MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11231
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4171 100
2 Original Caesar Cipher I 2887 100
3 Number Sequence — Part 2 I 2040 100
4 Caesar Encryption I 1376 100
5 Beaver Code I 1141 100
6 Letter to the Templars — Part 1 I 996 100
7 Number Sequence — Part 3 I 953 100
8 Letter to the Templars — Part 2 I 798 100
9 Number Sequence — Part 4 I 786 100
10 A hidden word I 786 100
11 Letter to the Templars — Part 3 II 687 1085
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 558 100
13 Monoalphabetic Substitution I 531 100
14 Cracking SHA1-Hashed Passwords II 520 1082
15 Factorization Cipher — Part 1 I 479 100
16 Grille Cipher I 460 100
17 Advent-Challenge — Part 1 I 399 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 352 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 300 100
22 Alice's Birthday Party (Part 1) II 286 1081
23 Snow White and the seven dwarfs I 280 100
24 Alice's Birthday Party (Part 2) II 280 1081
25 From Russia with Love I 266 100
26 Broadcasting and low exponent — RSA Attack II 222 1082
27 Modified Caesar Cipher I 219 100
28 How do you become a big cryptographer? I 216 100
29 M-138 — Part 1 I 200 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 192 1081
31 Not-so-Secret Message from Malawi — Part I (RSA) II 188 1081
32 Reserve Hand Procedure — Part 1 I 186 100
33 Letter from the Alleged Countess Julie von Ortenburg I 170 100
34 Classical Ciphers^3 I 169 100
35 Hybrid Encryption I II 166 1081
36 Enigma Messages with Repeated Letters — Part 1 I 164 100
37 Nils away on travel I 156 100
38 RSA: Two different keys — same ciphertext II 152 1082
39 Pigpen with a twist — Part 1 I 148 100
40 Cryptanalysis Hacking Puzzles — Part 2 I 148 100
41 Molehunt (Part 1/3) I 146 100
42 Factorization Cipher — Part 2 II 144 1083
43 ¿No Hablas Español? No problemo! I 143 100
44 Number Sequence — Part 6 I 143 100
45 The Book Code: A Challenge for Bookworms I 141 100
46 Molehunt (Part 2/3) I 138 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 128 1081
49 M-138 — Part 2 II 125 1092
50 A Secret Message from Castle Mansfeld I 121 100
51 Image Noise I 120 100
52 Trifid Cipher I 116 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 114 1083
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 107 100
57 Double Columnar Transposition I 106 100
58 Number Sequence — Part 9 I 105 100
59 Playfair with hints about the grid I 105 100
60 Kaskade-S/T — Part 1 I 102 100
61 A hidden word — Part 2 I 100 100
62 Number Sequence — Part 10 I 100 100
63 Enigma Combinatorics I 98 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 95 100
65 Zodiac Cipher I 92 100
66 Factorization Cipher — Part 3 II 90 1083
67 Heartbleed — Part 1 I 90 100
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 89 100
70 Hill Cipher with Sudoku Key I 88 100
71 Enigma Part 2 II 86 1081
72 Number Sequence — Part 7 I 85 100
73 The Last Note I 84 100
74 Partial Key Exposure with RSA — Part 1 II 82 1083
75 Molehunt (Part 3/3) II 80 1081
76 ORYX Stream Cipher Part I II 79 1081
77 Enigma Messages with Repeated Letters — Part 2 I 77 100
78 Enigma Messages with Repeated Letters — Part 3 I 77 100
79 AES key — encoded in the machine readable zone of a European ePassport II 76 1083
80 Enigma Messages with Repeated Letters — Part 5 I 74 100
81 Multilingual Monoalphabetic Substitution I 73 100
82 Enigma Messages I 73 100
83 Smartcard RSA II 71 1081
84 BCR code (Book-Caesar-RSA) II 70 1085
85 Enigma Messages with Repeated Letters — Part 4 I 69 100
86 Turing Bombe Enigma I I 68 100
87 Cascading Encryption — Part 1/3 I 67 100
88 Recycled One-Time Pad I 63 100
89 Unusual encryption using a diophantine equation II 63 1082
90 Heartbleed — Part 2 I 60 100
91 Monoalphabetic substitution with camouflage — Part 1 I 60 100
92 Modular Sequences I 58 100
93 M-138 — Part 3 II 57 1092
94 An Invisible Message I 56 100
95 The Einstein Enigma II 56 1109
96 RSA Factoring Challenge: RSA-704 II 55 0
97 Find the right route — Part 1 I 54 100
98 Kaskade-S/T — Part 2 II 51 1081
99 News from Castle Mansfeld I 51 100
100 Unconcealed RSA messages II 49 1083
101 Monoalphabetic substitution with camouflage — Part 2 II 48 1083
102 RSA Factoring Challenge: RSA-210 II 47 0
103 Summer Job II 47 1112
104 ORYX Stream Cipher Part II II 47 1081
105 New Year's Greetings — Part 1 I 47 100
106 Keyshanc — Part 1 II 46 1084
107 Monoalphabetic substitution with camouflage — Part 4 I 46 100
108 Strange Message from Thessaloniki I 46 100
109 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 46 1081
110 Advent-Challenge — Part 2 II 45 1107
111 Monoalphabetic substitution with camouflage — Part 3 II 44 1083
112 Double Column Transposition — Part 4 II 44 1090
113 New Year's Greetings — Part 2 I 43 100
114 Weakened Granit — Part 1 I 43 100
115 CMEA 1 II 42 1081
116 New Year's Greetings — Part 3 I 41 100
117 Music Code — Part 1 I 41 100
118 Music Code — Part 2 II 41 1082
119 Double Column Transposition — Part 2 II 41 1090
120 An 'unhearable' message I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Wheatstone Cryptograph — Part 1 I 38 101
123 Pigpen with a twist — Part 2 II 38 1082
124 Ku Klux Klan X 38 var
125 Lightweight Introduction to Lattices — Part 1 I 38 100
126 Not-so-Secret Message from Malawi — Part II (ECC) II 38 1081
127 Advent Challenge — Part 3 II 38 1108
128 Homophonic Encryption — Part 1 II 37 1122
129 Double Column Transposition — Part 3 II 37 1090
130 Advent Challenge — Part 4 II 37 1108
131 Pigpen with a twist — Part 3 II 36 1082
132 Keyshanc — Part 2 II 36 1084
133 Heartbleed — Part 3 II 33 1091
134 Kaskade-S/T — Part 3 II 32 1081
135 Homophonic Encryption — Part 2 II 32 1122
136 Polyhomophonic Substitution — Part 1 I 31 100
137 Trendy Messenger II 31 1112
138 Homophonic Encryption — Part 3 II 31 1122
139 Fastest in the West II 31 1112
140 RSA Factoring Challenge: RSA-220 II 31 0
141 Spanish Strip Cipher — Part 1 II 30 1089
142 Homophonic Encryption — Part 4 II 30 1122
143 Lattice Part 1 II 30 1081
144 ORYX Stream Cipher — Part 3 (revised) II 30 1087
145 Double Column Transposition — Part 1 II 29 1089
146 RSA Factoring Challenge: RSA-230 II 28 0
147 Monoalphabetic Substitution with Nostradamus Flavor II 28 1119
148 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1084
149 Lightweight Introduction to Lattices — Part 2 I 27 100
150 CMEA 2 III 27 13054
151 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
152 M-138 — Part 4 II 26 1092
153 Spanish Strip Cipher — Part 2 II 26 1089
154 Lightweight Introduction to Lattices — Part 3 II 25 1147
155 Typex — Part 1 II 25 1086
156 RSA with Special d III 23 13049
157 Handycipher made in love — Part 1 II 23 1119
158 Typex — Part 2 II 22 1086
159 Find the right route — Part 2 I 22 100
160 AES ECB Wrong Encoding II 21 1107
161 Polyphonic Substitution Cipher — Part 1 II 20 1130
162 The LoRa Cipher: Logic Randomness — Part 1 II 19 1136
163 Breaking a Filter Generator II 19 1114
164 Polyhomophonic Substitution — Part 2 II 19 1138
165 Purple 1 II 18 1081
166 Find the right route — Part 3 I 18 100
167 Handycipher made in love — Part 2 II 17 1122
168 Polyphonic Substitution Cipher — Part 2 II 17 1133
169 RSA Factoring Challenge: RSA-240 III 17 0
170 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1098
171 Sigaba Part 1 II 16 1081
172 Concealed Messages — Vigenère's Night Sky X 16 var
173 The T52 Sturgeon Challenge — Part 1 II 16 1124
174 RSA Factoring Challenge: RSA-250 III 16 0
175 New Year's Greetings — Part 5 II 15 1097
176 Cipher ID — Part 1 II 15 1130
177 The T52 Sturgeon Challenge — Part 2 II 15 1125
178 RSA Factoring Challenge: RSA-232 III 15 0
179 Flawed Usage of a OTP Cipher by the BND II 15 1094
180 A Cloaked Substitution Cipher — Part 1 II 15 1126
181 Weakened Handycipher — Part 1 II 15 1093
182 Weakened Handycipher — Part 3 II 14 1093
183 A Cloaked Substitution Cipher — Part 2 II 14 1126
184 Cascading Encryption — Part 2/3 II 14 1086
185 Polyhomophonic Substitution — Part 3 II 14 1139
186 Weakened Handycipher — Part 2 II 13 1093
187 Cascading Encryption — Part 3/3 II 12 1086
188 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
189 The T52 Sturgeon Challenge — Part 3 II 12 1125
190 The SZ42 Challenge — Part 2 II 11 1149
191 ORYX Stream Cipher — Part 4a II 11 1089
192 The SZ42 Challenge — Part 1 II 11 1147
193 The T52 Sturgeon Challenge — Part 4 II 10 1125
194 Akelarre Part 1 II 10 1081
195 Kaskade-S/T — Part 5 II 10 1082
196 The SZ42 Challenge — Part 4 II 9 1151
197 Hilly — Part 1 II 9 1101
198 The SIGABA Challenge — Part 1 II 9 1136
199 Double Column Transposition — Part 5 II 8 1090
200 The SIGABA Challenge — Part 2 II 8 1137
201 The T52 Sturgeon Challenge — Part 8 II 8 1126
202 The SZ42 Challenge — Part 3 II 8 1149
203 The SZ42 Challenge — Part 5 II 8 1151
204 Handycipher — Part 2 II 7 1093
205 The SZ42 Challenge — Part 8 II 7 1158
206 The T52 Sturgeon Challenge — Part 12 II 7 1126
207 The T52 Sturgeon Challenge — Part 11 II 7 1126
208 The SZ42 Challenge — Part 6 II 7 1155
209 The T52 Sturgeon Challenge — Part 9 II 6 1126
210 The SZ42 Challenge — Part 7 II 6 1158
211 The T52 Sturgeon Challenge — Part 6 II 6 1126
212 The SIGABA Challenge — Part 3 III 6 13946
213 The T52 Sturgeon Challenge — Part 5 II 6 1126
214 Handycipher — Part 3 III 6 13259
215 The T52 Sturgeon Challenge — Part 7 II 6 1126
216 The SZ42 Challenge — Part 9 II 6 1165
217 Holographic Encryption — Part 1 II 6 1103
218 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1104
219 Weakened Handycipher — Part 5 II 5 1098
220 Weakened Handycipher — Part 4 II 5 1098
221 Weakened Handycipher — Part 6 II 5 1098
222 Sigaba Part 2 III 5 13049
223 "The Road" — Part 1 II 5 1117
224 Wheatstone Cryptograph — Part 2 II 5 1202
225 Spirale — Part 2 II 5 1094
226 The T52 Sturgeon Challenge — Part 10 II 5 1126
227 Handycipher — Part 5 III 5 13356
228 Handycipher — Part 1 II 5 1093
229 The SIGABA Challenge — Part 4 III 5 13951
230 Handycipher — Part 6 III 5 13356
231 Spirale — Part 1 II 5 1094
232 The Heavy T52 Sturgeon Challenge — Part 4 III 4 13979
233 Weakened ElsieFour — Part 3 II 4 1106
234 The SZ42 Challenge — Part 12 II 4 1391
235 The SZ42 Challenge — Part 13 II 4 1391
236 ElsieFour — Part 1 III 4 13480
237 Weakened ElsieFour — Part 1 II 4 1110
238 Handycipher — Part 4 III 4 13356
239 Notes of an Italian Soldier X 4 var
240 Spirale — Part 3 II 4 1094
241 The SZ42 Challenge — Part 11 II 3 1172
242 The SZ42 Challenge — Part 10 II 3 1172
243 The Vatican Challenge — Part 2 X 3 var
244 The Heavy T52 Sturgeon Challenge — Part 7 III 3 13987
245 The Vatican Challenge — Part 1 X 3 var
246 Holographic Encryption — Part 2 II 3 1103
247 Handycipher — Part 8 III 3 13407
248 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1132
249 Extended Handycipher — Part 5 III 3 13356
250 Handycipher — Part 9 III 3 13407
251 Extended Handycipher — Part 3 II 3 1093
252 Extended Handycipher — Part 1 II 3 1093
253 Differential Cryptanalysis — Part 2 II 3 1134
254 Extended Handycipher — Part 2 II 3 1093
255 Extended Handycipher — Part 4 III 3 13356
256 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
257 SIGABA CSP-2900 — Part 2 II 2 1242
258 SIGABA CSP-889 — Part 3 III 2 14822
259 Double Column Transposition X 2 var
260 ORYX Stream Cipher — Part 4b III 2 13205
261 SIGABA CSP-889 — Part 2 II 2 1206
262 SIGABA CSP-889 — Part 1 II 2 1206
263 The Heavy T52 Sturgeon Challenge — Part 5 III 2 13985
264 The SIGABA Challenge — Part 5 III 2 13960
265 Unknown Author X 2 var
266 SIGABA CSP-2900 — Part 1 II 2 1242
267 Handycipher — Part 7 III 2 13407
268 SIGABA CSP-2900 — Part 3 III 2 15218
269 Extended Handycipher — Part 6 III 2 13356
270 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13834
271 Hilly — Part 2 II 1 1106
272 The SIGABA Challenge — Part 6 III 1 13970
273 The Heavy T52 Sturgeon Challenge — Part 9 III 1 13995
274 The Vatican Challenge — Part 4 X 1 var
275 The Heavy T52 Sturgeon Challenge — Part 6 III 1 13986
276 Handycipher — Part 10 II 1 1124
277 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13815
278 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1084
279 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1098
280 Substitution Cipher with Non-Prefix Codes III 1 13074
281 Beale Ciphers X 1 var
282 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13822
283 The Heavy T52 Sturgeon Challenge — Part 8 III 0 13988
284 Spanish Strip Cipher — Part 3 X 0 var
285 RSA Factoring Challenge: RSA-330 III 0 13100
286 RSA Factoring Challenge: RSA-340 III 0 13100
287 RSA Factoring Challenge: RSA-320 III 0 13100
288 RSA Factoring Challenge: RSA-310 III 0 13100
289 RSA Factoring Challenge: RSA-309 III 0 13100
290 RSA Factoring Challenge: RSA-1024 III 0 13100
291 RSA Factoring Challenge: RSA-350 III 0 13100
292 RSA Factoring Challenge: RSA-360 III 0 13100
293 RSA Factoring Challenge: RSA-400 III 0 13100
294 RSA Factoring Challenge: RSA-410 III 0 13100
295 RSA Factoring Challenge: RSA-390 III 0 13100
296 RSA Factoring Challenge: RSA-380 III 0 13100
297 RSA Factoring Challenge: RSA-370 III 0 13100
298 RSA Factoring Challenge: RSA-300 III 0 13100
299 RSA Factoring Challenge: RSA-290 III 0 13100
300 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13058
301 Twelve-Year-Old Murder Case X 0 var
302 World Record Challenge: Break 65 Bits of AES III 0 13049
303 Kryptos X 0 var
304 D'Agapeyeff X 0 var
305 Dorabella X 0 var
306 Kaskade-S/T — Part 4 II 0 1082
307 Digital Signatures: DSA with Medium Fields III 0 13082
308 RSA Factoring Challenge: RSA-896 III 0 13100
309 RSA Factoring Challenge: RSA-280 III 0 13100
310 RSA Factoring Challenge: RSA-270 III 0 13100
311 RSA Factoring Challenge: RSA-260 III 0 13100
312 The third ENIGMA M4 message X 0 var
313 RSA Factoring Challenge: RSA-420 III 0 13100
314 RSA Factoring Challenge: RSA-430 III 0 13100
315 Weakened Granit — Part 2 II 0 1095
316 Weakened Granit — Part 3 II 0 1095
317 Spirale — Part 4 III 0 13291
318 Double-Column Transposition/Granit — Part 3 II 0 1094
319 Double-Column Transposition/Granit — Part 1 II 0 1094
320 Double-Column Transposition/Granit — Part 2 II 0 1094
321 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1098
322 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1098
323 "The Road" — Part 3 II 0 1117
324 The Vatican Challenge — Part 3 X 0 var
325 "The Road" — Part 2 II 0 1117
326 Weakened ElsieFour — Part 2 II 0 1110
327 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1098
328 ORYX Stream Cipher — Part 4c III 0 13205
329 Double Column Transposition Reloaded — Part 3 III 0 13187
330 RSA Factoring Challenge: RSA-470 III 0 13100
331 RSA Factoring Challenge: RSA-480 III 0 13100
332 RSA Factoring Challenge: RSA-1536 III 0 13100
333 RSA Factoring Challenge: RSA-460 III 0 13100
334 RSA Factoring Challenge: RSA-440 III 0 13100
335 RSA Factoring Challenge: RSA-450 III 0 13100
336 RSA Factoring Challenge: RSA-490 III 0 13100
337 RSA Factoring Challenge: RSA-500 III 0 13100
338 Double Column Transposition Reloaded — Part 1 III 0 13187
339 Double Column Transposition Reloaded — Part 2 III 0 13187
340 ORYX Stream Cipher — Part 4d III 0 13163
341 RSA Factoring Challenge: RSA-2048 III 0 13100
342 RSA Factoring Challenge: RSA-617 III 0 13100
343 The Vatican Challenge — Part 5 X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [21:27 - 24.10.2021] mikinsget solved the Level I challenge 'One-Time Pad with Flaws'    +++    [15:29 - 24.10.2021] Jericho solved the Level I challenge 'Nils away on travel'    +++    [10:32 - 24.10.2021] jerva solved the Level II challenge 'The SZ42 Challenge — Part 13'    +++    [02:01 - 24.10.2021] Jet Sam solved the Level I challenge 'Caesar Encryption'    +++    [00:30 - 24.10.2021] Jet Sam solved the Level I challenge 'Number Sequence — Part 2'    +++