MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10769
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3986 100
2 Original Caesar Cipher I 2748 100
3 Number Sequence — Part 2 I 1942 100
4 Caesar Encryption I 1314 100
5 Beaver Code I 1085 100
6 Letter to the Templars — Part 1 I 949 100
7 Number Sequence — Part 3 I 913 100
8 Letter to the Templars — Part 2 I 759 100
9 Number Sequence — Part 4 I 756 100
10 A hidden word I 747 100
11 Letter to the Templars — Part 3 II 644 1087
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 532 100
13 Monoalphabetic Substitution I 519 100
14 Cracking SHA1-Hashed Passwords II 488 1083
15 Factorization Cipher — Part 1 I 461 100
16 Grille Cipher I 440 100
17 Advent-Challenge — Part 1 I 378 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 368 100
19 Number Sequence — Part 8 I 328 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 316 100
21 One-Time Pad with Flaws I 289 100
22 Alice's Birthday Party (Part 1) II 275 1082
23 Alice's Birthday Party (Part 2) II 269 1082
24 Snow White and the seven dwarfs I 268 100
25 From Russia with Love I 256 100
26 Broadcasting and low exponent — RSA Attack II 213 1084
27 Modified Caesar Cipher I 211 100
28 How do you become a big cryptographer? I 204 100
29 M-138 — Part 1 I 186 100
30 Reserve Hand Procedure — Part 1 I 182 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 181 1082
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 179 1082
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 163 100
35 Enigma Messages with Repeated Letters — Part 1 I 160 100
36 Hybrid Encryption I II 154 1082
37 Nils away on travel I 152 100
38 RSA: Two different keys — same ciphertext II 149 1084
39 Pigpen with a twist — Part 1 I 144 100
40 Factorization Cipher — Part 2 II 138 1085
41 Molehunt (Part 1/3) I 137 100
42 ¿No Hablas Español? No problemo! I 135 100
43 The Book Code: A Challenge for Bookworms I 135 100
44 Molehunt (Part 2/3) I 132 100
45 Cryptanalysis Hacking Puzzles — Part 2 I 129 100
46 Number Sequence — Part 6 I 127 100
47 Autokey Cipher I 126 100
48 Enigma Part 1 II 125 1082
49 A Secret Message from Castle Mansfeld I 118 100
50 M-138 — Part 2 II 116 1095
51 Trifid Cipher I 114 100
52 A really long number sequence II 111 1084
53 ADFGVX — Part 2 I 110 100
54 Image Noise I 109 100
55 Playfair Encryption I 102 100
56 ADFGVX — Part 1 I 102 100
57 Playfair with hints about the grid I 101 100
58 Kaskade-S/T — Part 1 I 100 100
59 Double Columnar Transposition I 98 100
60 Enigma Combinatorics I 96 100
61 Number Sequence — Part 10 I 95 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
63 ECDH-Key Exchange for Beginners I 89 100
64 Heartbleed — Part 1 I 89 100
65 Number Sequence — Part 9 I 88 100
66 Factorization Cipher — Part 3 II 87 1085
67 A hidden word — Part 2 I 86 100
68 Zodiac Cipher I 85 100
69 Enigma Part 2 II 83 1082
70 Hill Cipher with Sudoku Key I 81 100
71 Number Sequence — Part 5 I 81 100
72 ORYX Stream Cipher Part I II 79 1082
73 Partial Key Exposure with RSA — Part 1 II 79 1085
74 The Last Note I 79 100
75 Molehunt (Part 3/3) II 76 1082
76 Number Sequence — Part 7 I 74 100
77 Enigma Messages with Repeated Letters — Part 3 I 73 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Smartcard RSA II 70 1082
80 Enigma Messages with Repeated Letters — Part 5 I 70 100
81 Enigma Messages I 70 100
82 Multilingual Monoalphabetic Substitution I 69 100
83 Cascading Encryption — Part 1/3 I 66 100
84 BCR code (Book-Caesar-RSA) II 66 1087
85 Turing Bombe Enigma I I 65 100
86 AES key — encoded in the machine readable zone of a European ePassport II 65 1085
87 Enigma Messages with Repeated Letters — Part 4 I 64 100
88 Recycled One-Time Pad I 62 100
89 Heartbleed — Part 2 I 60 100
90 Unusual encryption using a diophantine equation II 59 1084
91 Monoalphabetic substitution with camouflage — Part 1 I 58 100
92 An Invisible Message I 56 100
93 Modular Sequences I 55 100
94 M-138 — Part 3 II 53 1095
95 The Einstein Enigma II 52 1116
96 Kaskade-S/T — Part 2 II 49 1083
97 News from Castle Mansfeld I 48 100
98 RSA Factoring Challenge: RSA-704 II 47 0
99 Monoalphabetic substitution with camouflage — Part 2 II 47 1085
100 Unconcealed RSA messages II 47 1085
101 ORYX Stream Cipher Part II II 47 1082
102 Keyshanc — Part 1 II 45 1086
103 New Year's Greetings — Part 1 I 45 100
104 Monoalphabetic substitution with camouflage — Part 4 I 45 100
105 Monoalphabetic substitution with camouflage — Part 3 II 43 1085
106 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 43 1083
107 Summer Job II 43 1120
108 Advent-Challenge — Part 2 II 42 1114
109 New Year's Greetings — Part 2 I 42 100
110 Weakened Granit — Part 1 I 42 100
111 Strange Message from Thessaloniki I 42 100
112 Double Column Transposition — Part 4 II 42 1092
113 RSA Factoring Challenge: RSA-210 II 42 0
114 Music Code — Part 1 I 40 100
115 Music Code — Part 2 II 40 1084
116 CMEA 1 II 40 1083
117 Double Column Transposition — Part 2 II 40 1092
118 An 'unhearable' message I 39 100
119 New Year's Greetings — Part 3 I 39 100
120 Pigpen with a twist — Part 2 II 37 1084
121 New Year's Greetings — Part 4 I 37 100
122 Ku Klux Klan X 36 var
123 Advent Challenge — Part 4 II 35 1114
124 Keyshanc — Part 2 II 35 1086
125 Advent Challenge — Part 3 II 35 1114
126 Double Column Transposition — Part 3 II 35 1092
127 Pigpen with a twist — Part 3 II 34 1084
128 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1082
129 Trendy Messenger II 31 1120
130 Homophonic Encryption — Part 1 II 31 1135
131 Heartbleed — Part 3 II 30 1094
132 ORYX Stream Cipher — Part 3 (revised) II 30 1089
133 Fastest in the West II 30 1120
134 Kaskade-S/T — Part 3 II 29 1083
135 Lattice Part 1 II 28 1083
136 Find the right route — Part 1 I 28 101
137 CMEA 2 III 27 13083
138 Double Column Transposition — Part 1 II 27 1092
139 Monoalphabetic Substitution with Camouflage — Part 5 II 27 1086
140 Spanish Strip Cipher — Part 1 II 27 1092
141 Monoalphabetic Substitution with Nostradamus Flavor II 27 1130
142 Polyhomophonic Substitution — Part 1 I 26 100
143 RSA Factoring Challenge: RSA-220 II 26 0
144 Lightweight Introduction to Lattices — Part 1 I 26 100
145 Typex — Part 1 II 25 1088
146 Cryptanalysis Hacking Puzzles — Part 1 I 25 100
147 Homophonic Encryption — Part 2 II 24 1135
148 Homophonic Encryption — Part 3 II 23 1135
149 RSA with Special d III 23 13077
150 Typex — Part 2 II 22 1089
151 RSA Factoring Challenge: RSA-230 II 22 0
152 Homophonic Encryption — Part 4 II 22 1135
153 Spanish Strip Cipher — Part 2 II 22 1092
154 Lightweight Introduction to Lattices — Part 2 I 21 100
155 Lightweight Introduction to Lattices — Part 3 II 20 1191
156 Handycipher made in love — Part 1 II 20 1130
157 Polyphonic Substitution Cipher — Part 1 II 17 1151
158 AES ECB Wrong Encoding II 17 1114
159 Breaking a Filter Generator II 17 1124
160 M-138 — Part 4 II 17 1095
161 The LoRa Cipher: Logic Randomness — Part 1 II 17 1161
162 Purple 1 II 16 1082
163 Concealed Messages — Vigenère's Night Sky X 16 var
164 Sigaba Part 1 II 15 1082
165 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1103
166 New Year's Greetings — Part 5 II 15 1101
167 Weakened Handycipher — Part 1 II 15 1097
168 Handycipher made in love — Part 2 II 15 1136
169 A Cloaked Substitution Cipher — Part 1 II 15 1142
170 Polyhomophonic Substitution — Part 2 II 15 1167
171 Weakened Handycipher — Part 3 II 14 1097
172 A Cloaked Substitution Cipher — Part 2 II 14 1143
173 Flawed Usage of a OTP Cipher by the BND II 14 1098
174 Polyphonic Substitution Cipher — Part 2 II 14 1157
175 Cipher ID — Part 1 II 14 1150
176 Weakened Handycipher — Part 2 II 13 1097
177 Cascading Encryption — Part 2/3 II 13 1089
178 The T52 Sturgeon Challenge — Part 1 II 13 1140
179 Cascading Encryption — Part 3/3 II 12 1089
180 RSA Factoring Challenge: RSA-240 III 12 0
181 The T52 Sturgeon Challenge — Part 2 II 12 1140
182 Polyhomophonic Substitution — Part 3 II 12 1169
183 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1083
184 ORYX Stream Cipher — Part 4a II 11 1092
185 Find the right route — Part 3 I 10 104
186 The T52 Sturgeon Challenge — Part 3 II 10 1140
187 Kaskade-S/T — Part 5 II 10 1083
188 RSA Factoring Challenge: RSA-250 III 10 0
189 Akelarre Part 1 II 10 1082
190 The T52 Sturgeon Challenge — Part 4 II 9 1140
191 RSA Factoring Challenge: RSA-232 III 9 0
192 Hilly — Part 1 II 8 1107
193 The SZ42 Challenge — Part 2 II 8 1198
194 Find the right route — Part 2 I 8 103
195 The SZ42 Challenge — Part 1 II 8 1193
196 Double Column Transposition — Part 5 II 8 1093
197 Handycipher — Part 2 II 7 1096
198 The SZ42 Challenge — Part 3 II 7 1202
199 The SIGABA Challenge — Part 1 II 7 1163
200 The SIGABA Challenge — Part 2 II 7 1164
201 The SZ42 Challenge — Part 4 II 7 1208
202 Holographic Encryption — Part 1 II 6 1108
203 The T52 Sturgeon Challenge — Part 12 II 6 1142
204 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1110
205 The T52 Sturgeon Challenge — Part 8 II 6 1142
206 Handycipher — Part 3 III 6 13312
207 The SZ42 Challenge — Part 5 II 6 1209
208 The T52 Sturgeon Challenge — Part 11 II 6 1142
209 Weakened Handycipher — Part 5 II 5 1103
210 The T52 Sturgeon Challenge — Part 7 II 5 1142
211 The SIGABA Challenge — Part 3 III 5 14318
212 Weakened Handycipher — Part 4 II 5 1103
213 Handycipher — Part 5 III 5 13427
214 The SZ42 Challenge — Part 8 II 5 1247
215 "The Road" — Part 1 II 5 1127
216 The T52 Sturgeon Challenge — Part 9 II 5 1142
217 Handycipher — Part 1 II 5 1096
218 The T52 Sturgeon Challenge — Part 10 II 5 1142
219 The SZ42 Challenge — Part 6 II 5 1226
220 Weakened Handycipher — Part 6 II 5 1103
221 Handycipher — Part 6 III 5 13427
222 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14389
223 The SIGABA Challenge — Part 4 III 4 14330
224 Notes of an Italian Soldier X 4 var
225 Handycipher — Part 4 III 4 13427
226 Spirale — Part 2 II 4 1098
227 Spirale — Part 1 II 4 1098
228 The SZ42 Challenge — Part 7 II 4 1244
229 The T52 Sturgeon Challenge — Part 5 II 4 1142
230 Sigaba Part 2 III 4 13077
231 The T52 Sturgeon Challenge — Part 6 II 4 1142
232 Extended Handycipher — Part 2 II 3 1096
233 The Vatican Challenge — Part 1 X 3 var
234 Spirale — Part 3 II 3 1098
235 The Vatican Challenge — Part 2 X 3 var
236 Differential Cryptanalysis — Part 2 II 3 1158
237 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14408
238 The SZ42 Challenge — Part 9 II 3 1333
239 Weakened ElsieFour — Part 3 II 3 1112
240 Weakened ElsieFour — Part 1 II 3 1118
241 Extended Handycipher — Part 1 II 3 1096
242 Extended Handycipher — Part 3 II 3 1096
243 Extended Handycipher — Part 4 III 3 13427
244 Handycipher — Part 9 III 3 13488
245 Handycipher — Part 8 III 3 13488
246 Holographic Encryption — Part 2 II 3 1108
247 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1154
248 ElsieFour — Part 1 III 3 13580
249 Extended Handycipher — Part 5 III 3 13427
250 ORYX Stream Cipher — Part 4b III 2 13251
251 Double Column Transposition X 2 var
252 The Heavy T52 Sturgeon Challenge — Part 3 III 2 14100
253 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
254 The SIGABA Challenge — Part 5 III 2 14346
255 Handycipher — Part 7 III 2 13488
256 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14403
257 Extended Handycipher — Part 6 III 2 13427
258 Unknown Author X 2 var
259 Handycipher — Part 10 II 1 1138
260 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1103
261 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1086
262 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14068
263 The Vatican Challenge — Part 4 X 1 var
264 Beale Ciphers X 1 var
265 Substitution Cipher with Non-Prefix Codes III 1 13105
266 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14424
267 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14405
268 Hilly — Part 2 II 1 1113
269 The Vatican Challenge — Part 5 X 0 var
270 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14410
271 The Vatican Challenge — Part 3 X 0 var
272 The SIGABA Challenge — Part 6 III 0 14367
273 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14079
274 Double Column Transposition Reloaded — Part 3 III 0 13230
275 RSA Factoring Challenge: RSA-320 III 0 13133
276 RSA Factoring Challenge: RSA-330 III 0 13133
277 RSA Factoring Challenge: RSA-310 III 0 13133
278 RSA Factoring Challenge: RSA-1024 III 0 13133
279 RSA Factoring Challenge: RSA-300 III 0 13133
280 RSA Factoring Challenge: RSA-309 III 0 13133
281 RSA Factoring Challenge: RSA-340 III 0 13133
282 RSA Factoring Challenge: RSA-350 III 0 13133
283 RSA Factoring Challenge: RSA-390 III 0 13133
284 RSA Factoring Challenge: RSA-400 III 0 13133
285 RSA Factoring Challenge: RSA-380 III 0 13133
286 RSA Factoring Challenge: RSA-370 III 0 13133
287 RSA Factoring Challenge: RSA-360 III 0 13133
288 RSA Factoring Challenge: RSA-290 III 0 13133
289 RSA Factoring Challenge: RSA-280 III 0 13133
290 World Record Challenge: Break 65 Bits of AES III 0 13077
291 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13087
292 Kryptos X 0 var
293 Dorabella X 0 var
294 D'Agapeyeff X 0 var
295 Twelve-Year-Old Murder Case X 0 var
296 Kaskade-S/T — Part 4 II 0 1083
297 RSA Factoring Challenge: RSA-270 III 0 13133
298 RSA Factoring Challenge: RSA-896 III 0 13133
299 RSA Factoring Challenge: RSA-260 III 0 13133
300 The third ENIGMA M4 message X 0 var
301 Digital Signatures: DSA with Medium Fields III 0 13114
302 RSA Factoring Challenge: RSA-410 III 0 13133
303 RSA Factoring Challenge: RSA-420 III 0 13133
304 Double-Column Transposition/Granit — Part 3 II 0 1097
305 Spirale — Part 4 III 0 13349
306 Double-Column Transposition/Granit — Part 2 II 0 1097
307 Double-Column Transposition/Granit — Part 1 II 0 1097
308 Spanish Strip Cipher — Part 3 X 0 var
309 ORYX Stream Cipher — Part 4c III 0 13251
310 Weakened Granit — Part 2 II 0 1098
311 Weakened Granit — Part 3 II 0 1098
312 Weakened ElsieFour — Part 2 II 0 1118
313 "The Road" — Part 2 II 0 1127
314 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1103
315 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1103
316 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1103
317 Double Column Transposition Reloaded — Part 2 III 0 13230
318 Double Column Transposition Reloaded — Part 1 III 0 13230
319 RSA Factoring Challenge: RSA-460 III 0 13133
320 RSA Factoring Challenge: RSA-1536 III 0 13133
321 RSA Factoring Challenge: RSA-450 III 0 13133
322 RSA Factoring Challenge: RSA-440 III 0 13133
323 RSA Factoring Challenge: RSA-430 III 0 13133
324 RSA Factoring Challenge: RSA-470 III 0 13133
325 RSA Factoring Challenge: RSA-480 III 0 13133
326 RSA Factoring Challenge: RSA-2048 III 0 13133
327 ORYX Stream Cipher — Part 4d III 0 13203
328 RSA Factoring Challenge: RSA-617 III 0 13133
329 RSA Factoring Challenge: RSA-500 III 0 13133
330 RSA Factoring Challenge: RSA-490 III 0 13133
331 "The Road" — Part 3 II 0 1127
 
 
powered by the CrypTool project  CrypTool

 

   +++    [17:17 - 18.01.2021] itnomad solved the Level I challenge 'How do you become a big cryptographer?'    +++    [15:00 - 18.01.2021] Muskrat solved the Level I challenge 'Number Sequence — Part 10'    +++    [14:14 - 18.01.2021] Muskrat solved the Level I challenge 'Number Sequence — Part 7'    +++    [14:00 - 18.01.2021] Muskrat solved the Level I challenge 'Number Sequence — Part 6'    +++    [13:38 - 18.01.2021] Muskrat solved the Level I challenge 'Number Sequence — Part 5'    +++