MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10173
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3735 100
2 Original Caesar Cipher I 2553 100
3 Number Sequence — Part 2 I 1799 100
4 Caesar Encryption I 1246 100
5 Beaver Code I 1013 100
6 Letter to the Templars — Part 1 I 880 100
7 Number Sequence — Part 3 I 840 100
8 Letter to the Templars — Part 2 I 703 100
9 Number Sequence — Part 4 I 694 100
10 A hidden word I 693 100
11 Letter to the Templars — Part 3 II 588 1090
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 492 100
13 Monoalphabetic Substitution I 474 100
14 Cracking SHA1-Hashed Passwords II 444 1085
15 Factorization Cipher — Part 1 I 435 100
16 Grille Cipher I 406 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 356 100
18 Advent-Challenge — Part 1 I 321 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 306 100
20 Number Sequence — Part 8 I 285 100
21 One-Time Pad with Flaws I 273 100
22 Alice's Birthday Party (Part 1) II 257 1084
23 Snow White and the seven dwarfs I 255 100
24 Alice's Birthday Party (Part 2) II 248 1084
25 From Russia with Love I 240 100
26 Broadcasting and low exponent — RSA-Attack II 197 1086
27 Modified Caesar Cipher I 195 100
28 How do you become a big cryptographer? I 195 100
29 Reserve Hand Procedure — Part 1 I 176 100
30 M-138 — Part 1 I 171 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 169 1084
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 163 1084
33 Letter from the Alleged Countess Julie von Ortenburg I 160 100
34 Classical Ciphers^3 I 159 100
35 Enigma Messages with Repeated Letters — Part 1 I 157 100
36 Nils away on travel I 146 100
37 Hybrid Encryption I II 146 1084
38 RSA: Two different keys — same ciphertext II 142 1086
39 Pigpen with a twist — Part 1 I 140 100
40 The Book Code: A Challenge for Bookworms I 132 100
41 ¿No Hablas Español? No problemo! I 130 100
42 Factorization Cipher — Part 2 II 129 1087
43 Molehunt (Part 1/3) I 126 100
44 Molehunt (Part 2/3) I 124 100
45 Enigma Part 1 II 118 1084
46 A Secret Message from Castle Mansfeld I 114 100
47 Number Sequence — Part 6 I 110 100
48 Trifid Cipher I 109 100
49 A really long number sequence II 109 1087
50 M-138 — Part 2 II 107 1099
51 Autokey Cipher I 106 100
52 ADFGVX — Part 2 I 106 100
53 Image Noise I 102 100
54 Kaskade-S/T — Part 1 I 98 100
55 ADFGVX — Part 1 I 97 100
56 Playfair Encryption I 95 100
57 Enigma Combinatorics I 94 100
58 Cryptanalysis Hacking Puzzles — Part 2 I 94 100
59 Double Columnar Transposition I 93 100
60 Playfair with hints about the grid I 92 100
61 Heartbleed — Part 1 I 89 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 87 100
63 ECDH-Key Exchange for Beginners I 86 100
64 A hidden word — Part 2 I 82 100
65 Factorization Cipher — Part 3 II 82 1088
66 Number Sequence — Part 10 I 80 100
67 The Last Note I 79 100
68 Enigma Part 2 II 78 1084
69 ORYX Stream Cipher Part I II 78 1084
70 Zodiac Cipher I 78 100
71 Number Sequence — Part 5 I 77 100
72 Number Sequence — Part 9 I 76 100
73 Partial Key Exposure with RSA — Part 1 II 74 1088
74 Hill Cipher with Sudoku Key I 74 100
75 Enigma Messages with Repeated Letters — Part 3 I 72 100
76 Molehunt (Part 3/3) II 71 1084
77 Enigma Messages with Repeated Letters — Part 2 I 71 100
78 Enigma Messages with Repeated Letters — Part 5 I 69 100
79 Enigma Messages I 69 100
80 Multilingual Monoalphabetic Substitution I 66 100
81 Smartcard RSA II 66 1084
82 BCR code (Book-Caesar-RSA) II 65 1090
83 Number Sequence — Part 7 I 64 100
84 Enigma Messages with Repeated Letters — Part 4 I 63 100
85 Cascading Encryption — Part 1/3 I 63 100
86 Turing Bombe Enigma I I 62 100
87 Heartbleed — Part 2 I 60 100
88 AES key — encoded in the machine readable zone of a European ePassport II 60 1088
89 Unusual encryption using a diophantine equation II 57 1087
90 Recycled One-Time Pad I 57 100
91 Monoalphabetic substitution with camouflage — Part 1 I 55 100
92 An Invisible Message I 54 100
93 Kaskade-S/T — Part 2 II 48 1085
94 The Einstein Enigma II 48 1128
95 ORYX Stream Cipher Part II II 47 1084
96 M-138 — Part 3 II 47 1099
97 Monoalphabetic substitution with camouflage — Part 2 II 45 1087
98 News from Castle Mansfeld I 45 100
99 New Year's Greetings — Part 1 I 45 100
100 Unconcealed RSA messages II 44 1087
101 Monoalphabetic substitution with camouflage — Part 4 I 43 100
102 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 42 1085
103 Keyshanc — Part 1 II 42 1089
104 Strange Message from Thessaloniki I 42 100
105 New Year's Greetings — Part 2 I 42 100
106 Modular Sequences I 42 100
107 Monoalphabetic substitution with camouflage — Part 3 II 41 1087
108 RSA Factoring Challenge: RSA-704 II 41 0
109 Weakened Granit — Part 1 I 39 100
110 New Year's Greetings — Part 3 I 39 100
111 An 'unhearable' message I 38 100
112 CMEA 1 II 38 1085
113 Music Code — Part 1 I 38 100
114 Music Code — Part 2 II 38 1086
115 New Year's Greetings — Part 4 I 37 100
116 Pigpen with a twist — Part 2 II 37 1087
117 Summer Job II 37 1135
118 Double Column Transposition — Part 4 II 36 1096
119 Double Column Transposition — Part 2 II 35 1096
120 Ku Klux Klan X 35 var
121 RSA Factoring Challenge: RSA-210 II 35 0
122 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1084
123 Keyshanc — Part 2 II 33 1089
124 Advent-Challenge — Part 2 II 33 1126
125 Pigpen with a twist — Part 3 II 33 1087
126 Double Column Transposition — Part 3 II 31 1096
127 Heartbleed — Part 3 II 30 1097
128 ORYX Stream Cipher — Part 3 (revised) II 30 1092
129 Advent Challenge — Part 4 II 29 1126
130 Kaskade-S/T — Part 3 II 29 1085
131 Trendy Messenger II 28 1135
132 Advent Challenge — Part 3 II 28 1126
133 Fastest in the West II 27 1135
134 Monoalphabetic Substitution with Camouflage — Part 5 II 26 1088
135 CMEA 2 III 26 13121
136 Spanish Strip Cipher — Part 1 II 25 1096
137 Lattice Part 1 II 24 1085
138 Homophonic Encryption — Part 1 II 24 1167
139 Double Column Transposition — Part 1 II 23 1096
140 RSA with Special d III 22 13115
141 Cryptanalysis Hacking Puzzles — Part 1 I 22 100
142 Spanish Strip Cipher — Part 2 II 21 1096
143 Typex — Part 1 II 21 1091
144 RSA Factoring Challenge: RSA-220 II 21 0
145 Homophonic Encryption — Part 2 II 20 1168
146 Monoalphabetic Substitution with Nostradamus Flavor II 20 1156
147 Homophonic Encryption — Part 3 II 19 1168
148 Handycipher made in love — Part 1 II 18 1156
149 Typex — Part 2 II 18 1092
150 Homophonic Encryption — Part 4 II 17 1168
151 RSA Factoring Challenge: RSA-230 II 17 0
152 M-138 — Part 4 II 16 1099
153 Concealed Messages — Vigenère's Night Sky X 16 var
154 Breaking a Filter Generator II 16 1142
155 New Year's Greetings — Part 5 II 15 1107
156 A Cloaked Substitution Cipher — Part 1 II 15 1191
157 Weakened Handycipher — Part 1 II 15 1101
158 Purple 1 II 15 1084
159 AES ECB Wrong Encoding II 15 1126
160 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1109
161 Weakened Handycipher — Part 3 II 14 1101
162 Weakened Handycipher — Part 2 II 13 1101
163 Sigaba Part 1 II 13 1084
164 Handycipher made in love — Part 2 II 13 1170
165 A Cloaked Substitution Cipher — Part 2 II 13 1193
166 Flawed Usage of a OTP Cipher by the BND II 13 1103
167 ORYX Stream Cipher — Part 4a II 11 1096
168 Cipher ID — Part 1 II 11 1232
169 Cascading Encryption — Part 2/3 II 11 1092
170 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
171 Cascading Encryption — Part 3/3 II 11 1092
172 Kaskade-S/T — Part 5 II 10 1086
173 Akelarre Part 1 II 9 1085
174 Polyphonic Substitution Cipher — Part 1 II 9 1235
175 The T52 Sturgeon Challenge — Part 1 II 8 1181
176 Hilly — Part 1 II 8 1114
177 The LoRa Cipher: Logic Randomness — Part 1 II 8 1613
178 Double Column Transposition — Part 5 II 7 1097
179 The T52 Sturgeon Challenge — Part 2 II 7 1183
180 Handycipher — Part 2 II 7 1100
181 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1119
182 Handycipher — Part 3 III 6 13386
183 Holographic Encryption — Part 1 II 6 1117
184 The T52 Sturgeon Challenge — Part 3 II 6 1183
185 Weakened Handycipher — Part 6 II 5 1109
186 Handycipher — Part 5 III 5 13530
187 Weakened Handycipher — Part 4 II 5 1109
188 Weakened Handycipher — Part 5 II 5 1109
189 Handycipher — Part 6 III 5 13530
190 Handycipher — Part 1 II 5 1100
191 The T52 Sturgeon Challenge — Part 4 II 5 1183
192 "The Road" — Part 1 II 5 1149
193 Polyphonic Substitution Cipher — Part 2 II 5 1305
194 Spirale — Part 2 II 4 1103
195 Spirale — Part 1 II 4 1103
196 Handycipher — Part 4 III 4 13530
197 Notes of an Italian Soldier X 4 var
198 RSA Factoring Challenge: RSA-240 III 4 0
199 Extended Handycipher — Part 5 III 3 13530
200 Differential Cryptanalysis — Part 2 II 3 1349
201 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1265
202 Extended Handycipher — Part 4 III 3 13530
203 Handycipher — Part 9 III 3 13611
204 The Vatican Challenge — Part 1 X 3 var
205 The Vatican Challenge — Part 2 X 3 var
206 Holographic Encryption — Part 2 II 3 1117
207 The T52 Sturgeon Challenge — Part 8 II 3 1188
208 The T52 Sturgeon Challenge — Part 11 II 3 1188
209 The T52 Sturgeon Challenge — Part 12 II 3 1188
210 Handycipher — Part 8 III 3 13611
211 Sigaba Part 2 III 3 13115
212 Extended Handycipher — Part 2 II 3 1101
213 Extended Handycipher — Part 3 II 3 1101
214 Spirale — Part 3 II 3 1103
215 Extended Handycipher — Part 1 II 3 1101
216 Unknown Author X 2 var
217 The T52 Sturgeon Challenge — Part 5 II 2 1188
218 The T52 Sturgeon Challenge — Part 6 II 2 1188
219 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
220 ORYX Stream Cipher — Part 4b III 2 13313
221 The T52 Sturgeon Challenge — Part 9 II 2 1188
222 The T52 Sturgeon Challenge — Part 10 II 2 1188
223 Extended Handycipher — Part 6 III 2 13530
224 The T52 Sturgeon Challenge — Part 7 II 2 1188
225 Weakened ElsieFour — Part 1 II 2 1132
226 Weakened ElsieFour — Part 3 II 2 1123
227 Handycipher — Part 7 III 2 13611
228 ElsieFour — Part 1 III 2 13739
229 Double Column Transposition X 2 var
230 The Vatican Challenge — Part 4 X 1 var
231 Beale Ciphers X 1 var
232 Hilly — Part 2 II 1 1123
233 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1109
234 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1089
235 Substitution Cipher with Non-Prefix Codes III 1 13145
236 Handycipher — Part 10 II 1 1177
237 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13126
238 Kryptos X 0 var
239 Twelve-Year-Old Murder Case X 0 var
240 RSA Factoring Challenge: RSA-470 III 0 13177
241 RSA Factoring Challenge: RSA-480 III 0 13177
242 "The Road" — Part 2 II 0 1149
243 "The Road" — Part 3 II 0 1149
244 RSA Factoring Challenge: RSA-1536 III 0 13177
245 World Record Challenge: Break 65 Bits of AES III 0 13115
246 RSA Factoring Challenge: RSA-617 III 0 13177
247 D'Agapeyeff X 0 var
248 The Heavy T52 Sturgeon Challenge — Part 3 III 0 14958
249 ORYX Stream Cipher — Part 4d III 0 13258
250 Double Column Transposition Reloaded — Part 1 III 0 13289
251 Double Column Transposition Reloaded — Part 2 III 0 13289
252 Spanish Strip Cipher — Part 3 X 0 var
253 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14857
254 The Heavy T52 Sturgeon Challenge — Part 1 III 0 14818
255 RSA Factoring Challenge: RSA-490 III 0 13177
256 The Vatican Challenge — Part 5 X 0 var
257 RSA Factoring Challenge: RSA-500 III 0 13177
258 RSA Factoring Challenge: RSA-2048 III 0 13177
259 Dorabella X 0 var
260 ORYX Stream Cipher — Part 4c III 0 13313
261 The Vatican Challenge — Part 3 X 0 var
262 RSA Factoring Challenge: RSA-232 III 0 13177
263 Double-Column Transposition/Granit — Part 3 II 0 1102
264 RSA Factoring Challenge: RSA-390 III 0 13177
265 Spirale — Part 4 III 0 13432
266 Double-Column Transposition/Granit — Part 2 II 0 1102
267 Double-Column Transposition/Granit — Part 1 II 0 1102
268 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1109
269 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1109
270 RSA Factoring Challenge: RSA-309 III 0 13177
271 RSA Factoring Challenge: RSA-380 III 0 13177
272 RSA Factoring Challenge: RSA-370 III 0 13177
273 RSA Factoring Challenge: RSA-350 III 0 13177
274 RSA Factoring Challenge: RSA-360 III 0 13177
275 Weakened Granit — Part 3 II 0 1103
276 RSA Factoring Challenge: RSA-340 III 0 13177
277 RSA Factoring Challenge: RSA-330 III 0 13177
278 RSA Factoring Challenge: RSA-1024 III 0 13177
279 RSA Factoring Challenge: RSA-310 III 0 13177
280 RSA Factoring Challenge: RSA-320 III 0 13177
281 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1109
282 Double Column Transposition Reloaded — Part 3 III 0 13289
283 Weakened ElsieFour — Part 2 II 0 1132
284 RSA Factoring Challenge: RSA-440 III 0 13177
285 RSA Factoring Challenge: RSA-250 III 0 13177
286 Weakened Granit — Part 2 II 0 1103
287 The third ENIGMA M4 message X 0 var
288 Kaskade-S/T — Part 4 II 0 1086
289 RSA Factoring Challenge: RSA-450 III 0 13177
290 Digital Signatures: DSA with Medium Fields III 0 13155
291 RSA Factoring Challenge: RSA-260 III 0 13177
292 RSA Factoring Challenge: RSA-270 III 0 13177
293 RSA Factoring Challenge: RSA-420 III 0 13177
294 RSA Factoring Challenge: RSA-410 III 0 13177
295 RSA Factoring Challenge: RSA-400 III 0 13177
296 RSA Factoring Challenge: RSA-430 III 0 13177
297 RSA Factoring Challenge: RSA-300 III 0 13177
298 RSA Factoring Challenge: RSA-896 III 0 13177
299 RSA Factoring Challenge: RSA-280 III 0 13177
300 RSA Factoring Challenge: RSA-290 III 0 13177
301 RSA Factoring Challenge: RSA-460 III 0 13177
 
 
powered by the CrypTool project  CrypTool

 

   +++    [12:40 - 24.02.2020] cytadela8 solved the Level II challenge 'Broadcasting and low exponent — RSA-Attack'    +++    [08:05 - 24.02.2020] madness solved the Level I challenge 'Cryptanalysis Hacking Puzzles — Part 2'    +++    [07:13 - 24.02.2020] DaughterOfAthena solved the Level I challenge 'Beaver Code'    +++    [06:59 - 24.02.2020] WakameSalad solved the Level I challenge 'Original Caesar Cipher'    +++    [23:37 - 23.02.2020] alfred_noble solved the Level I challenge 'Strange Message from Thessaloniki'    +++