA-460 III 0 13486
203 RSA Factoring Challenge: RSA-450 III 0 13486
204 RSA Factoring Challenge: RSA-370 III 0 13486
205 RSA Factoring Challenge: RSA-360 III 0 13486
206 RSA Factoring Challenge: RSA-350 III 0 13486
207 RSA Factoring Challenge: RSA-340 III 0 13486
208 RSA Factoring Challenge: RSA-390 III 0 13486
209 RSA Factoring Challenge: RSA-400 III 0 13486
210 RSA Factoring Challenge: RSA-440 III 0 13486
211 RSA Factoring Challenge: RSA-430 III 0 13486
212 RSA Factoring Challenge: RSA-420 III 0 13486
213 RSA Factoring Challenge: RSA-410 III 0 13486
214 Double Column Transposition Reloaded — Part 3 III 0 13790
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:06 - 12.02.2016] HolgerK solved the Level I challenge 'News from Castle Mansfeld'    +++    [22:33 - 11.02.2016] neelie86 solved the Level I challenge 'Number Sequence — Part 8'    +++    [19:20 - 11.02.2016] crython solved the Level I challenge 'Original Caesar Cipher'    +++    [16:00 - 11.02.2016] noffi solved the Level I challenge 'Number Sequence — Part 6'    +++    [15:35 - 11.02.2016] noffi solved the Level I challenge 'Number Sequence — Part 3'    +++