MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10582
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3902 100
2 Original Caesar Cipher I 2676 100
3 Number Sequence — Part 2 I 1885 100
4 Caesar Encryption I 1280 100
5 Beaver Code I 1054 100
6 Letter to the Templars — Part 1 I 923 100
7 Number Sequence — Part 3 I 881 100
8 Letter to the Templars — Part 2 I 739 100
9 A hidden word I 730 100
10 Number Sequence — Part 4 I 727 100
11 Letter to the Templars — Part 3 II 623 1088
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 520 100
13 Monoalphabetic Substitution I 511 100
14 Cracking SHA1-Hashed Passwords II 476 1084
15 Factorization Cipher — Part 1 I 452 100
16 Grille Cipher I 426 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 364 100
18 Advent-Challenge — Part 1 I 351 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 313 100
20 Number Sequence — Part 8 I 308 100
21 One-Time Pad with Flaws I 282 100
22 Alice's Birthday Party (Part 1) II 269 1083
23 Snow White and the seven dwarfs I 266 100
24 Alice's Birthday Party (Part 2) II 258 1083
25 From Russia with Love I 254 100
26 Broadcasting and low exponent — RSA-Attack II 207 1085
27 Modified Caesar Cipher I 204 100
28 How do you become a big cryptographer? I 201 100
29 Reserve Hand Procedure — Part 1 I 181 100
30 M-138 — Part 1 I 180 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 176 1083
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 169 1083
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 162 100
35 Enigma Messages with Repeated Letters — Part 1 I 159 100
36 Nils away on travel I 152 100
37 Hybrid Encryption I II 149 1083
38 RSA: Two different keys — same ciphertext II 145 1085
39 Pigpen with a twist — Part 1 I 142 100
40 ¿No Hablas Español? No problemo! I 135 100
41 Factorization Cipher — Part 2 II 134 1086
42 Molehunt (Part 1/3) I 134 100
43 The Book Code: A Challenge for Bookworms I 134 100
44 Molehunt (Part 2/3) I 129 100
45 Number Sequence — Part 6 I 123 100
46 Enigma Part 1 II 122 1083
47 Autokey Cipher I 119 100
48 Cryptanalysis Hacking Puzzles — Part 2 I 117 100
49 A Secret Message from Castle Mansfeld I 116 100
50 Trifid Cipher I 114 100
51 M-138 — Part 2 II 113 1096
52 A really long number sequence II 110 1085
53 ADFGVX — Part 2 I 108 100
54 Image Noise I 105 100
55 Playfair Encryption I 100 100
56 ADFGVX — Part 1 I 100 100
57 Kaskade-S/T — Part 1 I 99 100
58 Playfair with hints about the grid I 98 100
59 Enigma Combinatorics I 96 100
60 Double Columnar Transposition I 95 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
62 Number Sequence — Part 10 I 91 100
63 Heartbleed — Part 1 I 89 100
64 ECDH-Key Exchange for Beginners I 88 100
65 Factorization Cipher — Part 3 II 86 1086
66 A hidden word — Part 2 I 85 100
67 Number Sequence — Part 9 I 84 100
68 Zodiac Cipher I 83 100
69 ORYX Stream Cipher Part I II 79 1083
70 The Last Note I 79 100
71 Number Sequence — Part 5 I 78 100
72 Enigma Part 2 II 78 1083
73 Hill Cipher with Sudoku Key I 78 100
74 Partial Key Exposure with RSA — Part 1 II 78 1086
75 Enigma Messages with Repeated Letters — Part 3 I 72 100
76 Molehunt (Part 3/3) II 72 1083
77 Number Sequence — Part 7 I 72 100
78 Enigma Messages with Repeated Letters — Part 2 I 71 100
79 Enigma Messages I 70 100
80 Smartcard RSA II 69 1083
81 Enigma Messages with Repeated Letters — Part 5 I 69 100
82 Multilingual Monoalphabetic Substitution I 68 100
83 BCR code (Book-Caesar-RSA) II 66 1088
84 Cascading Encryption — Part 1/3 I 66 100
85 Enigma Messages with Repeated Letters — Part 4 I 63 100
86 Turing Bombe Enigma I I 62 100
87 AES key — encoded in the machine readable zone of a European ePassport II 62 1086
88 Heartbleed — Part 2 I 60 100
89 Recycled One-Time Pad I 60 100
90 Unusual encryption using a diophantine equation II 59 1085
91 Monoalphabetic substitution with camouflage — Part 1 I 56 100
92 An Invisible Message I 54 100
93 M-138 — Part 3 II 51 1096
94 The Einstein Enigma II 50 1120
95 Modular Sequences I 48 100
96 Kaskade-S/T — Part 2 II 48 1084
97 ORYX Stream Cipher Part II II 47 1083
98 RSA Factoring Challenge: RSA-704 II 47 0
99 Unconcealed RSA messages II 46 1085
100 News from Castle Mansfeld I 45 100
101 Monoalphabetic substitution with camouflage — Part 2 II 45 1086
102 New Year's Greetings — Part 1 I 45 100
103 Keyshanc — Part 1 II 44 1087
104 Monoalphabetic substitution with camouflage — Part 4 I 44 100
105 RSA Factoring Challenge: RSA-210 II 42 0
106 Strange Message from Thessaloniki I 42 100
107 New Year's Greetings — Part 2 I 42 100
108 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 42 1083
109 Weakened Granit — Part 1 I 42 100
110 Monoalphabetic substitution with camouflage — Part 3 II 42 1086
111 Summer Job II 40 1124
112 CMEA 1 II 39 1083
113 Double Column Transposition — Part 4 II 39 1094
114 Music Code — Part 1 I 39 100
115 Music Code — Part 2 II 39 1084
116 An 'unhearable' message I 39 100
117 New Year's Greetings — Part 3 I 39 100
118 Double Column Transposition — Part 2 II 38 1093
119 Pigpen with a twist — Part 2 II 37 1085
120 New Year's Greetings — Part 4 I 37 100
121 Ku Klux Klan X 36 var
122 Advent-Challenge — Part 2 II 35 1118
123 Keyshanc — Part 2 II 34 1087
124 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1083
125 Double Column Transposition — Part 3 II 34 1093
126 Pigpen with a twist — Part 3 II 34 1085
127 Trendy Messenger II 31 1124
128 Heartbleed — Part 3 II 30 1095
129 ORYX Stream Cipher — Part 3 (revised) II 30 1090
130 Fastest in the West II 29 1124
131 Advent Challenge — Part 3 II 29 1118
132 Advent Challenge — Part 4 II 29 1118
133 Kaskade-S/T — Part 3 II 29 1084
134 Homophonic Encryption — Part 1 II 28 1143
135 Lattice Part 1 II 28 1084
136 Double Column Transposition — Part 1 II 27 1093
137 Monoalphabetic Substitution with Camouflage — Part 5 II 27 1086
138 CMEA 2 III 27 13096
139 Spanish Strip Cipher — Part 1 II 27 1093
140 RSA Factoring Challenge: RSA-220 II 26 0
141 Typex — Part 1 II 25 1089
142 Monoalphabetic Substitution with Nostradamus Flavor II 25 1137
143 Cryptanalysis Hacking Puzzles — Part 1 I 24 100
144 Typex — Part 2 II 22 1090
145 RSA with Special d III 22 13090
146 Polyhomophonic Substitution — Part 1 I 22 101
147 Spanish Strip Cipher — Part 2 II 22 1093
148 Homophonic Encryption — Part 2 II 22 1143
149 RSA Factoring Challenge: RSA-230 II 22 0
150 Lightweight Introduction to Lattices — Part 1 I 21 101
151 Homophonic Encryption — Part 3 II 21 1143
152 Homophonic Encryption — Part 4 II 20 1143
153 Handycipher made in love — Part 1 II 20 1137
154 Lightweight Introduction to Lattices — Part 3 II 18 1256
155 M-138 — Part 4 II 17 1096
156 Breaking a Filter Generator II 17 1129
157 AES ECB Wrong Encoding II 17 1118
158 Concealed Messages — Vigenère's Night Sky X 16 var
159 Purple 1 II 16 1083
160 Lightweight Introduction to Lattices — Part 2 I 16 101
161 The LoRa Cipher: Logic Randomness — Part 1 II 16 1183
162 Polyphonic Substitution Cipher — Part 1 II 15 1165
163 Handycipher made in love — Part 2 II 15 1144
164 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1105
165 New Year's Greetings — Part 5 II 15 1103
166 Weakened Handycipher — Part 1 II 15 1098
167 Sigaba Part 1 II 15 1083
168 A Cloaked Substitution Cipher — Part 1 II 15 1153
169 Weakened Handycipher — Part 3 II 14 1098
170 Flawed Usage of a OTP Cipher by the BND II 14 1100
171 A Cloaked Substitution Cipher — Part 2 II 14 1154
172 Polyhomophonic Substitution — Part 2 II 14 1193
173 Weakened Handycipher — Part 2 II 13 1098
174 Cipher ID — Part 1 II 13 1165
175 Cascading Encryption — Part 2/3 II 13 1090
176 The T52 Sturgeon Challenge — Part 1 II 13 1149
177 The T52 Sturgeon Challenge — Part 2 II 12 1150
178 Cascading Encryption — Part 3/3 II 12 1090
179 RSA Factoring Challenge: RSA-240 III 12 0
180 Polyphonic Substitution Cipher — Part 2 II 12 1175
181 ORYX Stream Cipher — Part 4a II 11 1093
182 Polyhomophonic Substitution — Part 3 II 11 1196
183 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1084
184 Akelarre Part 1 II 10 1083
185 RSA Factoring Challenge: RSA-250 III 10 0
186 Kaskade-S/T — Part 5 II 10 1084
187 The T52 Sturgeon Challenge — Part 3 II 10 1150
188 The T52 Sturgeon Challenge — Part 4 II 9 1150
189 RSA Factoring Challenge: RSA-232 III 9 0
190 Hilly — Part 1 II 8 1109
191 Double Column Transposition — Part 5 II 8 1094
192 The SZ42 Challenge — Part 1 II 8 1264
193 The SZ42 Challenge — Part 2 II 8 1284
194 The SZ42 Challenge — Part 3 II 7 1305
195 The SIGABA Challenge — Part 2 II 7 1186
196 The SIGABA Challenge — Part 1 II 7 1185
197 The SZ42 Challenge — Part 4 II 7 1349
198 Handycipher — Part 2 II 7 1097
199 The SZ42 Challenge — Part 5 II 6 1373
200 Handycipher — Part 3 III 6 13336
201 Holographic Encryption — Part 1 II 6 1111
202 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1113
203 Handycipher — Part 6 III 5 13460
204 The T52 Sturgeon Challenge — Part 7 II 5 1152
205 Weakened Handycipher — Part 4 II 5 1105
206 "The Road" — Part 1 II 5 1133
207 The SIGABA Challenge — Part 3 III 5 14612
208 Weakened Handycipher — Part 6 II 5 1105
209 Weakened Handycipher — Part 5 II 5 1105
210 Handycipher — Part 5 III 5 13460
211 The T52 Sturgeon Challenge — Part 11 II 5 1152
212 The T52 Sturgeon Challenge — Part 8 II 5 1152
213 The T52 Sturgeon Challenge — Part 12 II 5 1152
214 Handycipher — Part 1 II 5 1097
215 The T52 Sturgeon Challenge — Part 6 II 4 1152
216 Spirale — Part 1 II 4 1100
217 The T52 Sturgeon Challenge — Part 10 II 4 1152
218 Notes of an Italian Soldier X 4 var
219 The T52 Sturgeon Challenge — Part 9 II 4 1152
220 Spirale — Part 2 II 4 1100
221 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14745
222 The T52 Sturgeon Challenge — Part 5 II 4 1152
223 Sigaba Part 2 III 4 13090
224 Handycipher — Part 4 III 4 13460
225 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1170
226 Handycipher — Part 9 III 3 13527
227 Holographic Encryption — Part 2 II 3 1111
228 The SIGABA Challenge — Part 4 III 3 14633
229 Differential Cryptanalysis — Part 2 II 3 1178
230 Handycipher — Part 8 III 3 13527
231 The Vatican Challenge — Part 1 X 3 var
232 Extended Handycipher — Part 5 III 3 13460
233 Extended Handycipher — Part 4 III 3 13460
234 The Vatican Challenge — Part 2 X 3 var
235 Extended Handycipher — Part 2 II 3 1097
236 Spirale — Part 3 II 3 1100
237 Weakened ElsieFour — Part 1 II 3 1122
238 Extended Handycipher — Part 3 II 3 1097
239 Extended Handycipher — Part 1 II 3 1097
240 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
241 Double Column Transposition X 2 var
242 The Heavy T52 Sturgeon Challenge — Part 7 III 2 14780
243 The SIGABA Challenge — Part 5 III 2 14665
244 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14771
245 Extended Handycipher — Part 6 III 2 13460
246 Unknown Author X 2 var
247 Handycipher — Part 7 III 2 13527
248 ElsieFour — Part 1 III 2 13629
249 ORYX Stream Cipher — Part 4b III 2 13272
250 Weakened ElsieFour — Part 3 II 2 1115
251 The Vatican Challenge — Part 4 X 1 var
252 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14813
253 Beale Ciphers X 1 var
254 Substitution Cipher with Non-Prefix Codes III 1 13118
255 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1087
256 Handycipher — Part 10 II 1 1147
257 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1105
258 Hilly — Part 2 II 1 1116
259 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14231
260 The Heavy T52 Sturgeon Challenge — Part 3 III 0 14276
261 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14246
262 The Vatican Challenge — Part 5 X 0 var
263 The Vatican Challenge — Part 3 X 0 var
264 The SIGABA Challenge — Part 6 III 0 14704
265 The Heavy T52 Sturgeon Challenge — Part 6 III 0 14776
266 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14785
267 Kryptos X 0 var
268 RSA Factoring Challenge: RSA-440 III 0 13148
269 RSA Factoring Challenge: RSA-450 III 0 13148
270 RSA Factoring Challenge: RSA-430 III 0 13148
271 RSA Factoring Challenge: RSA-420 III 0 13148
272 RSA Factoring Challenge: RSA-400 III 0 13148
273 RSA Factoring Challenge: RSA-410 III 0 13148
274 RSA Factoring Challenge: RSA-460 III 0 13148
275 RSA Factoring Challenge: RSA-1536 III 0 13148
276 RSA Factoring Challenge: RSA-500 III 0 13148
277 RSA Factoring Challenge: RSA-617 III 0 13148
278 RSA Factoring Challenge: RSA-490 III 0 13148
279 RSA Factoring Challenge: RSA-480 III 0 13148
280 RSA Factoring Challenge: RSA-470 III 0 13148
281 RSA Factoring Challenge: RSA-390 III 0 13148
282 RSA Factoring Challenge: RSA-380 III 0 13148
283 RSA Factoring Challenge: RSA-309 III 0 13148
284 RSA Factoring Challenge: RSA-1024 III 0 13148
285 RSA Factoring Challenge: RSA-300 III 0 13148
286 RSA Factoring Challenge: RSA-290 III 0 13148
287 RSA Factoring Challenge: RSA-280 III 0 13148
288 RSA Factoring Challenge: RSA-310 III 0 13148
289 RSA Factoring Challenge: RSA-320 III 0 13148
290 RSA Factoring Challenge: RSA-360 III 0 13148
291 RSA Factoring Challenge: RSA-370 III 0 13148
292 RSA Factoring Challenge: RSA-350 III 0 13148
293 RSA Factoring Challenge: RSA-340 III 0 13148
294 RSA Factoring Challenge: RSA-330 III 0 13148
295 RSA Factoring Challenge: RSA-2048 III 0 13148
296 RSA Factoring Challenge: RSA-270 III 0 13148
297 Weakened Granit — Part 3 II 0 1100
298 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1105
299 Weakened Granit — Part 2 II 0 1100
300 RSA Factoring Challenge: RSA-896 III 0 13148
301 Double-Column Transposition/Granit — Part 3 II 0 1099
302 Spirale — Part 4 III 0 13376
303 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1105
304 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1105
305 "The Road" — Part 2 II 0 1133
306 "The Road" — Part 3 II 0 1133
307 Dorabella X 0 var
308 Weakened ElsieFour — Part 2 II 0 1122
309 Kaskade-S/T — Part 4 II 0 1084
310 Double-Column Transposition/Granit — Part 2 II 0 1099
311 Double-Column Transposition/Granit — Part 1 II 0 1099
312 ORYX Stream Cipher — Part 4d III 0 13222
313 Double Column Transposition Reloaded — Part 1 III 0 13249
314 World Record Challenge: Break 65 Bits of AES III 0 13090
315 The third ENIGMA M4 message X 0 var
316 RSA Factoring Challenge: RSA-260 III 0 13148
317 Double Column Transposition Reloaded — Part 2 III 0 13249
318 Double Column Transposition Reloaded — Part 3 III 0 13249
319 ORYX Stream Cipher — Part 4c III 0 13272
320 Twelve-Year-Old Murder Case X 0 var
321 Spanish Strip Cipher — Part 3 X 0 var
322 Digital Signatures: DSA with Medium Fields III 0 13128
323 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13100
324 D'Agapeyeff X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [07:27 - 25.09.2020] glasshopper solved the Level II challenge 'Spanish Strip Cipher — Part 1'    +++    [01:02 - 25.09.2020] Lemmynator solved the Level I challenge 'Playfair with hints about the grid'    +++    [15:31 - 24.09.2020] loeppi74 solved the Level I challenge 'Number Sequence — Part 10'    +++    [13:02 - 24.09.2020] michelbriganza solved the Level I challenge 'A hidden word'    +++    [13:00 - 24.09.2020] ritegh solved the Level I challenge 'A hidden word'    +++