MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8531
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3101 100
2 Original Caesar Cipher I 2045 100
3 Number Sequence — Part 2 I 1432 100
4 Caesar Encryption I 1038 100
5 Beaver Code I 786 100
6 Letter to the Templars — Part 1 I 702 100
7 Number Sequence — Part 3 I 644 100
8 Letter to the Templars — Part 2 I 561 100
9 Number Sequence — Part 4 I 515 100
10 A hidden word I 503 100
11 Letter to the Templars — Part 3 II 447 1098
12 Monoalphabetic Substitution I 443 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 399 100
14 Factorization Cipher — Part 1 I 359 100
15 Grille Cipher I 329 100
16 Cracking SHA1-Hashed Passwords II 318 1092
17 Homophonic Encryption Part 1 I 311 100
18 Homophonic Encryption Part 2 I 266 100
19 One-Time Pad with Flaws I 237 100
20 Snow White and the seven dwarfs I 225 100
21 Alice's Birthday Party (Part 1) II 204 1090
22 Alice's Birthday Party (Part 2) II 195 1090
23 From Russia with Love I 191 100
24 How do you become a big cryptographer? I 163 100
25 Modified Caesar Cipher I 161 100
26 Broadcasting and low exponent — RSA-Attack II 158 1093
27 Number Sequence — Part 8 I 157 100
28 Reserve Hand Procedure — Part 1 I 157 100
29 Letter from the Alleged Countess Julie von Ortenburg I 146 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 141 1090
31 Classical Ciphers^3 I 139 100
32 Enigma Messages with Repeated Letters — Part 1 I 133 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 131 1090
34 M-138 — Part 1 I 129 100
35 Hybrid Encryption I II 120 1090
36 Nils away on travel I 120 100
37 Pigpen with a twist — Part 1 I 117 100
38 The Book Code: A Challenge for Bookworms I 116 100
39 RSA: Two different keys — same ciphertext II 115 1093
40 Enigma Part 1 II 111 1090
41 Molehunt (Part 1/3) I 109 100
42 Factorization Cipher — Part 2 II 109 1094
43 A Secret Message from Castle Mansfeld I 105 100
44 Molehunt (Part 2/3) I 105 100
45 ¿No Hablas Español? No problemo! I 101 100
46 ADFGVX — Part 2 I 95 100
47 Trifid Cipher I 95 100
48 A really long number sequence II 94 1093
49 Kaskade-S/T — Part 1 I 89 100
50 ADFGVX — Part 1 I 85 100
51 Enigma Combinatorics I 83 100
52 Advent-Challenge — Part 1 I 83 101
53 Heartbleed — Part 1 I 82 100
54 Playfair Encryption I 81 100
55 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 80 100
56 Double Columnar Transposition I 79 100
57 M-138 — Part 2 II 77 1114
58 Playfair with hints about the grid I 77 100
59 ECDH-Key Exchange for Beginners I 75 100
60 Number Sequence — Part 6 I 74 100
61 ORYX Stream Cipher Part I II 72 1090
62 Enigma Part 2 II 70 1090
63 Zodiac Cipher I 70 100
64 Image Noise I 70 100
65 Factorization Cipher — Part 3 II 69 1095
66 The Last Note I 66 100
67 A hidden word — Part 2 I 65 100
68 Hill Cipher with Sudoku Key I 62 100
69 Enigma Messages with Repeated Letters — Part 3 I 62 100
70 Enigma Messages with Repeated Letters — Part 2 I 62 100
71 Molehunt (Part 3/3) II 62 1090
72 Partial Key Exposure with RSA — Part 1 II 61 1095
73 BCR code (Book-Caesar-RSA) II 58 1098
74 Enigma Messages with Repeated Letters — Part 5 I 58 100
75 Smartcard RSA II 58 1090
76 Enigma Messages I 58 100
77 Number Sequence — Part 5 I 57 100
78 Cascading Encryption — Part 1/3 I 56 100
79 Turing Bombe Enigma I I 55 100
80 Multilingual Monoalphabetic Substitution I 55 100
81 Enigma Messages with Repeated Letters — Part 4 I 54 100
82 AES key — encoded in the machine readable zone of a European ePassport II 53 1095
83 Heartbleed — Part 2 I 53 100
84 An Invisible Message I 47 100
85 Unusual encryption using a diophantine equation II 47 1093
86 Recycled One-Time Pad I 47 100
87 Monoalphabetic substitution with camouflage — Part 1 I 46 100
88 Kaskade-S/T — Part 2 II 44 1091
89 Keyshanc — Part 1 II 40 1096
90 Number Sequence — Part 7 I 40 100
91 ORYX Stream Cipher Part II II 40 1090
92 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1091
93 New Year's Greetings — Part 1 I 38 100
94 Strange Message from Thessaloniki I 37 100
95 Monoalphabetic substitution with camouflage — Part 4 I 37 100
96 Unconcealed RSA messages II 36 1094
97 News from Castle Mansfeld I 36 100
98 Music Code — Part 1 I 35 100
99 Monoalphabetic substitution with camouflage — Part 2 II 35 1094
100 Weakened Granit — Part 1 I 35 100
101 Music Code — Part 2 II 35 1092
102 An 'unhearable' message I 34 100
103 Ku Klux Klan X 34 var
104 Pigpen with a twist — Part 2 II 33 1093
105 New Year's Greetings — Part 2 I 33 100
106 Monoalphabetic substitution with camouflage — Part 3 II 33 1094
107 CMEA 1 II 33 1090
108 Keyshanc — Part 2 II 32 1096
109 Double Column Transposition — Part 4 II 32 1108
110 M-138 — Part 3 II 32 1114
111 New Year's Greetings — Part 3 I 32 100
112 Double Column Transposition — Part 2 II 32 1108
113 New Year's Greetings — Part 4 I 31 100
114 RSA Factoring Challenge: RSA-704 II 31 0
115 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1090
116 Pigpen with a twist — Part 3 II 29 1093
117 Kaskade-S/T — Part 3 II 28 1091
118 Heartbleed — Part 3 II 28 1111
119 Double Column Transposition — Part 3 II 28 1108
120 Number Sequence — Part 9 I 27 101
121 ORYX Stream Cipher — Part 3 (revised) II 26 1102
122 RSA Factoring Challenge: RSA-210 II 23 0
123 Lattice Part 1 II 21 1091
124 Advent-Challenge — Part 2 II 21 1261
125 CMEA 2 III 21 13223
126 Monoalphabetic Substitution with Camouflage — Part 5 II 21 1095
127 Typex — Part 1 II 20 1100
128 Double Column Transposition — Part 1 II 20 1107
129 RSA with Special d III 19 13215
130 Spanish Strip Cipher — Part 1 II 19 1107
131 Spanish Strip Cipher — Part 2 II 17 1107
132 Advent Challenge — Part 3 II 17 1269
133 The Einstein Enigma II 17 1433
134 Typex — Part 2 II 17 1101
135 Advent Challenge — Part 4 II 17 1268
136 Concealed Messages — Vigenère's Night Sky X 15 var
137 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1137
138 Purple 1 II 14 1090
139 New Year's Greetings — Part 5 II 12 1130
140 Sigaba Part 1 II 11 1090
141 M-138 — Part 4 II 11 1114
142 Weakened Handycipher — Part 1 II 10 1118
143 ORYX Stream Cipher — Part 4a II 10 1107
144 Weakened Handycipher — Part 3 II 10 1118
145 Cascading Encryption — Part 2/3 II 10 1101
146 Flawed Usage of a OTP Cipher by the BND II 10 1121
147 Cascading Encryption — Part 3/3 II 10 1101
148 Weakened Handycipher — Part 2 II 9 1118
149 Kaskade-S/T — Part 5 II 9 1092
150 RSA Factoring Challenge: RSA-220 II 9 0
151 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1092
152 AES ECB Wrong Encoding II 8 1261
153 Akelarre Part 1 II 7 1090
154 Double Column Transposition — Part 5 II 5 1109
155 Handycipher — Part 3 III 5 13630
156 Handycipher — Part 2 II 5 1116
157 Weakened Handycipher — Part 4 II 4 1136
158 Handycipher — Part 1 II 4 1116
159 Weakened Handycipher — Part 6 II 4 1136
160 Weakened Handycipher — Part 5 II 4 1136
161 Notes of an Italian Soldier X 4 var
162 Spirale — Part 3 II 3 1121
163 Handycipher — Part 5 III 3 13937
164 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 3 1179
165 Holographic Encryption — Part 1 II 3 1163
166 Handycipher — Part 6 III 3 13937
167 Spirale — Part 2 II 3 1121
168 Sigaba Part 2 III 3 13215
169 Spirale — Part 1 II 3 1121
170 Unknown Author X 2 var
171 Holographic Encryption — Part 2 II 2 1163
172 Extended Handycipher — Part 3 II 2 1116
173 ORYX Stream Cipher — Part 4b III 2 13505
174 Extended Handycipher — Part 1 II 2 1116
175 Extended Handycipher — Part 2 II 2 1116
176 Handycipher — Part 4 III 2 13937
177 Extended Handycipher — Part 4 III 2 13937
178 Extended Handycipher — Part 5 III 2 13937
179 Double Column Transposition X 2 var
180 Beale Ciphers X 1 var
181 Weakened ElsieFour — Part 1 II 1 1208
182 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1097
183 Substitution Cipher with Non-Prefix Codes III 1 13256
184 Handycipher — Part 9 III 1 14176
185 Handycipher — Part 8 III 1 14176
186 Extended Handycipher — Part 6 III 1 13937
187 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1137
188 Hilly — Part 1 II 1 1154
189 Handycipher — Part 7 III 1 14176
190 Digital Signatures: DSA with Medium Fields III 0 13270
191 The Vatikan Challenge — Part 2 X 0 var
192 The Vatican Challenge — Part 1 X 0 var
193 Twelve-Year-Old Murder Case X 0 var
194 Kaskade-S/T — Part 4 II 0 1092
195 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1137
196 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1137
197 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1137
198 The third ENIGMA M4 message X 0 var
199 Weakened Granit — Part 3 II 0 1122
200 ElsieFour — Part 1 III 0 14842
201 Spirale — Part 4 II 0 1121
202 Weakened Granit — Part 2 II 0 1122
203 Hilly — Part 2 II 0 1215
204 RSA Factoring Challenge: RSA-230 II 0 1095
205 RSA Factoring Challenge: RSA-380 III 0 13300
206 RSA Factoring Challenge: RSA-370 III 0 13300
207 RSA Factoring Challenge: RSA-390 III 0 13300
208 RSA Factoring Challenge: RSA-400 III 0 13300
209 RSA Factoring Challenge: RSA-410 III 0 13300
210 RSA Factoring Challenge: RSA-360 III 0 13300
211 RSA Factoring Challenge: RSA-350 III 0 13300
212 Kryptos X 0 var
213 RSA Factoring Challenge: RSA-330 III 0 13300
214 ORYX Stream Cipher — Part 4d III 0 13417
215 RSA Factoring Challenge: RSA-340 III 0 13300
216 RSA Factoring Challenge: RSA-420 III 0 13300
217 World Record Challenge: Break 65 Bits of AES III 0 13215
218 RSA Factoring Challenge: RSA-480 III 0 13300
219 RSA Factoring Challenge: RSA-490 III 0 13300
220 RSA Factoring Challenge: RSA-500 III 0 13300
221 RSA Factoring Challenge: RSA-617 III 0 13300
222 RSA Factoring Challenge: RSA-470 III 0 13300
223 RSA Factoring Challenge: RSA-1536 III 0 13300
224 RSA Factoring Challenge: RSA-430 III 0 13300
225 RSA Factoring Challenge: RSA-440 III 0 13300
226 RSA Factoring Challenge: RSA-450 III 0 13300
227 RSA Factoring Challenge: RSA-460 III 0 13300
228 RSA Factoring Challenge: RSA-320 III 0 13300
229 Dorabella X 0 var
230 RSA Factoring Challenge: RSA-260 III 0 13300
231 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13230
232 D'Agapeyeff X 0 var
233 RSA Factoring Challenge: RSA-270 III 0 13300
234 RSA Factoring Challenge: RSA-250 III 0 13300
235 RSA Factoring Challenge: RSA-240 III 0 13300
236 Double-Column Transposition/Granit — Part 2 II 0 1119
237 Double-Column Transposition/Granit — Part 1 II 0 1119
238 RSA Factoring Challenge: RSA-2048 III 0 13300
239 RSA Factoring Challenge: RSA-232 III 0 13300
240 RSA Factoring Challenge: RSA-896 III 0 13300
241 RSA Factoring Challenge: RSA-280 III 0 13300
242 Double Column Transposition Reloaded — Part 2 III 0 13465
243 Double Column Transposition Reloaded — Part 1 III 0 13465
244 RSA Factoring Challenge: RSA-1024 III 0 13300
245 RSA Factoring Challenge: RSA-310 III 0 13300
246 Double Column Transposition Reloaded — Part 3 III 0 13465
247 RSA Factoring Challenge: RSA-309 III 0 13300
248 ORYX Stream Cipher — Part 4c III 0 13505
249 Spanish Strip Cipher — Part 3 X 0 var
250 RSA Factoring Challenge: RSA-290 III 0 13300
251 RSA Factoring Challenge: RSA-300 III 0 13300
252 Double-Column Transposition/Granit — Part 3 II 0 1119
 
 
powered by the CrypTool project  CrypTool

 

   +++    [13:36 - 21.02.2018] Ju1703 solved the Level I challenge 'Grille Cipher'    +++    [11:34 - 21.02.2018] Ju1703 solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [11:33 - 21.02.2018] Grandwizard solved the Level I challenge 'Playfair with hints about the grid'    +++    [10:49 - 21.02.2018] aysxdcfv solved the Level I challenge 'Monoalphabetic Substitution'    +++    [10:39 - 21.02.2018] Ju1703 solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++