MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10623
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3920 100
2 Original Caesar Cipher I 2689 100
3 Number Sequence — Part 2 I 1901 100
4 Caesar Encryption I 1285 100
5 Beaver Code I 1060 100
6 Letter to the Templars — Part 1 I 928 100
7 Number Sequence — Part 3 I 886 100
8 Letter to the Templars — Part 2 I 744 100
9 A hidden word I 732 100
10 Number Sequence — Part 4 I 729 100
11 Letter to the Templars — Part 3 II 631 1088
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 523 100
13 Monoalphabetic Substitution I 513 100
14 Cracking SHA1-Hashed Passwords II 482 1084
15 Factorization Cipher — Part 1 I 453 100
16 Grille Cipher I 431 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 366 100
18 Advent-Challenge — Part 1 I 357 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 314 100
20 Number Sequence — Part 8 I 311 100
21 One-Time Pad with Flaws I 285 100
22 Alice's Birthday Party (Part 1) II 270 1083
23 Snow White and the seven dwarfs I 266 100
24 Alice's Birthday Party (Part 2) II 264 1083
25 From Russia with Love I 256 100
26 Broadcasting and low exponent — RSA Attack II 210 1085
27 Modified Caesar Cipher I 205 100
28 How do you become a big cryptographer? I 201 100
29 M-138 — Part 1 I 183 100
30 Reserve Hand Procedure — Part 1 I 181 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 177 1083
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 176 1083
33 Letter from the Alleged Countess Julie von Ortenburg I 166 100
34 Classical Ciphers^3 I 162 100
35 Enigma Messages with Repeated Letters — Part 1 I 159 100
36 Nils away on travel I 152 100
37 Hybrid Encryption I II 151 1083
38 RSA: Two different keys — same ciphertext II 146 1085
39 Pigpen with a twist — Part 1 I 143 100
40 Molehunt (Part 1/3) I 135 100
41 Factorization Cipher — Part 2 II 135 1085
42 ¿No Hablas Español? No problemo! I 135 100
43 The Book Code: A Challenge for Bookworms I 134 100
44 Molehunt (Part 2/3) I 130 100
45 Number Sequence — Part 6 I 124 100
46 Enigma Part 1 II 123 1083
47 Autokey Cipher I 121 100
48 Cryptanalysis Hacking Puzzles — Part 2 I 119 100
49 A Secret Message from Castle Mansfeld I 117 100
50 M-138 — Part 2 II 115 1096
51 Trifid Cipher I 114 100
52 A really long number sequence II 110 1085
53 ADFGVX — Part 2 I 109 100
54 Image Noise I 105 100
55 ADFGVX — Part 1 I 101 100
56 Playfair Encryption I 101 100
57 Playfair with hints about the grid I 99 100
58 Kaskade-S/T — Part 1 I 99 100
59 Double Columnar Transposition I 98 100
60 Enigma Combinatorics I 96 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 93 100
62 Number Sequence — Part 10 I 92 100
63 Heartbleed — Part 1 I 89 100
64 ECDH-Key Exchange for Beginners I 88 100
65 A hidden word — Part 2 I 86 100
66 Number Sequence — Part 9 I 86 100
67 Factorization Cipher — Part 3 II 86 1086
68 Zodiac Cipher I 83 100
69 Hill Cipher with Sudoku Key I 80 100
70 Enigma Part 2 II 79 1083
71 The Last Note I 79 100
72 ORYX Stream Cipher Part I II 79 1083
73 Partial Key Exposure with RSA — Part 1 II 78 1086
74 Number Sequence — Part 5 I 78 100
75 Enigma Messages with Repeated Letters — Part 3 I 73 100
76 Molehunt (Part 3/3) II 73 1083
77 Number Sequence — Part 7 I 72 100
78 Enigma Messages with Repeated Letters — Part 2 I 72 100
79 Enigma Messages with Repeated Letters — Part 5 I 70 100
80 Enigma Messages I 70 100
81 Smartcard RSA II 69 1083
82 Multilingual Monoalphabetic Substitution I 68 100
83 BCR code (Book-Caesar-RSA) II 66 1088
84 Cascading Encryption — Part 1/3 I 66 100
85 Enigma Messages with Repeated Letters — Part 4 I 64 100
86 Turing Bombe Enigma I I 63 100
87 AES key — encoded in the machine readable zone of a European ePassport II 62 1086
88 Recycled One-Time Pad I 60 100
89 Heartbleed — Part 2 I 60 100
90 Unusual encryption using a diophantine equation II 59 1085
91 Monoalphabetic substitution with camouflage — Part 1 I 56 100
92 An Invisible Message I 55 100
93 M-138 — Part 3 II 51 1096
94 The Einstein Enigma II 51 1119
95 Modular Sequences I 50 100
96 Kaskade-S/T — Part 2 II 48 1084
97 ORYX Stream Cipher Part II II 47 1083
98 RSA Factoring Challenge: RSA-704 II 47 0
99 News from Castle Mansfeld I 46 100
100 Unconcealed RSA messages II 46 1085
101 Monoalphabetic substitution with camouflage — Part 2 II 45 1086
102 New Year's Greetings — Part 1 I 45 100
103 Monoalphabetic substitution with camouflage — Part 4 I 44 100
104 Keyshanc — Part 1 II 44 1087
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 43 1083
106 RSA Factoring Challenge: RSA-210 II 42 0
107 New Year's Greetings — Part 2 I 42 100
108 Monoalphabetic substitution with camouflage — Part 3 II 42 1086
109 Weakened Granit — Part 1 I 42 100
110 Strange Message from Thessaloniki I 42 100
111 Double Column Transposition — Part 4 II 41 1093
112 Summer Job II 40 1123
113 CMEA 1 II 39 1083
114 Music Code — Part 1 I 39 100
115 Music Code — Part 2 II 39 1084
116 New Year's Greetings — Part 3 I 39 100
117 An 'unhearable' message I 39 100
118 Double Column Transposition — Part 2 II 38 1093
119 Pigpen with a twist — Part 2 II 37 1085
120 New Year's Greetings — Part 4 I 37 100
121 Ku Klux Klan X 36 var
122 Advent-Challenge — Part 2 II 36 1117
123 Keyshanc — Part 2 II 34 1087
124 Pigpen with a twist — Part 3 II 34 1085
125 Double Column Transposition — Part 3 II 34 1093
126 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1083
127 Trendy Messenger II 31 1123
128 Advent Challenge — Part 3 II 30 1117
129 Advent Challenge — Part 4 II 30 1117
130 ORYX Stream Cipher — Part 3 (revised) II 30 1090
131 Heartbleed — Part 3 II 30 1095
132 Fastest in the West II 29 1123
133 Kaskade-S/T — Part 3 II 29 1084
134 Lattice Part 1 II 28 1084
135 Homophonic Encryption — Part 1 II 28 1141
136 Spanish Strip Cipher — Part 1 II 27 1093
137 CMEA 2 III 27 13093
138 Double Column Transposition — Part 1 II 27 1093
139 Monoalphabetic Substitution with Camouflage — Part 5 II 27 1086
140 RSA Factoring Challenge: RSA-220 II 26 0
141 Monoalphabetic Substitution with Nostradamus Flavor II 25 1136
142 Typex — Part 1 II 25 1089
143 Cryptanalysis Hacking Puzzles — Part 1 I 24 100
144 Polyhomophonic Substitution — Part 1 I 23 100
145 RSA with Special d III 23 13087
146 Lightweight Introduction to Lattices — Part 1 I 22 101
147 RSA Factoring Challenge: RSA-230 II 22 0
148 Typex — Part 2 II 22 1089
149 Spanish Strip Cipher — Part 2 II 22 1093
150 Homophonic Encryption — Part 2 II 22 1141
151 Homophonic Encryption — Part 3 II 21 1141
152 Handycipher made in love — Part 1 II 20 1136
153 Homophonic Encryption — Part 4 II 20 1141
154 Lightweight Introduction to Lattices — Part 3 II 18 1232
155 M-138 — Part 4 II 17 1096
156 AES ECB Wrong Encoding II 17 1117
157 Lightweight Introduction to Lattices — Part 2 I 17 101
158 Breaking a Filter Generator II 17 1128
159 Purple 1 II 16 1083
160 The LoRa Cipher: Logic Randomness — Part 1 II 16 1177
161 Polyphonic Substitution Cipher — Part 1 II 16 1161
162 Concealed Messages — Vigenère's Night Sky X 16 var
163 Weakened Handycipher — Part 1 II 15 1098
164 Sigaba Part 1 II 15 1083
165 A Cloaked Substitution Cipher — Part 1 II 15 1150
166 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 15 1104
167 Handycipher made in love — Part 2 II 15 1142
168 New Year's Greetings — Part 5 II 15 1102
169 Polyhomophonic Substitution — Part 2 II 14 1186
170 A Cloaked Substitution Cipher — Part 2 II 14 1151
171 Weakened Handycipher — Part 3 II 14 1098
172 Flawed Usage of a OTP Cipher by the BND II 14 1099
173 Weakened Handycipher — Part 2 II 13 1098
174 Cascading Encryption — Part 2/3 II 13 1089
175 Cipher ID — Part 1 II 13 1161
176 The T52 Sturgeon Challenge — Part 1 II 13 1147
177 The T52 Sturgeon Challenge — Part 2 II 12 1147
178 Cascading Encryption — Part 3/3 II 12 1089
179 Polyphonic Substitution Cipher — Part 2 II 12 1170
180 RSA Factoring Challenge: RSA-240 III 12 0
181 Polyhomophonic Substitution — Part 3 II 11 1188
182 ORYX Stream Cipher — Part 4a II 11 1093
183 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1084
184 RSA Factoring Challenge: RSA-250 III 10 0
185 The T52 Sturgeon Challenge — Part 3 II 10 1147
186 Akelarre Part 1 II 10 1083
187 Kaskade-S/T — Part 5 II 10 1084
188 The T52 Sturgeon Challenge — Part 4 II 9 1147
189 RSA Factoring Challenge: RSA-232 III 9 0
190 The SZ42 Challenge — Part 2 II 8 1250
191 The SZ42 Challenge — Part 1 II 8 1238
192 Double Column Transposition — Part 5 II 8 1094
193 Hilly — Part 1 II 8 1108
194 The SIGABA Challenge — Part 2 II 7 1180
195 The SZ42 Challenge — Part 3 II 7 1261
196 The SZ42 Challenge — Part 4 II 7 1281
197 The SIGABA Challenge — Part 1 II 7 1179
198 Handycipher — Part 2 II 7 1097
199 Holographic Encryption — Part 1 II 6 1110
200 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1112
201 The SZ42 Challenge — Part 5 II 6 1288
202 Handycipher — Part 3 III 6 13331
203 The T52 Sturgeon Challenge — Part 7 II 5 1149
204 "The Road" — Part 1 II 5 1132
205 The T52 Sturgeon Challenge — Part 12 II 5 1149
206 The T52 Sturgeon Challenge — Part 11 II 5 1149
207 Handycipher — Part 6 III 5 13452
208 Weakened Handycipher — Part 6 II 5 1104
209 Weakened Handycipher — Part 5 II 5 1104
210 The T52 Sturgeon Challenge — Part 8 II 5 1149
211 Handycipher — Part 5 III 5 13452
212 Weakened Handycipher — Part 4 II 5 1104
213 Handycipher — Part 1 II 5 1097
214 The SIGABA Challenge — Part 3 III 5 14530
215 Sigaba Part 2 III 4 13087
216 The T52 Sturgeon Challenge — Part 6 II 4 1149
217 The SZ42 Challenge — Part 6 II 4 1391
218 Spirale — Part 1 II 4 1099
219 Spirale — Part 2 II 4 1099
220 The T52 Sturgeon Challenge — Part 9 II 4 1149
221 Handycipher — Part 4 III 4 13452
222 Notes of an Italian Soldier X 4 var
223 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14640
224 The T52 Sturgeon Challenge — Part 10 II 4 1149
225 The T52 Sturgeon Challenge — Part 5 II 4 1149
226 The Vatican Challenge — Part 1 X 3 var
227 Handycipher — Part 8 III 3 13518
228 Handycipher — Part 9 III 3 13518
229 Extended Handycipher — Part 1 II 3 1097
230 Extended Handycipher — Part 3 II 3 1097
231 Extended Handycipher — Part 2 II 3 1097
232 The Vatican Challenge — Part 2 X 3 var
233 Holographic Encryption — Part 2 II 3 1110
234 The SIGABA Challenge — Part 4 III 3 14548
235 Extended Handycipher — Part 4 III 3 13452
236 Spirale — Part 3 II 3 1099
237 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1166
238 Extended Handycipher — Part 5 III 3 13452
239 Weakened ElsieFour — Part 1 II 3 1121
240 Differential Cryptanalysis — Part 2 II 3 1172
241 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
242 Unknown Author X 2 var
243 Double Column Transposition X 2 var
244 The Heavy T52 Sturgeon Challenge — Part 7 III 2 14669
245 The SIGABA Challenge — Part 5 III 2 14573
246 ORYX Stream Cipher — Part 4b III 2 13267
247 Handycipher — Part 7 III 2 13518
248 Extended Handycipher — Part 6 III 2 13452
249 ElsieFour — Part 1 III 2 13617
250 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14662
251 Weakened ElsieFour — Part 3 II 2 1115
252 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14665
253 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1087
254 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1104
255 Handycipher — Part 10 II 1 1145
256 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14696
257 Hilly — Part 2 II 1 1115
258 The Heavy T52 Sturgeon Challenge — Part 1 III 1 14189
259 Beale Ciphers X 1 var
260 Substitution Cipher with Non-Prefix Codes III 1 13115
261 The Vatican Challenge — Part 4 X 1 var
262 The SIGABA Challenge — Part 6 III 0 14609
263 The Vatican Challenge — Part 5 X 0 var
264 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14677
265 The Vatican Challenge — Part 3 X 0 var
266 The Heavy T52 Sturgeon Challenge — Part 3 III 0 14231
267 The Heavy T52 Sturgeon Challenge — Part 2 III 0 14202
268 Double-Column Transposition/Granit — Part 2 II 0 1098
269 RSA Factoring Challenge: RSA-410 III 0 13145
270 RSA Factoring Challenge: RSA-420 III 0 13145
271 RSA Factoring Challenge: RSA-400 III 0 13145
272 RSA Factoring Challenge: RSA-390 III 0 13145
273 RSA Factoring Challenge: RSA-370 III 0 13145
274 RSA Factoring Challenge: RSA-380 III 0 13145
275 RSA Factoring Challenge: RSA-430 III 0 13145
276 RSA Factoring Challenge: RSA-440 III 0 13145
277 RSA Factoring Challenge: RSA-470 III 0 13145
278 RSA Factoring Challenge: RSA-480 III 0 13145
279 RSA Factoring Challenge: RSA-1536 III 0 13145
280 RSA Factoring Challenge: RSA-460 III 0 13145
281 RSA Factoring Challenge: RSA-450 III 0 13145
282 RSA Factoring Challenge: RSA-360 III 0 13145
283 RSA Factoring Challenge: RSA-350 III 0 13145
284 RSA Factoring Challenge: RSA-280 III 0 13145
285 RSA Factoring Challenge: RSA-290 III 0 13145
286 RSA Factoring Challenge: RSA-896 III 0 13145
287 RSA Factoring Challenge: RSA-270 III 0 13145
288 RSA Factoring Challenge: RSA-260 III 0 13145
289 RSA Factoring Challenge: RSA-300 III 0 13145
290 RSA Factoring Challenge: RSA-309 III 0 13145
291 RSA Factoring Challenge: RSA-330 III 0 13145
292 RSA Factoring Challenge: RSA-340 III 0 13145
293 RSA Factoring Challenge: RSA-320 III 0 13145
294 RSA Factoring Challenge: RSA-310 III 0 13145
295 RSA Factoring Challenge: RSA-1024 III 0 13145
296 RSA Factoring Challenge: RSA-490 III 0 13145
297 RSA Factoring Challenge: RSA-500 III 0 13145
298 Weakened Granit — Part 3 II 0 1100
299 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1104
300 Weakened Granit — Part 2 II 0 1100
301 Spirale — Part 4 III 0 13370
302 Double-Column Transposition/Granit — Part 1 II 0 1098
303 Double-Column Transposition/Granit — Part 3 II 0 1098
304 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1104
305 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1104
306 "The Road" — Part 2 II 0 1132
307 "The Road" — Part 3 II 0 1132
308 Dorabella X 0 var
309 Weakened ElsieFour — Part 2 II 0 1121
310 Kryptos X 0 var
311 World Record Challenge: Break 65 Bits of AES III 0 13087
312 ORYX Stream Cipher — Part 4c III 0 13267
313 Digital Signatures: DSA with Medium Fields III 0 13125
314 Kaskade-S/T — Part 4 II 0 1084
315 The third ENIGMA M4 message X 0 var
316 RSA Factoring Challenge: RSA-2048 III 0 13145
317 RSA Factoring Challenge: RSA-617 III 0 13145
318 Twelve-Year-Old Murder Case X 0 var
319 ORYX Stream Cipher — Part 4d III 0 13217
320 Double Column Transposition Reloaded — Part 3 III 0 13245
321 Spanish Strip Cipher — Part 3 X 0 var
322 Double Column Transposition Reloaded — Part 2 III 0 13245
323 Double Column Transposition Reloaded — Part 1 III 0 13245
324 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13097
325 D'Agapeyeff X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [13:28 - 21.10.2020] Murat solved the Level I challenge 'Number Sequence — Part 3'    +++    [12:32 - 21.10.2020] sergamar solved the Level I challenge 'Caesar Encryption'    +++    [12:09 - 21.10.2020] sergamar solved the Level I challenge 'Number Sequence — Part 2'    +++    [11:53 - 21.10.2020] Vamiaaaa solved the Level I challenge 'Number Sequence — Part 2'    +++    [11:28 - 21.10.2020] sergamar solved the Level I challenge 'Original Caesar Cipher'    +++