MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9974
Follow us: Facebook Twitter

Server maintenance from November 29 to December 2, 2019

MysteryTwister C3 will be offline due to maintenance work starting on Friday November 29, 2019 at 9:00 AM UTC.
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3676 100
2 Original Caesar Cipher I 2499 100
3 Number Sequence — Part 2 I 1764 100
4 Caesar Encryption I 1224 100
5 Beaver Code I 984 100
6 Letter to the Templars — Part 1 I 857 100
7 Number Sequence — Part 3 I 822 100
8 Letter to the Templars — Part 2 I 683 100
9 Number Sequence — Part 4 I 674 100
10 A hidden word I 671 100
11 Letter to the Templars — Part 3 II 571 1091
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 479 100
13 Monoalphabetic Substitution I 475 100
14 Cracking SHA1-Hashed Passwords II 430 1086
15 Factorization Cipher — Part 1 I 427 100
16 Grille Cipher I 400 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 350 100
18 Advent-Challenge — Part 1 I 302 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 302 100
20 Number Sequence — Part 8 I 278 100
21 One-Time Pad with Flaws I 269 100
22 Snow White and the seven dwarfs I 251 100
23 Alice's Birthday Party (Part 1) II 250 1085
24 Alice's Birthday Party (Part 2) II 241 1085
25 From Russia with Love I 234 100
26 Broadcasting and low exponent — RSA-Attack II 192 1087
27 How do you become a big cryptographer? I 192 100
28 Modified Caesar Cipher I 191 100
29 Reserve Hand Procedure — Part 1 I 174 100
30 M-138 — Part 1 I 167 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1085
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Letter from the Alleged Countess Julie von Ortenburg I 157 100
34 Classical Ciphers^3 I 156 100
35 Enigma Messages with Repeated Letters — Part 1 I 154 100
36 Nils away on travel I 141 100
37 Hybrid Encryption I II 140 1085
38 RSA: Two different keys — same ciphertext II 139 1087
39 Pigpen with a twist — Part 1 I 137 100
40 The Book Code: A Challenge for Bookworms I 129 100
41 ¿No Hablas Español? No problemo! I 126 100
42 Factorization Cipher — Part 2 II 126 1088
43 Molehunt (Part 1/3) I 125 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 117 1085
46 A Secret Message from Castle Mansfeld I 113 100
47 Trifid Cipher I 108 100
48 A really long number sequence II 106 1087
49 Number Sequence — Part 6 I 104 100
50 ADFGVX — Part 2 I 104 100
51 M-138 — Part 2 II 102 1101
52 Image Noise I 101 100
53 Kaskade-S/T — Part 1 I 98 100
54 Playfair Encryption I 95 100
55 ADFGVX — Part 1 I 95 100
56 Autokey Cipher I 95 100
57 Enigma Combinatorics I 92 100
58 Playfair with hints about the grid I 91 100
59 Double Columnar Transposition I 90 100
60 Heartbleed — Part 1 I 89 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 86 100
62 ECDH-Key Exchange for Beginners I 84 100
63 A hidden word — Part 2 I 82 100
64 Cryptanalysis Hacking Puzzles — Part 2 I 80 100
65 Factorization Cipher — Part 3 II 80 1088
66 Enigma Part 2 II 77 1085
67 ORYX Stream Cipher Part I II 77 1085
68 The Last Note I 76 100
69 Zodiac Cipher I 75 100
70 Number Sequence — Part 10 I 74 100
71 Number Sequence — Part 9 I 73 100
72 Number Sequence — Part 5 I 73 100
73 Partial Key Exposure with RSA — Part 1 II 72 1089
74 Hill Cipher with Sudoku Key I 71 100
75 Molehunt (Part 3/3) II 70 1085
76 Enigma Messages with Repeated Letters — Part 3 I 69 100
77 Enigma Messages with Repeated Letters — Part 2 I 68 100
78 Enigma Messages I 67 100
79 Enigma Messages with Repeated Letters — Part 5 I 66 100
80 Multilingual Monoalphabetic Substitution I 65 100
81 Smartcard RSA II 64 1085
82 BCR code (Book-Caesar-RSA) II 64 1091
83 Cascading Encryption — Part 1/3 I 63 100
84 Number Sequence — Part 7 I 61 100
85 Turing Bombe Enigma I I 61 100
86 Enigma Messages with Repeated Letters — Part 4 I 60 100
87 Heartbleed — Part 2 I 60 100
88 AES key — encoded in the machine readable zone of a European ePassport II 60 1088
89 Unusual encryption using a diophantine equation II 57 1087
90 Recycled One-Time Pad I 56 100
91 Monoalphabetic substitution with camouflage — Part 1 I 54 100
92 An Invisible Message I 53 100
93 Kaskade-S/T — Part 2 II 48 1086
94 M-138 — Part 3 II 47 1101
95 The Einstein Enigma II 47 1134
96 ORYX Stream Cipher Part II II 45 1085
97 Unconcealed RSA messages II 44 1088
98 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
99 New Year's Greetings — Part 1 I 44 100
100 News from Castle Mansfeld I 43 100
101 Monoalphabetic substitution with camouflage — Part 4 I 42 100
102 Keyshanc — Part 1 II 42 1090
103 New Year's Greetings — Part 2 I 41 100
104 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1086
105 Strange Message from Thessaloniki I 41 100
106 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
107 RSA Factoring Challenge: RSA-704 II 40 0
108 Weakened Granit — Part 1 I 39 100
109 Music Code — Part 1 I 38 100
110 Modular Sequences I 38 100
111 Music Code — Part 2 II 38 1087
112 An 'unhearable' message I 38 100
113 New Year's Greetings — Part 3 I 38 100
114 Double Column Transposition — Part 4 II 36 1097
115 New Year's Greetings — Part 4 I 36 100
116 Pigpen with a twist — Part 2 II 36 1087
117 Ku Klux Klan X 36 var
118 CMEA 1 II 35 1085
119 Double Column Transposition — Part 2 II 35 1097
120 Summer Job II 35 1142
121 RSA Factoring Challenge: RSA-210 II 34 0
122 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1085
123 Keyshanc — Part 2 II 33 1090
124 Pigpen with a twist — Part 3 II 32 1087
125 Advent-Challenge — Part 2 II 32 1131
126 Double Column Transposition — Part 3 II 31 1097
127 Heartbleed — Part 3 II 30 1099
128 Kaskade-S/T — Part 3 II 29 1086
129 ORYX Stream Cipher — Part 3 (revised) II 29 1093
130 Advent Challenge — Part 4 II 29 1131
131 Advent Challenge — Part 3 II 28 1131
132 Trendy Messenger II 28 1142
133 Fastest in the West II 26 1142
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1089
135 Lattice Part 1 II 24 1086
136 CMEA 2 III 24 13133
137 Spanish Strip Cipher — Part 1 II 24 1097
138 Double Column Transposition — Part 1 II 23 1097
139 Homophonic Encryption — Part 1 II 22 1189
140 Typex — Part 1 II 21 1092
141 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
142 RSA with Special d III 21 13127
143 Spanish Strip Cipher — Part 2 II 20 1097
144 Homophonic Encryption — Part 2 II 19 1190
145 RSA Factoring Challenge: RSA-220 II 19 0
146 Monoalphabetic Substitution with Nostradamus Flavor II 19 1171
147 Typex — Part 2 II 18 1093
148 Homophonic Encryption — Part 3 II 18 1190
149 Handycipher made in love — Part 1 II 18 1171
150 M-138 — Part 4 II 16 1101
151 RSA Factoring Challenge: RSA-230 II 16 0
152 Concealed Messages — Vigenère's Night Sky X 16 var
153 Purple 1 II 15 1085
154 Breaking a Filter Generator II 15 1151
155 Homophonic Encryption — Part 4 II 15 1190
156 Weakened Handycipher — Part 1 II 15 1103
157 Weakened Handycipher — Part 3 II 14 1103
158 New Year's Greetings — Part 5 II 14 1109
159 A Cloaked Substitution Cipher — Part 1 II 14 1241
160 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1112
161 AES ECB Wrong Encoding II 14 1131
162 Handycipher made in love — Part 2 II 13 1194
163 Weakened Handycipher — Part 2 II 13 1103
164 A Cloaked Substitution Cipher — Part 2 II 13 1244
165 Flawed Usage of a OTP Cipher by the BND II 13 1105
166 Sigaba Part 1 II 12 1085
167 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
168 ORYX Stream Cipher — Part 4a II 11 1097
169 Cascading Encryption — Part 3/3 II 11 1093
170 Cascading Encryption — Part 2/3 II 11 1093
171 Kaskade-S/T — Part 5 II 10 1086
172 Akelarre Part 1 II 9 1085
173 Hilly — Part 1 II 8 1117
174 Double Column Transposition — Part 5 II 7 1098
175 Handycipher — Part 2 II 7 1102
176 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1123
177 Handycipher — Part 3 III 6 13412
178 Handycipher — Part 5 III 5 13567
179 Holographic Encryption — Part 1 II 5 1120
180 Handycipher — Part 1 II 5 1102
181 "The Road" — Part 1 II 5 1160
182 The T52 Sturgeon Challenge — Part 1 II 5 1216
183 Handycipher — Part 6 III 5 13567
184 Weakened Handycipher — Part 6 II 5 1111
185 Weakened Handycipher — Part 5 II 5 1111
186 Weakened Handycipher — Part 4 II 5 1111
187 The T52 Sturgeon Challenge — Part 2 II 4 1221
188 Notes of an Italian Soldier X 4 var
189 The T52 Sturgeon Challenge — Part 3 II 4 1221
190 Handycipher — Part 4 III 4 13567
191 The T52 Sturgeon Challenge — Part 4 II 3 1221
192 Spirale — Part 1 II 3 1105
193 Spirale — Part 2 II 3 1105
194 Handycipher — Part 8 III 3 13658
195 The Vatican Challenge — Part 2 X 3 var
196 The Vatican Challenge — Part 1 X 3 var
197 Extended Handycipher — Part 5 III 3 13567
198 Handycipher — Part 9 III 3 13658
199 Spirale — Part 3 II 3 1105
200 Extended Handycipher — Part 4 III 3 13567
201 Extended Handycipher — Part 2 II 3 1102
202 Sigaba Part 2 III 3 13127
203 Extended Handycipher — Part 3 II 3 1102
204 Extended Handycipher — Part 1 II 3 1102
205 Extended Handycipher — Part 6 III 2 13568
206 ElsieFour — Part 1 III 2 13803
207 Unknown Author X 2 var
208 The T52 Sturgeon Challenge — Part 11 II 2 1232
209 Holographic Encryption — Part 2 II 2 1120
210 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
211 Weakened ElsieFour — Part 3 II 2 1127
212 The T52 Sturgeon Challenge — Part 12 II 2 1232
213 Handycipher — Part 7 III 2 13658
214 ORYX Stream Cipher — Part 4b III 2 13335
215 The T52 Sturgeon Challenge — Part 8 II 2 1232
216 The T52 Sturgeon Challenge — Part 5 II 2 1232
217 The T52 Sturgeon Challenge — Part 7 II 2 1232
218 The T52 Sturgeon Challenge — Part 6 II 2 1232
219 Double Column Transposition X 2 var
220 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1112
221 Handycipher — Part 10 II 1 1207
222 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1090
223 Hilly — Part 2 II 1 1128
224 Cipher ID II 1 1576
225 Beale Ciphers X 1 var
226 Weakened ElsieFour — Part 1 II 1 1139
227 The Vatican Challenge — Part 4 X 1 var
228 The T52 Sturgeon Challenge — Part 9 II 1 1232
229 Substitution Cipher with Non-Prefix Codes III 1 13158
230 The T52 Sturgeon Challenge — Part 10 II 1 1232
231 Dorabella X 0 var
232 RSA Factoring Challenge: RSA-280 III 0 13192
233 D'Agapeyeff X 0 var
234 "The Road" — Part 3 II 0 1160
235 RSA Factoring Challenge: RSA-896 III 0 13192
236 RSA Factoring Challenge: RSA-270 III 0 13192
237 "The Road" — Part 2 II 0 1160
238 Double Column Transposition Reloaded — Part 2 III 0 13309
239 Double Column Transposition Reloaded — Part 3 III 0 13309
240 The Vatican Challenge — Part 3 X 0 var
241 ORYX Stream Cipher — Part 4d III 0 13276
242 Kaskade-S/T — Part 4 II 0 1086
243 Twelve-Year-Old Murder Case X 0 var
244 The Heavy T52 Sturgeon Challenge — Part 1 III 0 15720
245 The Heavy T52 Sturgeon Challenge — Part 3 III 0 16485
246 The Heavy T52 Sturgeon Challenge — Part 2 III 0 15911
247 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13138
248 The Vatican Challenge — Part 5 X 0 var
249 RSA Factoring Challenge: RSA-240 III 0 13192
250 RSA Factoring Challenge: RSA-250 III 0 13192
251 RSA Factoring Challenge: RSA-232 III 0 13192
252 Double Column Transposition Reloaded — Part 1 III 0 13309
253 RSA Factoring Challenge: RSA-290 III 0 13192
254 Digital Signatures: DSA with Medium Fields III 0 13169
255 RSA Factoring Challenge: RSA-260 III 0 13192
256 RSA Factoring Challenge: RSA-310 III 0 13192
257 RSA Factoring Challenge: RSA-420 III 0 13192
258 RSA Factoring Challenge: RSA-340 III 0 13192
259 RSA Factoring Challenge: RSA-350 III 0 13192
260 RSA Factoring Challenge: RSA-360 III 0 13192
261 RSA Factoring Challenge: RSA-430 III 0 13192
262 RSA Factoring Challenge: RSA-440 III 0 13192
263 RSA Factoring Challenge: RSA-460 III 0 13192
264 RSA Factoring Challenge: RSA-450 III 0 13192
265 World Record Challenge: Break 65 Bits of AES III 0 13127
266 RSA Factoring Challenge: RSA-370 III 0 13192
267 RSA Factoring Challenge: RSA-410 III 0 13192
268 Spirale — Part 4 III 0 13461
269 Double-Column Transposition/Granit — Part 3 II 0 1104
270 Double-Column Transposition/Granit — Part 2 II 0 1104
271 RSA Factoring Challenge: RSA-400 III 0 13192
272 RSA Factoring Challenge: RSA-390 III 0 13192
273 RSA Factoring Challenge: RSA-380 III 0 13192
274 Weakened Granit — Part 3 II 0 1105
275 Weakened Granit — Part 2 II 0 1105
276 RSA Factoring Challenge: RSA-1536 III 0 13192
277 RSA Factoring Challenge: RSA-470 III 0 13192
278 Double-Column Transposition/Granit — Part 1 II 0 1104
279 RSA Factoring Challenge: RSA-617 III 0 13192
280 RSA Factoring Challenge: RSA-320 III 0 13192
281 RSA Factoring Challenge: RSA-1024 III 0 13192
282 RSA Factoring Challenge: RSA-309 III 0 13192
283 Weakened ElsieFour — Part 2 II 0 1139
284 The third ENIGMA M4 message X 0 var
285 RSA Factoring Challenge: RSA-2048 III 0 13192
286 Kryptos X 0 var
287 RSA Factoring Challenge: RSA-330 III 0 13192
288 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1112
289 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1112
290 RSA Factoring Challenge: RSA-480 III 0 13192
291 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1112
292 RSA Factoring Challenge: RSA-490 III 0 13192
293 Spanish Strip Cipher — Part 3 X 0 var
294 RSA Factoring Challenge: RSA-500 III 0 13192
295 ORYX Stream Cipher — Part 4c III 0 13335
296 RSA Factoring Challenge: RSA-300 III 0 13192
 
 
powered by the CrypTool project  CrypTool

 

   +++    [08:02 - 15.11.2019] SirAbacus solved the Level I challenge 'Number Sequence — Part 4'    +++    [21:04 - 14.11.2019] snk solved the Level II challenge '"The Road" — Part 1'    +++    [15:43 - 14.11.2019] Bart13 solved the Level II challenge 'Cipher ID'    +++    [15:17 - 14.11.2019] phihhim solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [09:00 - 14.11.2019] SirAbacus solved the Level I challenge 'Number Sequence — Part 3'    +++