MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8663
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3150 100
2 Original Caesar Cipher I 2082 100
3 Number Sequence — Part 2 I 1459 100
4 Caesar Encryption I 1052 100
5 Beaver Code I 800 100
6 Letter to the Templars — Part 1 I 716 100
7 Number Sequence — Part 3 I 659 100
8 Letter to the Templars — Part 2 I 572 100
9 Number Sequence — Part 4 I 530 100
10 A hidden word I 519 100
11 Letter to the Templars — Part 3 II 461 1097
12 Monoalphabetic Substitution I 447 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 404 100
14 Factorization Cipher — Part 1 I 364 100
15 Grille Cipher I 335 100
16 Cracking SHA1-Hashed Passwords II 327 1091
17 Homophonic Encryption Part 1 I 312 100
18 Homophonic Encryption Part 2 I 267 100
19 One-Time Pad with Flaws I 240 100
20 Snow White and the seven dwarfs I 227 100
21 Alice's Birthday Party (Part 1) II 207 1089
22 From Russia with Love I 197 100
23 Alice's Birthday Party (Part 2) II 197 1089
24 Number Sequence — Part 8 I 178 100
25 How do you become a big cryptographer? I 167 100
26 Broadcasting and low exponent — RSA-Attack II 162 1092
27 Modified Caesar Cipher I 162 100
28 Reserve Hand Procedure — Part 1 I 158 100
29 Letter from the Alleged Countess Julie von Ortenburg I 148 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 145 1089
31 Classical Ciphers^3 I 140 100
32 Enigma Messages with Repeated Letters — Part 1 I 134 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 131 1089
34 M-138 — Part 1 I 131 100
35 Advent-Challenge — Part 1 I 129 101
36 Nils away on travel I 122 100
37 Hybrid Encryption I II 120 1090
38 Pigpen with a twist — Part 1 I 118 100
39 The Book Code: A Challenge for Bookworms I 117 100
40 RSA: Two different keys — same ciphertext II 115 1092
41 Molehunt (Part 1/3) I 111 100
42 Enigma Part 1 II 111 1089
43 Factorization Cipher — Part 2 II 110 1093
44 Molehunt (Part 2/3) I 107 100
45 A Secret Message from Castle Mansfeld I 105 100
46 ¿No Hablas Español? No problemo! I 103 100
47 Trifid Cipher I 98 100
48 A really long number sequence II 95 1093
49 ADFGVX — Part 2 I 95 100
50 Kaskade-S/T — Part 1 I 89 100
51 ADFGVX — Part 1 I 86 100
52 Enigma Combinatorics I 84 100
53 Heartbleed — Part 1 I 83 100
54 Playfair Encryption I 82 100
55 Double Columnar Transposition I 81 100
56 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 80 100
57 Number Sequence — Part 6 I 79 100
58 M-138 — Part 2 II 79 1112
59 Playfair with hints about the grid I 77 100
60 ECDH-Key Exchange for Beginners I 75 100
61 ORYX Stream Cipher Part I II 72 1089
62 Image Noise I 72 100
63 Enigma Part 2 II 70 1089
64 Zodiac Cipher I 70 100
65 Factorization Cipher — Part 3 II 69 1094
66 The Last Note I 67 100
67 A hidden word — Part 2 I 66 100
68 Molehunt (Part 3/3) II 63 1090
69 Enigma Messages with Repeated Letters — Part 2 I 62 100
70 Hill Cipher with Sudoku Key I 62 100
71 Enigma Messages with Repeated Letters — Part 3 I 62 100
72 Partial Key Exposure with RSA — Part 1 II 61 1094
73 BCR code (Book-Caesar-RSA) II 60 1097
74 Smartcard RSA II 59 1090
75 Enigma Messages I 58 100
76 Enigma Messages with Repeated Letters — Part 5 I 58 100
77 Number Sequence — Part 5 I 57 100
78 Cascading Encryption — Part 1/3 I 56 100
79 Multilingual Monoalphabetic Substitution I 55 100
80 Turing Bombe Enigma I I 55 100
81 Enigma Messages with Repeated Letters — Part 4 I 54 100
82 Heartbleed — Part 2 I 53 100
83 AES key — encoded in the machine readable zone of a European ePassport II 53 1094
84 Recycled One-Time Pad I 48 100
85 Unusual encryption using a diophantine equation II 47 1093
86 An Invisible Message I 47 100
87 Monoalphabetic substitution with camouflage — Part 1 I 46 100
88 Kaskade-S/T — Part 2 II 44 1091
89 Keyshanc — Part 1 II 40 1095
90 ORYX Stream Cipher Part II II 40 1089
91 Number Sequence — Part 7 I 40 100
92 New Year's Greetings — Part 1 I 39 100
93 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1090
94 Strange Message from Thessaloniki I 37 100
95 Unconcealed RSA messages II 37 1093
96 News from Castle Mansfeld I 37 100
97 Monoalphabetic substitution with camouflage — Part 4 I 37 100
98 Music Code — Part 2 II 36 1091
99 Music Code — Part 1 I 36 100
100 Monoalphabetic substitution with camouflage — Part 2 II 36 1094
101 Weakened Granit — Part 1 I 35 100
102 New Year's Greetings — Part 2 I 35 100
103 M-138 — Part 3 II 34 1112
104 Ku Klux Klan X 34 var
105 An 'unhearable' message I 34 100
106 New Year's Greetings — Part 3 I 34 100
107 Monoalphabetic substitution with camouflage — Part 3 II 34 1094
108 Pigpen with a twist — Part 2 II 34 1093
109 CMEA 1 II 33 1090
110 New Year's Greetings — Part 4 I 33 100
111 Double Column Transposition — Part 4 II 33 1107
112 Double Column Transposition — Part 2 II 33 1106
113 Keyshanc — Part 2 II 32 1095
114 RSA Factoring Challenge: RSA-704 II 31 0
115 Number Sequence — Part 9 I 31 101
116 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1089
117 Pigpen with a twist — Part 3 II 30 1093
118 Heartbleed — Part 3 II 28 1109
119 Double Column Transposition — Part 3 II 28 1106
120 Kaskade-S/T — Part 3 II 28 1091
121 ORYX Stream Cipher — Part 3 (revised) II 26 1101
122 The Einstein Enigma II 25 1248
123 Advent-Challenge — Part 2 II 24 1212
124 RSA Factoring Challenge: RSA-210 II 23 0
125 Monoalphabetic Substitution with Camouflage — Part 5 II 22 1095
126 CMEA 2 III 21 13213
127 Lattice Part 1 II 21 1091
128 Typex — Part 1 II 20 1099
129 Double Column Transposition — Part 1 II 20 1106
130 Advent Challenge — Part 4 II 19 1215
131 Spanish Strip Cipher — Part 1 II 19 1106
132 RSA with Special d III 19 13205
133 Advent Challenge — Part 3 II 18 1215
134 Typex — Part 2 II 17 1100
135 Spanish Strip Cipher — Part 2 II 17 1106
136 Concealed Messages — Vigenère's Night Sky X 15 var
137 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1133
138 Purple 1 II 14 1090
139 Number Sequence — Part 10 I 14 111
140 M-138 — Part 4 II 12 1112
141 New Year's Greetings — Part 5 II 12 1127
142 Sigaba Part 1 II 11 1089
143 Flawed Usage of a OTP Cipher by the BND II 11 1119
144 Weakened Handycipher — Part 3 II 10 1116
145 ORYX Stream Cipher — Part 4a II 10 1106
146 Cascading Encryption — Part 2/3 II 10 1100
147 Weakened Handycipher — Part 1 II 10 1116
148 Cascading Encryption — Part 3/3 II 10 1100
149 Weakened Handycipher — Part 2 II 9 1116
150 Kaskade-S/T — Part 5 II 9 1091
151 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1091
152 RSA Factoring Challenge: RSA-220 II 9 0
153 AES ECB Wrong Encoding II 8 1212
154 Akelarre Part 1 II 7 1090
155 Handycipher — Part 3 III 5 13602
156 Double Column Transposition — Part 5 II 5 1108
157 Handycipher — Part 2 II 5 1114
158 Handycipher — Part 5 III 4 13881
159 Notes of an Italian Soldier X 4 var
160 Handycipher — Part 6 III 4 13881
161 Weakened Handycipher — Part 5 II 4 1132
162 Handycipher — Part 1 II 4 1114
163 Weakened Handycipher — Part 6 II 4 1132
164 Weakened Handycipher — Part 4 II 4 1132
165 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 3 1167
166 Spirale — Part 3 II 3 1119
167 Spirale — Part 1 II 3 1119
168 Holographic Encryption — Part 1 II 3 1155
169 Handycipher — Part 4 III 3 13881
170 Sigaba Part 2 III 3 13205
171 Spirale — Part 2 II 3 1119
172 Unknown Author X 2 var
173 Handycipher — Part 9 III 2 14087
174 Extended Handycipher — Part 2 II 2 1114
175 Handycipher — Part 8 III 2 14087
176 Extended Handycipher — Part 3 II 2 1114
177 Extended Handycipher — Part 1 II 2 1114
178 ORYX Stream Cipher — Part 4b III 2 13483
179 Weakened ElsieFour — Part 1 II 2 1186
180 The Vatican Challenge — Part 1 X 2 var
181 Double Column Transposition X 2 var
182 Holographic Encryption — Part 2 II 2 1155
183 The Vatikan Challenge — Part 2 X 2 var
184 Extended Handycipher — Part 5 III 2 13881
185 Extended Handycipher — Part 4 III 2 13881
186 Extended Handycipher — Part 6 III 1 13881
187 Beale Ciphers X 1 var
188 Substitution Cipher with Non-Prefix Codes III 1 13245
189 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1096
190 Hilly — Part 1 II 1 1147
191 Handycipher — Part 7 III 1 14087
192 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1133
193 Kryptos X 0 var
194 Hilly — Part 2 II 0 1190
195 Double-Column Transposition/Granit — Part 3 II 0 1117
196 Weakened Granit — Part 3 II 0 1120
197 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1133
198 Spirale — Part 4 II 0 1119
199 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1133
200 Weakened Granit — Part 2 II 0 1120
201 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1133
202 ElsieFour — Part 1 III 0 14582
203 Double Column Transposition Reloaded — Part 2 III 0 13446
204 RSA Factoring Challenge: RSA-350 III 0 13288
205 RSA Factoring Challenge: RSA-360 III 0 13288
206 RSA Factoring Challenge: RSA-340 III 0 13288
207 RSA Factoring Challenge: RSA-330 III 0 13288
208 RSA Factoring Challenge: RSA-320 III 0 13288
209 RSA Factoring Challenge: RSA-370 III 0 13288
210 RSA Factoring Challenge: RSA-380 III 0 13288
211 RSA Factoring Challenge: RSA-420 III 0 13288
212 RSA Factoring Challenge: RSA-410 III 0 13288
213 RSA Factoring Challenge: RSA-400 III 0 13288
214 RSA Factoring Challenge: RSA-390 III 0 13288
215 RSA Factoring Challenge: RSA-310 III 0 13288
216 RSA Factoring Challenge: RSA-1024 III 0 13288
217 RSA Factoring Challenge: RSA-250 III 0 13288
218 RSA Factoring Challenge: RSA-260 III 0 13288
219 RSA Factoring Challenge: RSA-240 III 0 13288
220 RSA Factoring Challenge: RSA-232 III 0 13288
221 RSA Factoring Challenge: RSA-230 II 0 1094
222 RSA Factoring Challenge: RSA-270 III 0 13288
223 RSA Factoring Challenge: RSA-896 III 0 13288
224 RSA Factoring Challenge: RSA-309 III 0 13288
225 RSA Factoring Challenge: RSA-300 III 0 13288
226 RSA Factoring Challenge: RSA-290 III 0 13288
227 RSA Factoring Challenge: RSA-280 III 0 13288
228 RSA Factoring Challenge: RSA-430 III 0 13288
229 RSA Factoring Challenge: RSA-440 III 0 13288
230 D'Agapeyeff X 0 var
231 Double Column Transposition Reloaded — Part 1 III 0 13446
232 ORYX Stream Cipher — Part 4d III 0 13400
233 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13219
234 Twelve-Year-Old Murder Case X 0 var
235 Double Column Transposition Reloaded — Part 3 III 0 13446
236 Spanish Strip Cipher — Part 3 X 0 var
237 Double-Column Transposition/Granit — Part 1 II 0 1117
238 Dorabella X 0 var
239 World Record Challenge: Break 65 Bits of AES III 0 13205
240 ORYX Stream Cipher — Part 4c III 0 13483
241 Kaskade-S/T — Part 4 II 0 1091
242 Digital Signatures: DSA with Medium Fields III 0 13258
243 RSA Factoring Challenge: RSA-470 III 0 13288
244 RSA Factoring Challenge: RSA-1536 III 0 13288
245 RSA Factoring Challenge: RSA-460 III 0 13288
246 RSA Factoring Challenge: RSA-450 III 0 13288
247 RSA Factoring Challenge: RSA-480 III 0 13288
248 RSA Factoring Challenge: RSA-490 III 0 13288
249 The third ENIGMA M4 message X 0 var
250 RSA Factoring Challenge: RSA-2048 III 0 13288
251 RSA Factoring Challenge: RSA-617 III 0 13288
252 RSA Factoring Challenge: RSA-500 III 0 13288
253 Double-Column Transposition/Granit — Part 2 II 0 1117
 
 
powered by the CrypTool project  CrypTool

 

   +++    [03:57 - 27.04.2018] LishaSantiago solved the Level I challenge 'Number Sequence — Part 2'    +++    [03:41 - 27.04.2018] LishaSantiago solved the Level I challenge 'Number Sequence'    +++    [00:50 - 27.04.2018] stvai2 solved the Level I challenge 'Grille Cipher'    +++    [21:40 - 26.04.2018] ronja11 solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [20:57 - 26.04.2018] psychohasii solved the Level I challenge 'Original Caesar Cipher'    +++