MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

7446
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2664 100
2 Original Caesar Cipher I 1714 100
3 Number Sequence — Part 2 I 1192 100
4 Caesar Encryption I 885 100
5 Beaver Code I 651 100
6 Letter to the Templars — Part 1 I 592 100
7 Number Sequence — Part 3 I 542 100
8 Letter to the Templars — Part 2 I 475 100
9 Number Sequence — Part 4 I 430 100
10 Monoalphabetic Substitution I 402 100
11 A hidden word I 396 100
12 Letter to the Templars — Part 3 II 357 1107
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 352 100
14 Factorization Cipher — Part 1 I 315 100
15 Grille Cipher I 282 100
16 Homophonic Encryption Part 1 I 278 100
17 Cracking SHA1-Hashed Passwords II 252 1098
18 Homophonic Encryption Part 2 I 241 100
19 One-Time Pad with Flaws I 217 100
20 Snow White and the seven dwarfs I 200 100
21 Alice's Birthday Party (Part 1) II 175 1096
22 Alice's Birthday Party (Part 2) II 167 1096
23 From Russia with Love I 150 100
24 Modified Caesar Cipher I 143 100
25 Reserve Hand Procedure — Part 1 I 142 100
26 How do you become a big cryptographer? I 136 100
27 Letter from the Alleged Countess Julie von Ortenburg I 131 100
28 Broadcasting and low exponent — RSA-Attack II 129 1100
29 Classical Ciphers^3 I 128 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 119 1096
31 Enigma Messages with Repeated Letters — Part 1 I 111 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 107 1096
33 Pigpen with a twist — Part 1 I 105 100
34 Hybrid Encryption I II 102 1096
35 M-138 — Part 1 I 102 100
36 The Book Code: A Challenge for Bookworms I 100 100
37 RSA: Two different keys — same ciphertext II 100 1100
38 Enigma Part 1 II 96 1096
39 Factorization Cipher — Part 2 II 96 1102
40 A Secret Message from Castle Mansfeld I 96 100
41 Number Sequence — Part 8 I 96 100
42 Nils away on travel I 95 100
43 Molehunt (Part 1/3) I 95 100
44 Molehunt (Part 2/3) I 93 100
45 A really long number sequence II 84 1100
46 Trifid Cipher I 82 100
47 ADFGVX — Part 2 I 80 100
48 Kaskade-S/T — Part 1 I 79 100
49 ¿No Hablas Español? No problemo! I 76 100
50 Enigma Combinatorics I 74 100
51 ADFGVX — Part 1 I 69 100
52 Playfair Encryption I 68 100
53 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 67 100
54 Playfair with hints about the grid I 66 100
55 Double Columnar Transposition I 66 100
56 ECDH-Key Exchange for Beginners I 64 100
57 Zodiac Cipher I 63 100
58 ORYX Stream Cipher Part I II 62 1096
59 Enigma Part 2 II 61 1096
60 Heartbleed — Part 1 I 61 100
61 M-138 — Part 2 II 59 1136
62 Factorization Cipher — Part 3 II 58 1102
63 Molehunt (Part 3/3) II 55 1096
64 Number Sequence — Part 6 I 53 100
65 Smartcard RSA II 53 1096
66 Partial Key Exposure with RSA — Part 1 II 52 1103
67 Enigma Messages with Repeated Letters — Part 3 I 51 100
68 Enigma Messages with Repeated Letters — Part 2 I 51 100
69 A hidden word — Part 2 I 50 100
70 The Last Note I 50 100
71 Hill Cipher with Sudoku Key I 49 100
72 Turing Bombe Enigma I I 49 100
73 Number Sequence — Part 5 I 48 100
74 Enigma Messages I 47 100
75 Enigma Messages with Repeated Letters — Part 5 I 47 100
76 BCR code (Book-Caesar-RSA) II 47 1107
77 Cascading Encryption — Part 1/3 I 46 100
78 Multilingual Monoalphabetic Substitution I 45 100
79 Enigma Messages with Repeated Letters — Part 4 I 43 100
80 AES key — encoded in the machine readable zone of a European ePassport II 42 1102
81 Heartbleed — Part 2 I 41 100
82 An Invisible Message I 41 100
83 Recycled One-Time Pad I 41 100
84 Image Noise I 39 100
85 Monoalphabetic substitution with camouflage — Part 1 I 39 100
86 Unusual encryption using a diophantine equation II 36 1100
87 Kaskade-S/T — Part 2 II 36 1098
88 ORYX Stream Cipher Part II II 35 1096
89 Keyshanc — Part 1 II 34 1105
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 32 1097
91 Strange Message from Thessaloniki I 32 100
92 Unconcealed RSA messages II 31 1101
93 Monoalphabetic substitution with camouflage — Part 4 I 31 100
94 Monoalphabetic substitution with camouflage — Part 2 II 31 1102
95 Music Code — Part 1 I 31 100
96 Music Code — Part 2 II 31 1099
97 News from Castle Mansfeld I 30 100
98 Monoalphabetic substitution with camouflage — Part 3 II 29 1102
99 Ku Klux Klan X 29 var
100 Pigpen with a twist — Part 2 II 29 1100
101 An 'unhearable' message I 28 100
102 Double Column Transposition — Part 4 II 28 1125
103 Keyshanc — Part 2 II 27 1105
104 RSA Factoring Challenge: RSA-704 II 27 0
105 Number Sequence — Part 7 I 26 100
106 Double Column Transposition — Part 2 II 25 1124
107 Not-so-Secret Message from Malawi — Part II (ECC) II 25 1096
108 Weakened Granit — Part 1 I 24 100
109 Pigpen with a twist — Part 3 II 24 1100
110 M-138 — Part 3 II 23 1136
111 New Year's Greetings — Part 2 I 22 101
112 New Year's Greetings — Part 1 I 22 101
113 Double Column Transposition — Part 3 II 22 1124
114 Kaskade-S/T — Part 3 II 22 1098
115 CMEA 1 II 22 1096
116 ORYX Stream Cipher — Part 3 (revised) II 21 1113
117 New Year's Greetings — Part 3 I 20 101
118 New Year's Greetings — Part 4 I 20 101
119 Heartbleed — Part 3 II 19 1129
120 RSA Factoring Challenge: RSA-210 II 19 0
121 Lattice Part 1 II 18 1098
122 Typex — Part 1 II 17 1111
123 Monoalphabetic Substitution with Camouflage — Part 5 II 17 1103
124 Spanish Strip Cipher — Part 1 II 17 1122
125 CMEA 2 III 16 13324
126 RSA with Special d III 16 13313
127 Double Column Transposition — Part 1 II 16 1123
128 Typex — Part 2 II 15 1111
129 Concealed Messages — Vigenère's Night Sky X 14 var
130 Spanish Strip Cipher — Part 2 II 14 1122
131 Purple 1 II 11 1096
132 Cascading Encryption — Part 3/3 II 10 1111
133 Cascading Encryption — Part 2/3 II 10 1111
134 New Year's Greetings — Part 5 II 9 1202
135 Sigaba Part 1 II 9 1096
136 Kaskade-S/T — Part 5 II 8 1098
137 Flawed Usage of a OTP Cipher by the BND II 8 1157
138 Weakened Handycipher — Part 3 II 8 1146
139 Weakened Handycipher — Part 1 II 8 1146
140 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1098
141 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 7 1294
142 Weakened Handycipher — Part 2 II 7 1146
143 Akelarre Part 1 II 7 1096
144 M-138 — Part 4 II 6 1136
145 ORYX Stream Cipher — Part 4a II 6 1123
146 Notes of an Italian Soldier X 4 var
147 Double Column Transposition — Part 5 II 4 1126
148 Handycipher — Part 3 III 2 13998
149 Handycipher — Part 1 II 2 1141
150 Double Column Transposition X 2 var
151 Weakened Handycipher — Part 4 II 2 1275
152 Unknown Author X 2 var
153 Handycipher — Part 2 II 2 1141
154 Weakened Handycipher — Part 5 II 2 1275
155 Sigaba Part 2 III 2 13313
156 Weakened Handycipher — Part 6 II 2 1275
157 ORYX Stream Cipher — Part 4b III 1 13746
158 Handycipher — Part 4 III 1 15553
159 Beale Ciphers X 1 var
160 Spirale — Part 3 II 1 1157
161 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1105
162 Handycipher — Part 5 III 1 15553
163 Substitution Cipher with Non-Prefix Codes III 1 13367
164 Handycipher — Part 6 III 1 15553
165 Spirale — Part 2 II 1 1157
166 Spirale — Part 1 II 1 1157
167 Extended Handycipher — Part 3 II 1 1142
168 Extended Handycipher — Part 2 II 1 1142
169 Extended Handycipher — Part 1 II 1 1142
170 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1294
171 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1294
172 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1294
173 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1294
174 Extended Handycipher — Part 6 III 0 15553
175 Weakened Granit — Part 2 II 0 1161
176 Double-Column Transposition/Granit — Part 2 II 0 1151
177 Double-Column Transposition/Granit — Part 1 II 0 1151
178 Double-Column Transposition/Granit — Part 3 II 0 1151
179 Spirale — Part 4 II 0 1157
180 Extended Handycipher — Part 4 III 0 15553
181 Weakened Granit — Part 3 II 0 1161
182 Extended Handycipher — Part 5 III 0 15553
183 RSA Factoring Challenge: RSA-470 III 0 13428
184 RSA Factoring Challenge: RSA-896 III 0 13428
185 RSA Factoring Challenge: RSA-280 III 0 13428
186 RSA Factoring Challenge: RSA-270 III 0 13428
187 RSA Factoring Challenge: RSA-260 III 0 13428
188 RSA Factoring Challenge: RSA-250 III 0 13428
189 RSA Factoring Challenge: RSA-290 III 0 13428
190 RSA Factoring Challenge: RSA-300 III 0 13428
191 RSA Factoring Challenge: RSA-320 III 0 13428
192 RSA Factoring Challenge: RSA-310 III 0 13428
193 RSA Factoring Challenge: RSA-1024 III 0 13428
194 RSA Factoring Challenge: RSA-309 III 0 13428
195 RSA Factoring Challenge: RSA-240 III 0 13428
196 RSA Factoring Challenge: RSA-232 III 0 13428
197 World Record Challenge: Break 65 Bits of AES III 0 13313
198 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13333
199 Kryptos X 0 var
200 Dorabella X 0 var
201 D'Agapeyeff X 0 var
202 Twelve-Year-Old Murder Case X 0 var
203 Kaskade-S/T — Part 4 II 0 1098
204 RSA Factoring Challenge: RSA-230 II 0 1103
205 RSA Factoring Challenge: RSA-220 II 0 1103
206 The third ENIGMA M4 message X 0 var
207 Digital Signatures: DSA with Medium Fields III 0 13386
208 RSA Factoring Challenge: RSA-330 III 0 13428
209 RSA Factoring Challenge: RSA-340 III 0 13428
210 RSA Factoring Challenge: RSA-500 III 0 13428
211 RSA Factoring Challenge: RSA-617 III 0 13428
212 RSA Factoring Challenge: RSA-490 III 0 13428
213 RSA Factoring Challenge: RSA-480 III 0 13428
214 RSA Factoring Challenge: RSA-1536 III 0 13428
215 RSA Factoring Challenge: RSA-2048 III 0 13428
216 ORYX Stream Cipher — Part 4d III 0 13600
217 Spanish Strip Cipher — Part 3 X 0 var
218 Double Column Transposition Reloaded — Part 3 III 0 13678
219 Double Column Transposition Reloaded — Part 2 III 0 13678
220 Double Column Transposition Reloaded — Part 1 III 0 13678
221 RSA Factoring Challenge: RSA-460 III 0 13428
222 RSA Factoring Challenge: RSA-450 III 0 13428
223 RSA Factoring Challenge: RSA-380 III 0 13428
224 RSA Factoring Challenge: RSA-370 III 0 13428
225 RSA Factoring Challenge: RSA-360 III 0 13428
226 RSA Factoring Challenge: RSA-350 III 0 13428
227 RSA Factoring Challenge: RSA-390 III 0 13428
228 RSA Factoring Challenge: RSA-400 III 0 13428
229 RSA Factoring Challenge: RSA-440 III 0 13428
230 RSA Factoring Challenge: RSA-430 III 0 13428
231 RSA Factoring Challenge: RSA-420 III 0 13428
232 RSA Factoring Challenge: RSA-410 III 0 13428
233 ORYX Stream Cipher — Part 4c III 0 13746
 
 
powered by the CrypTool project  CrypTool

 

   +++    [15:10 - 24.08.2016] zeusz3 solved the Level I challenge 'Letter to the Templars — Part 2'    +++    [14:07 - 24.08.2016] bgr solved the Level I challenge 'Monoalphabetic substitution with camouflage — Part 4'    +++    [13:56 - 24.08.2016] zeusz3 solved the Level I challenge 'Number Sequence — Part 3'    +++    [13:48 - 24.08.2016] zeusz3 solved the Level I challenge 'Number Sequence — Part 2'    +++    [00:50 - 24.08.2016] sealth solved the Level II challenge 'Not-so-Secret Message from Malawi — Part I (RSA)'    +++