MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

7551
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2710 100
2 Original Caesar Cipher I 1750 100
3 Number Sequence — Part 2 I 1214 100
4 Caesar Encryption I 901 100
5 Beaver Code I 664 100
6 Letter to the Templars — Part 1 I 604 100
7 Number Sequence — Part 3 I 556 100
8 Letter to the Templars — Part 2 I 485 100
9 Number Sequence — Part 4 I 440 100
10 A hidden word I 410 100
11 Monoalphabetic Substitution I 404 100
12 Letter to the Templars — Part 3 II 370 1107
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 358 100
14 Factorization Cipher — Part 1 I 318 100
15 Grille Cipher I 287 100
16 Homophonic Encryption Part 1 I 280 100
17 Cracking SHA1-Hashed Passwords II 259 1098
18 Homophonic Encryption Part 2 I 243 100
19 One-Time Pad with Flaws I 218 100
20 Snow White and the seven dwarfs I 203 100
21 Alice's Birthday Party (Part 1) II 176 1095
22 Alice's Birthday Party (Part 2) II 167 1095
23 From Russia with Love I 154 100
24 Modified Caesar Cipher I 143 100
25 Reserve Hand Procedure — Part 1 I 142 100
26 How do you become a big cryptographer? I 137 100
27 Letter from the Alleged Countess Julie von Ortenburg I 131 100
28 Broadcasting and low exponent — RSA-Attack II 129 1099
29 Classical Ciphers^3 I 128 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 121 1095
31 Enigma Messages with Repeated Letters — Part 1 I 118 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 109 1095
33 Pigpen with a twist — Part 1 I 105 100
34 Number Sequence — Part 8 I 105 100
35 M-138 — Part 1 I 102 100
36 Hybrid Encryption I II 102 1096
37 The Book Code: A Challenge for Bookworms I 102 100
38 RSA: Two different keys — same ciphertext II 100 1099
39 Enigma Part 1 II 98 1095
40 A Secret Message from Castle Mansfeld I 97 100
41 Factorization Cipher — Part 2 II 96 1101
42 Molehunt (Part 1/3) I 96 100
43 Nils away on travel I 95 100
44 Molehunt (Part 2/3) I 94 100
45 A really long number sequence II 85 1100
46 Trifid Cipher I 82 100
47 ¿No Hablas Español? No problemo! I 81 100
48 Kaskade-S/T — Part 1 I 80 100
49 ADFGVX — Part 2 I 80 100
50 Enigma Combinatorics I 75 100
51 ADFGVX — Part 1 I 70 100
52 Playfair Encryption I 68 100
53 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 67 100
54 Playfair with hints about the grid I 66 100
55 Double Columnar Transposition I 66 100
56 ECDH-Key Exchange for Beginners I 64 100
57 Enigma Part 2 II 63 1095
58 Zodiac Cipher I 63 100
59 ORYX Stream Cipher Part I II 63 1095
60 Heartbleed — Part 1 I 62 100
61 M-138 — Part 2 II 59 1134
62 Factorization Cipher — Part 3 II 58 1102
63 Molehunt (Part 3/3) II 56 1095
64 Number Sequence — Part 6 I 55 100
65 Smartcard RSA II 54 1095
66 The Last Note I 52 100
67 Partial Key Exposure with RSA — Part 1 II 52 1102
68 Enigma Messages with Repeated Letters — Part 3 I 51 100
69 Enigma Messages with Repeated Letters — Part 2 I 51 100
70 A hidden word — Part 2 I 50 100
71 Turing Bombe Enigma I I 50 100
72 Hill Cipher with Sudoku Key I 49 100
73 Number Sequence — Part 5 I 48 100
74 Enigma Messages with Repeated Letters — Part 5 I 47 100
75 BCR code (Book-Caesar-RSA) II 47 1106
76 Enigma Messages I 47 100
77 Multilingual Monoalphabetic Substitution I 46 100
78 Cascading Encryption — Part 1/3 I 46 100
79 Enigma Messages with Repeated Letters — Part 4 I 43 100
80 AES key — encoded in the machine readable zone of a European ePassport II 43 1102
81 Recycled One-Time Pad I 43 100
82 Image Noise I 41 100
83 Heartbleed — Part 2 I 41 100
84 An Invisible Message I 41 100
85 Monoalphabetic substitution with camouflage — Part 1 I 40 100
86 Kaskade-S/T — Part 2 II 37 1097
87 ORYX Stream Cipher Part II II 36 1095
88 Unusual encryption using a diophantine equation II 36 1100
89 Keyshanc — Part 1 II 35 1104
90 Strange Message from Thessaloniki I 32 100
91 Monoalphabetic substitution with camouflage — Part 2 II 32 1101
92 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 32 1096
93 Monoalphabetic substitution with camouflage — Part 4 I 32 100
94 Unconcealed RSA messages II 31 1101
95 Music Code — Part 2 II 31 1098
96 Music Code — Part 1 I 31 100
97 Ku Klux Klan X 30 var
98 Monoalphabetic substitution with camouflage — Part 3 II 30 1101
99 Pigpen with a twist — Part 2 II 30 1100
100 News from Castle Mansfeld I 30 100
101 Double Column Transposition — Part 4 II 28 1123
102 An 'unhearable' message I 28 100
103 RSA Factoring Challenge: RSA-704 II 27 0
104 Number Sequence — Part 7 I 27 100
105 Keyshanc — Part 2 II 27 1104
106 Weakened Granit — Part 1 I 26 100
107 Double Column Transposition — Part 2 II 25 1123
108 Not-so-Secret Message from Malawi — Part II (ECC) II 25 1095
109 Pigpen with a twist — Part 3 II 25 1100
110 New Year's Greetings — Part 2 I 23 101
111 New Year's Greetings — Part 1 I 23 101
112 M-138 — Part 3 II 23 1134
113 ORYX Stream Cipher — Part 3 (revised) II 22 1112
114 Kaskade-S/T — Part 3 II 22 1097
115 CMEA 1 II 22 1096
116 Double Column Transposition — Part 3 II 22 1123
117 New Year's Greetings — Part 3 I 21 101
118 New Year's Greetings — Part 4 I 21 101
119 RSA Factoring Challenge: RSA-210 II 19 0
120 Heartbleed — Part 3 II 19 1128
121 Monoalphabetic Substitution with Camouflage — Part 5 II 18 1103
122 Lattice Part 1 II 18 1097
123 Typex — Part 1 II 17 1110
124 Spanish Strip Cipher — Part 1 II 17 1121
125 CMEA 2 III 16 13317
126 Double Column Transposition — Part 1 II 16 1121
127 RSA with Special d III 16 13306
128 Typex — Part 2 II 15 1111
129 Spanish Strip Cipher — Part 2 II 14 1121
130 Concealed Messages — Vigenère's Night Sky X 14 var
131 Purple 1 II 11 1095
132 New Year's Greetings — Part 5 II 11 1190
133 Cascading Encryption — Part 2/3 II 10 1110
134 Cascading Encryption — Part 3/3 II 10 1110
135 Sigaba Part 1 II 9 1095
136 Kaskade-S/T — Part 5 II 8 1098
137 Weakened Handycipher — Part 3 II 8 1143
138 Weakened Handycipher — Part 1 II 8 1143
139 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 8 1246
140 Flawed Usage of a OTP Cipher by the BND II 8 1153
141 Weakened Handycipher — Part 2 II 7 1143
142 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1098
143 Akelarre Part 1 II 7 1096
144 M-138 — Part 4 II 7 1134
145 ORYX Stream Cipher — Part 4a II 6 1122
146 Double Column Transposition — Part 5 II 4 1125
147 Notes of an Italian Soldier X 4 var
148 Handycipher — Part 3 III 3 13963
149 Handycipher — Part 2 II 3 1138
150 Handycipher — Part 1 II 2 1138
151 Weakened Handycipher — Part 6 II 2 1237
152 Double Column Transposition X 2 var
153 Weakened Handycipher — Part 5 II 2 1237
154 Sigaba Part 2 III 2 13306
155 Unknown Author X 2 var
156 Weakened Handycipher — Part 4 II 2 1237
157 ORYX Stream Cipher — Part 4b III 1 13726
158 Handycipher — Part 4 III 1 15165
159 Beale Ciphers X 1 var
160 Spirale — Part 3 II 1 1153
161 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1105
162 Handycipher — Part 5 III 1 15165
163 Substitution Cipher with Non-Prefix Codes III 1 13359
164 Handycipher — Part 6 III 1 15165
165 Spirale — Part 2 II 1 1153
166 Spirale — Part 1 II 1 1153
167 Extended Handycipher — Part 3 II 1 1140
168 Extended Handycipher — Part 2 II 1 1140
169 Extended Handycipher — Part 1 II 1 1140
170 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1246
171 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1246
172 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1246
173 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1246
174 Extended Handycipher — Part 6 III 0 15165
175 Weakened Granit — Part 2 II 0 1157
176 Double-Column Transposition/Granit — Part 2 II 0 1148
177 Double-Column Transposition/Granit — Part 1 II 0 1148
178 Double-Column Transposition/Granit — Part 3 II 0 1148
179 Spirale — Part 4 II 0 1153
180 Extended Handycipher — Part 4 III 0 15165
181 Weakened Granit — Part 3 II 0 1157
182 Extended Handycipher — Part 5 III 0 15165
183 RSA Factoring Challenge: RSA-470 III 0 13418
184 RSA Factoring Challenge: RSA-896 III 0 13418
185 RSA Factoring Challenge: RSA-280 III 0 13418
186 RSA Factoring Challenge: RSA-270 III 0 13418
187 RSA Factoring Challenge: RSA-260 III 0 13418
188 RSA Factoring Challenge: RSA-250 III 0 13418
189 RSA Factoring Challenge: RSA-290 III 0 13418
190 RSA Factoring Challenge: RSA-300 III 0 13418
191 RSA Factoring Challenge: RSA-320 III 0 13418
192 RSA Factoring Challenge: RSA-310 III 0 13418
193 RSA Factoring Challenge: RSA-1024 III 0 13418
194 RSA Factoring Challenge: RSA-309 III 0 13418
195 RSA Factoring Challenge: RSA-240 III 0 13418
196 RSA Factoring Challenge: RSA-232 III 0 13418
197 World Record Challenge: Break 65 Bits of AES III 0 13306
198 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13325
199 Kryptos X 0 var
200 Dorabella X 0 var
201 D'Agapeyeff X 0 var
202 Twelve-Year-Old Murder Case X 0 var
203 Kaskade-S/T — Part 4 II 0 1098
204 RSA Factoring Challenge: RSA-230 II 0 1102
205 RSA Factoring Challenge: RSA-220 II 0 1102
206 The third ENIGMA M4 message X 0 var
207 Digital Signatures: DSA with Medium Fields III 0 13378
208 RSA Factoring Challenge: RSA-330 III 0 13418
209 RSA Factoring Challenge: RSA-340 III 0 13418
210 RSA Factoring Challenge: RSA-500 III 0 13418
211 RSA Factoring Challenge: RSA-617 III 0 13418
212 RSA Factoring Challenge: RSA-490 III 0 13418
213 RSA Factoring Challenge: RSA-480 III 0 13418
214 RSA Factoring Challenge: RSA-1536 III 0 13418
215 RSA Factoring Challenge: RSA-2048 III 0 13418
216 ORYX Stream Cipher — Part 4d III 0 13586
217 Spanish Strip Cipher — Part 3 X 0 var
218 Double Column Transposition Reloaded — Part 3 III 0 13661
219 Double Column Transposition Reloaded — Part 2 III 0 13661
220 Double Column Transposition Reloaded — Part 1 III 0 13661
221 RSA Factoring Challenge: RSA-460 III 0 13418
222 RSA Factoring Challenge: RSA-450 III 0 13418
223 RSA Factoring Challenge: RSA-380 III 0 13418
224 RSA Factoring Challenge: RSA-370 III 0 13418
225 RSA Factoring Challenge: RSA-360 III 0 13418
226 RSA Factoring Challenge: RSA-350 III 0 13418
227 RSA Factoring Challenge: RSA-390 III 0 13418
228 RSA Factoring Challenge: RSA-400 III 0 13418
229 RSA Factoring Challenge: RSA-440 III 0 13418
230 RSA Factoring Challenge: RSA-430 III 0 13418
231 RSA Factoring Challenge: RSA-420 III 0 13418
232 RSA Factoring Challenge: RSA-410 III 0 13418
233 ORYX Stream Cipher — Part 4c III 0 13726
 
 
powered by the CrypTool project  CrypTool

 

   +++    [22:33 - 27.09.2016] leptonladder solved the Level I challenge 'Caesar Encryption'    +++    [22:17 - 27.09.2016] leptonladder solved the Level I challenge 'Number Sequence'    +++    [21:54 - 27.09.2016] leptonladder solved the Level I challenge 'Original Caesar Cipher'    +++    [20:52 - 27.09.2016] Robert Kosten solved the Level I challenge 'Number Sequence'    +++    [20:25 - 27.09.2016] Sgt. Pepper solved the Level II challenge 'AES key — encoded in the machine readable zone of a European ePassport'    +++