MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

6432
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.

In addition MysteryTwister C3 offers various raffles each month. You can find information about the current raffle here. For example it’s possible to win Amazon coupons, trophies, coffee cups or T-shirts.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2289 100
2 Original Caesar Cipher I 1437 100
3 Number Sequence — Part 2 I 1002 100
4 Caesar Encryption I 768 100
5 Beaver Code I 521 100
6 Letter to the Templars — Part 1 I 467 100
7 Number Sequence — Part 3 I 459 100
8 Letter to the Templars — Part 2 I 386 100
9 Number Sequence — Part 4 I 367 100
10 Monoalphabetic Substitution I 361 100
11 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 313 100
12 A hidden word I 297 100
13 Factorization Cipher — Part 1 I 281 100
14 Letter to the Templars — Part 3 II 277 1117
15 Homophonic Encryption Part 1 I 254 100
16 Grille Cipher I 243 100
17 Homophonic Encryption Part 2 I 222 100
18 Cracking SHA1-Hashed Passwords II 204 1104
19 One-Time Pad with Flaws I 200 100
20 Snow White and the seven dwarfs I 169 100
21 Alice's Birthday Party (Part 1) II 154 1101
22 Alice's Birthday Party (Part 2) II 144 1101
23 Reserve Hand Procedure — Part 1 I 129 100
24 Modified Caesar Cipher I 126 100
25 From Russia with Love I 125 100
26 Letter from the Alleged Countess Julie von Ortenburg I 120 100
27 How do you become a big cryptographer? I 118 100
28 Classical Ciphers^3 I 115 100
29 Broadcasting and low exponent — RSA-Attack II 107 1106
30 Not-so-Secret Message from Malawi — Part I (RSA) II 102 1101
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 101 1101
32 Pigpen with a twist — Part 1 I 94 100
33 Hybrid Encryption I II 91 1101
34 Enigma Messages with Repeated Letters — Part 1 I 91 100
35 The Book Code: A Challenge for Bookworms I 88 100
36 Molehunt (Part 1/3) I 87 100
37 RSA: Two different keys — same ciphertext II 86 1107
38 Enigma Part 1 II 86 1101
39 A Secret Message from Castle Mansfeld I 85 100
40 Molehunt (Part 2/3) I 85 100
41 Factorization Cipher — Part 2 II 83 1109
42 M-138 — Part 1 I 82 100
43 Nils away on travel I 80 100
44 A really long number sequence II 77 1107
45 Kaskade-S/T — Part 1 I 74 100
46 Trifid Cipher I 73 100
47 ¿No Hablas Español? No problemo! I 68 100
48 ADFGVX — Part 2 I 67 100
49 Enigma Combinatorics I 67 100
50 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 63 100
51 Playfair Encryption I 60 100
52 ADFGVX — Part 1 I 59 100
53 Zodiac Cipher I 59 100
54 Playfair with hints about the grid I 58 100
55 ECDH-Key Exchange for Beginners I 58 100
56 Double Columnar Transposition I 57 100
57 ORYX Stream Cipher Part I II 55 1101
58 Enigma Part 2 II 52 1101
59 Factorization Cipher — Part 3 II 50 1110
60 Molehunt (Part 3/3) II 49 1101
61 Smartcard RSA II 48 1101
62 Turing Bombe Enigma I I 47 100
63 M-138 — Part 2 II 46 1182
64 Hill Cipher with Sudoku Key I 45 100
65 Heartbleed — Part 1 I 44 100
66 BCR code (Book-Caesar-RSA) II 43 1117
67 Partial Key Exposure with RSA — Part 1 II 42 1111
68 Enigma Messages with Repeated Letters — Part 2 I 42 100
69 Cascading Encryption — Part 1/3 I 41 100
70 Enigma Messages I 41 100
71 Enigma Messages with Repeated Letters — Part 3 I 40 100
72 Number Sequence — Part 5 I 40 100
73 Multilingual Monoalphabetic Substitution I 39 100
74 An Invisible Message I 38 100
75 Enigma Messages with Repeated Letters — Part 5 I 37 100
76 AES key — encoded in the machine readable zone of a European ePassport II 37 1110
77 The Last Note I 36 100
78 Kaskade-S/T — Part 2 II 35 1104
79 Enigma Messages with Repeated Letters — Part 4 I 33 100
80 Recycled One-Time Pad I 33 100
81 Monoalphabetic substitution with camouflage — Part 1 I 32 100
82 Heartbleed — Part 2 I 32 100
83 Number Sequence — Part 6 I 30 101
84 Keyshanc — Part 1 II 30 1113
85 Unusual encryption using a diophantine equation II 30 1107
86 Music Code — Part 2 II 29 1105
87 Music Code — Part 1 I 29 100
88 Strange Message from Thessaloniki I 29 100
89 ORYX Stream Cipher Part II II 28 1101
90 RSA Factoring Challenge: RSA-704 II 27 0
91 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 27 1103
92 A hidden word — Part 2 I 27 101
93 Monoalphabetic substitution with camouflage — Part 4 I 26 100
94 Unconcealed RSA messages II 25 1108
95 Pigpen with a twist — Part 2 II 24 1107
96 Keyshanc — Part 2 II 23 1113
97 Not-so-Secret Message from Malawi — Part II (ECC) II 23 1101
98 Monoalphabetic substitution with camouflage — Part 2 II 23 1109
99 An 'unhearable' message I 23 100
100 Monoalphabetic substitution with camouflage — Part 3 II 22 1109
101 Ku Klux Klan X 22 var
102 Kaskade-S/T — Part 3 II 21 1104
103 Pigpen with a twist — Part 3 II 20 1107
104 Number Sequence — Part 7 I 20 101
105 CMEA 1 II 19 1102
106 Double Column Transposition — Part 2 II 18 1148
107 Double Column Transposition — Part 4 II 18 1149
108 RSA Factoring Challenge: RSA-210 II 17 0
109 ORYX Stream Cipher — Part 3 (revised) II 16 1126
110 Lattice Part 1 II 16 1104
111 Monoalphabetic Substitution with Camouflage — Part 5 II 15 1111
112 CMEA 2 III 15 13417
113 M-138 — Part 3 II 14 1182
114 RSA with Special d III 14 13403
115 Typex — Part 1 II 14 1122
116 Double Column Transposition — Part 3 II 13 1148
117 Spanish Strip Cipher — Part 1 II 13 1144
118 Typex — Part 2 II 13 1124
119 Double Column Transposition — Part 1 II 12 1145
120 Heartbleed — Part 3 II 12 1161
121 Spanish Strip Cipher — Part 2 II 11 1144
122 Concealed Messages — Vigenère's Night Sky X 10 var
123 Purple 1 II 10 1101
124 Cascading Encryption — Part 3/3 II 9 1124
125 Cascading Encryption — Part 2/3 II 9 1123
126 Sigaba Part 1 II 7 1101
127 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1104
128 Kaskade-S/T — Part 5 II 6 1105
129 Akelarre Part 1 II 6 1102
130 Weakened Handycipher — Part 3 II 5 1247
131 Weakened Handycipher — Part 1 II 4 1247
132 M-138 — Part 4 II 4 1182
133 Double Column Transposition — Part 5 II 4 1153
134 Weakened Handycipher — Part 2 II 4 1247
135 Notes of an Italian Soldier X 4 var
136 ORYX Stream Cipher — Part 4a II 3 1146
137 Double Column Transposition X 2 var
138 Beale Ciphers X 1 var
139 Unknown Author X 1 var
140 Substitution Cipher with Non-Prefix Codes III 1 13473
141 Sigaba Part 2 III 1 13403
142 Handycipher — Part 3 III 1 14799
143 Handycipher — Part 2 II 1 1204
144 Handycipher — Part 1 II 1 1204
145 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1114
146 ORYX Stream Cipher — Part 4b III 1 14071
147 Extended Handycipher — Part 2 II 0 1215
148 Extended Handycipher — Part 3 II 0 1215
149 Double-Column Transposition/Granit — Part 2 II 0 1333
150 Double-Column Transposition/Granit — Part 3 II 0 1333
151 Double Column Transposition Reloaded — Part 1 III 0 13941
152 Double Column Transposition Reloaded — Part 2 III 0 13941
153 Spanish Strip Cipher — Part 3 X 0 var
154 Double Column Transposition Reloaded — Part 3 III 0 13941
155 Double-Column Transposition/Granit — Part 1 II 0 1333
156 ORYX Stream Cipher — Part 4c III 0 14071
157 Extended Handycipher — Part 1 II 0 1215
158 RSA Factoring Challenge: RSA-330 III 0 13554
159 RSA Factoring Challenge: RSA-260 III 0 13554
160 RSA Factoring Challenge: RSA-250 III 0 13554
161 RSA Factoring Challenge: RSA-240 III 0 13554
162 RSA Factoring Challenge: RSA-232 III 0 13554
163 RSA Factoring Challenge: RSA-270 III 0 13554
164 RSA Factoring Challenge: RSA-896 III 0 13554
165 RSA Factoring Challenge: RSA-309 III 0 13554
166 RSA Factoring Challenge: RSA-300 III 0 13554
167 RSA Factoring Challenge: RSA-290 III 0 13554
168 RSA Factoring Challenge: RSA-280 III 0 13554
169 RSA Factoring Challenge: RSA-230 II 0 1111
170 RSA Factoring Challenge: RSA-220 II 0 1111
171 World Record Challenge: Break 65 Bits of AES III 0 13403
172 Kryptos X 0 var
173 Dorabella X 0 var
174 D'Agapeyeff X 0 var
175 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13428
176 Twelve-Year-Old Murder Case X 0 var
177 The third ENIGMA M4 message X 0 var
178 Digital Signatures: DSA with Medium Fields III 0 13498
179 Kaskade-S/T — Part 4 II 0 1105
180 RSA Factoring Challenge: RSA-1024 III 0 13554
181 RSA Factoring Challenge: RSA-310 III 0 13554
182 RSA Factoring Challenge: RSA-1536 III 0 13554
183 RSA Factoring Challenge: RSA-460 III 0 13554
184 RSA Factoring Challenge: RSA-450 III 0 13554
185 RSA Factoring Challenge: RSA-440 III 0 13554
186 RSA Factoring Challenge: RSA-470 III 0 13554
187 RSA Factoring Challenge: RSA-480 III 0 13554
188 RSA Factoring Challenge: RSA-2048 III 0 13554
189 RSA Factoring Challenge: RSA-617 III 0 13554
190 RSA Factoring Challenge: RSA-500 III 0 13554
191 RSA Factoring Challenge: RSA-490 III 0 13554
192 RSA Factoring Challenge: RSA-430 III 0 13554
193 RSA Factoring Challenge: RSA-420 III 0 13554
194 RSA Factoring Challenge: RSA-360 III 0 13554
195 RSA Factoring Challenge: RSA-350 III 0 13554
196 RSA Factoring Challenge: RSA-340 III 0 13554
197 RSA Factoring Challenge: RSA-320 III 0 13554
198 RSA Factoring Challenge: RSA-370 III 0 13554
199 RSA Factoring Challenge: RSA-380 III 0 13554
200 RSA Factoring Challenge: RSA-410 III 0 13554
201 RSA Factoring Challenge: RSA-400 III 0 13554
202 RSA Factoring Challenge: RSA-390 III 0 13554
203 ORYX Stream Cipher — Part 4d III 0 13809
 
 
powered by the CrypTool project  CrypTool

 

   +++    [21:32 - 31.07.2015] Integral solved the Level I challenge 'An 'unhearable' message'    +++    [15:44 - 31.07.2015] Integral solved the Level I challenge 'An Invisible Message'    +++    [13:57 - 31.07.2015] Integral solved the Level I challenge 'A hidden word — Part 2'    +++    [12:31 - 31.07.2015] Gelak solved the Level I challenge 'Number Sequence'    +++    [09:57 - 31.07.2015] Holti solved the Level I challenge 'Number Sequence — Part 3'    +++