MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9902
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3654 100
2 Original Caesar Cipher I 2486 100
3 Number Sequence — Part 2 I 1751 100
4 Caesar Encryption I 1218 100
5 Beaver Code I 977 100
6 Letter to the Templars — Part 1 I 851 100
7 Number Sequence — Part 3 I 815 100
8 Letter to the Templars — Part 2 I 676 100
9 Number Sequence — Part 4 I 668 100
10 A hidden word I 664 100
11 Letter to the Templars — Part 3 II 563 1091
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 474 100
13 Monoalphabetic Substitution I 474 100
14 Cracking SHA1-Hashed Passwords II 427 1086
15 Factorization Cipher — Part 1 I 422 100
16 Grille Cipher I 395 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 294 100
20 Number Sequence — Part 8 I 273 100
21 One-Time Pad with Flaws I 267 100
22 Snow White and the seven dwarfs I 251 100
23 Alice's Birthday Party (Part 1) II 249 1085
24 Alice's Birthday Party (Part 2) II 240 1085
25 From Russia with Love I 232 100
26 Broadcasting and low exponent — RSA-Attack II 191 1087
27 Modified Caesar Cipher I 191 100
28 How do you become a big cryptographer? I 191 100
29 Reserve Hand Procedure — Part 1 I 173 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1085
31 M-138 — Part 1 I 164 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Letter from the Alleged Countess Julie von Ortenburg I 157 100
34 Classical Ciphers^3 I 156 100
35 Enigma Messages with Repeated Letters — Part 1 I 153 100
36 Hybrid Encryption I II 140 1085
37 Nils away on travel I 140 100
38 RSA: Two different keys — same ciphertext II 139 1087
39 Pigpen with a twist — Part 1 I 137 100
40 The Book Code: A Challenge for Bookworms I 128 100
41 Factorization Cipher — Part 2 II 126 1088
42 Molehunt (Part 1/3) I 125 100
43 ¿No Hablas Español? No problemo! I 124 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 116 1085
46 A Secret Message from Castle Mansfeld I 113 100
47 Trifid Cipher I 108 100
48 A really long number sequence II 106 1088
49 Number Sequence — Part 6 I 103 100
50 ADFGVX — Part 2 I 103 100
51 M-138 — Part 2 II 102 1101
52 Image Noise I 101 100
53 Kaskade-S/T — Part 1 I 98 100
54 Playfair Encryption I 95 100
55 ADFGVX — Part 1 I 94 100
56 Playfair with hints about the grid I 91 100
57 Autokey Cipher I 91 100
58 Double Columnar Transposition I 90 100
59 Enigma Combinatorics I 90 100
60 Heartbleed — Part 1 I 89 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 86 100
62 ECDH-Key Exchange for Beginners I 84 100
63 A hidden word — Part 2 I 81 100
64 Factorization Cipher — Part 3 II 80 1089
65 ORYX Stream Cipher Part I II 76 1085
66 The Last Note I 76 100
67 Enigma Part 2 II 75 1085
68 Zodiac Cipher I 75 100
69 Cryptanalysis Hacking Puzzles — Part 2 I 73 100
70 Number Sequence — Part 10 I 72 100
71 Partial Key Exposure with RSA — Part 1 II 72 1089
72 Hill Cipher with Sudoku Key I 71 100
73 Molehunt (Part 3/3) II 70 1085
74 Number Sequence — Part 9 I 70 100
75 Number Sequence — Part 5 I 70 100
76 Enigma Messages with Repeated Letters — Part 3 I 68 100
77 Enigma Messages with Repeated Letters — Part 2 I 67 100
78 Enigma Messages I 67 100
79 Enigma Messages with Repeated Letters — Part 5 I 65 100
80 Smartcard RSA II 64 1085
81 Multilingual Monoalphabetic Substitution I 64 100
82 BCR code (Book-Caesar-RSA) II 64 1091
83 Cascading Encryption — Part 1/3 I 63 100
84 Heartbleed — Part 2 I 60 100
85 Turing Bombe Enigma I I 60 100
86 Number Sequence — Part 7 I 60 100
87 AES key — encoded in the machine readable zone of a European ePassport II 60 1089
88 Enigma Messages with Repeated Letters — Part 4 I 59 100
89 Unusual encryption using a diophantine equation II 57 1088
90 Recycled One-Time Pad I 56 100
91 Monoalphabetic substitution with camouflage — Part 1 I 54 100
92 An Invisible Message I 53 100
93 Kaskade-S/T — Part 2 II 48 1086
94 M-138 — Part 3 II 47 1101
95 The Einstein Enigma II 45 1135
96 ORYX Stream Cipher Part II II 44 1085
97 Unconcealed RSA messages II 44 1088
98 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
99 New Year's Greetings — Part 1 I 44 100
100 News from Castle Mansfeld I 43 100
101 Keyshanc — Part 1 II 42 1090
102 Monoalphabetic substitution with camouflage — Part 4 I 41 100
103 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1086
104 Strange Message from Thessaloniki I 41 100
105 New Year's Greetings — Part 2 I 41 100
106 RSA Factoring Challenge: RSA-704 II 40 0
107 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
108 Weakened Granit — Part 1 I 39 100
109 New Year's Greetings — Part 3 I 38 100
110 Modular Sequences I 38 100
111 Music Code — Part 2 II 37 1087
112 Music Code — Part 1 I 37 100
113 An 'unhearable' message I 37 100
114 Ku Klux Klan X 36 var
115 Double Column Transposition — Part 4 II 36 1098
116 Pigpen with a twist — Part 2 II 36 1088
117 New Year's Greetings — Part 4 I 36 100
118 CMEA 1 II 35 1086
119 Double Column Transposition — Part 2 II 35 1098
120 Summer Job II 34 1144
121 Keyshanc — Part 2 II 33 1090
122 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1085
123 RSA Factoring Challenge: RSA-210 II 33 0
124 Pigpen with a twist — Part 3 II 32 1088
125 Advent-Challenge — Part 2 II 32 1132
126 Double Column Transposition — Part 3 II 31 1098
127 Heartbleed — Part 3 II 30 1099
128 Advent Challenge — Part 4 II 29 1133
129 ORYX Stream Cipher — Part 3 (revised) II 29 1094
130 Kaskade-S/T — Part 3 II 29 1086
131 Trendy Messenger II 28 1144
132 Advent Challenge — Part 3 II 28 1133
133 Fastest in the West II 26 1144
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1089
135 Spanish Strip Cipher — Part 1 II 24 1097
136 CMEA 2 III 24 13137
137 Lattice Part 1 II 24 1086
138 Double Column Transposition — Part 1 II 23 1097
139 Homophonic Encryption — Part 1 II 21 1198
140 Typex — Part 1 II 21 1093
141 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
142 RSA with Special d III 21 13130
143 Spanish Strip Cipher — Part 2 II 20 1097
144 RSA Factoring Challenge: RSA-220 II 19 0
145 Monoalphabetic Substitution with Nostradamus Flavor II 19 1177
146 Homophonic Encryption — Part 2 II 18 1200
147 Handycipher made in love — Part 1 II 18 1177
148 Typex — Part 2 II 18 1093
149 Homophonic Encryption — Part 3 II 17 1200
150 RSA Factoring Challenge: RSA-230 II 16 0
151 M-138 — Part 4 II 16 1101
152 Concealed Messages — Vigenère's Night Sky X 16 var
153 Purple 1 II 15 1085
154 Breaking a Filter Generator II 15 1155
155 Weakened Handycipher — Part 1 II 15 1103
156 New Year's Greetings — Part 5 II 14 1110
157 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1112
158 Weakened Handycipher — Part 3 II 14 1103
159 AES ECB Wrong Encoding II 14 1132
160 Handycipher made in love — Part 2 II 13 1204
161 Weakened Handycipher — Part 2 II 13 1103
162 A Cloaked Substitution Cipher — Part 1 II 13 1273
163 Homophonic Encryption — Part 4 II 13 1200
164 Flawed Usage of a OTP Cipher by the BND II 13 1105
165 A Cloaked Substitution Cipher — Part 2 II 12 1279
166 Sigaba Part 1 II 12 1085
167 ORYX Stream Cipher — Part 4a II 11 1097
168 Cascading Encryption — Part 3/3 II 11 1093
169 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
170 Cascading Encryption — Part 2/3 II 11 1093
171 Kaskade-S/T — Part 5 II 10 1087
172 Akelarre Part 1 II 9 1085
173 Hilly — Part 1 II 8 1118
174 Handycipher — Part 2 II 7 1102
175 Double Column Transposition — Part 5 II 7 1098
176 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1124
177 Handycipher — Part 3 III 6 13420
178 Handycipher — Part 6 III 5 13579
179 Handycipher — Part 5 III 5 13579
180 Weakened Handycipher — Part 4 II 5 1112
181 Weakened Handycipher — Part 5 II 5 1112
182 Weakened Handycipher — Part 6 II 5 1112
183 Handycipher — Part 1 II 5 1102
184 The T52 Sturgeon Challenge — Part 1 II 4 1234
185 Handycipher — Part 4 III 4 13579
186 Notes of an Italian Soldier X 4 var
187 Holographic Encryption — Part 1 II 4 1121
188 Spirale — Part 3 II 3 1105
189 Sigaba Part 2 III 3 13130
190 "The Road" — Part 1 II 3 1164
191 Handycipher — Part 9 III 3 13672
192 The Vatican Challenge — Part 2 X 3 var
193 Spirale — Part 2 II 3 1105
194 The Vatican Challenge — Part 1 X 3 var
195 Spirale — Part 1 II 3 1105
196 Extended Handycipher — Part 2 II 3 1103
197 Handycipher — Part 8 III 3 13672
198 Extended Handycipher — Part 5 III 3 13579
199 Extended Handycipher — Part 4 III 3 13579
200 Extended Handycipher — Part 3 II 3 1103
201 The T52 Sturgeon Challenge — Part 4 II 3 1241
202 The T52 Sturgeon Challenge — Part 3 II 3 1241
203 The T52 Sturgeon Challenge — Part 2 II 3 1241
204 Extended Handycipher — Part 1 II 3 1103
205 ElsieFour — Part 1 III 2 13823
206 Handycipher — Part 7 III 2 13672
207 Extended Handycipher — Part 6 III 2 13579
208 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
209 The T52 Sturgeon Challenge — Part 5 II 2 1259
210 The T52 Sturgeon Challenge — Part 6 II 2 1259
211 The T52 Sturgeon Challenge — Part 7 II 2 1259
212 The T52 Sturgeon Challenge — Part 12 II 2 1259
213 The T52 Sturgeon Challenge — Part 11 II 2 1259
214 Double Column Transposition X 2 var
215 The T52 Sturgeon Challenge — Part 8 II 2 1259
216 Weakened ElsieFour — Part 3 II 2 1128
217 Holographic Encryption — Part 2 II 2 1121
218 ORYX Stream Cipher — Part 4b III 2 13341
219 Unknown Author X 2 var
220 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1112
221 Beale Ciphers X 1 var
222 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1090
223 Handycipher — Part 10 II 1 1221
224 Weakened ElsieFour — Part 1 II 1 1141
225 Hilly — Part 2 II 1 1129
226 Substitution Cipher with Non-Prefix Codes III 1 13162
227 The T52 Sturgeon Challenge — Part 9 II 1 1259
228 The Vatican Challenge — Part 4 X 1 var
229 The T52 Sturgeon Challenge — Part 10 II 1 1259
230 RSA Factoring Challenge: RSA-300 III 0 13196
231 D'Agapeyeff X 0 var
232 RSA Factoring Challenge: RSA-290 III 0 13196
233 RSA Factoring Challenge: RSA-280 III 0 13196
234 RSA Factoring Challenge: RSA-896 III 0 13196
235 "The Road" — Part 3 II 0 1164
236 "The Road" — Part 2 II 0 1164
237 RSA Factoring Challenge: RSA-1024 III 0 13196
238 Dorabella X 0 var
239 RSA Factoring Challenge: RSA-309 III 0 13196
240 Kaskade-S/T — Part 4 II 0 1087
241 Twelve-Year-Old Murder Case X 0 var
242 The Heavy T52 Sturgeon Challenge — Part 2 III 0 17412
243 RSA Factoring Challenge: RSA-270 III 0 13196
244 The Heavy T52 Sturgeon Challenge — Part 1 III 0 16645
245 ORYX Stream Cipher — Part 4d III 0 13281
246 Spanish Strip Cipher — Part 3 X 0 var
247 Double Column Transposition Reloaded — Part 3 III 0 13314
248 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13142
249 Double Column Transposition Reloaded — Part 2 III 0 13314
250 Double Column Transposition Reloaded — Part 1 III 0 13314
251 World Record Challenge: Break 65 Bits of AES III 0 13130
252 The Vatican Challenge — Part 5 X 0 var
253 RSA Factoring Challenge: RSA-250 III 0 13196
254 RSA Factoring Challenge: RSA-232 III 0 13196
255 RSA Factoring Challenge: RSA-240 III 0 13196
256 The Vatican Challenge — Part 3 X 0 var
257 RSA Factoring Challenge: RSA-310 III 0 13196
258 RSA Factoring Challenge: RSA-260 III 0 13196
259 RSA Factoring Challenge: RSA-340 III 0 13196
260 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1112
261 RSA Factoring Challenge: RSA-430 III 0 13196
262 RSA Factoring Challenge: RSA-440 III 0 13196
263 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1112
264 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1112
265 Weakened Granit — Part 2 II 0 1106
266 Weakened Granit — Part 3 II 0 1106
267 RSA Factoring Challenge: RSA-450 III 0 13196
268 RSA Factoring Challenge: RSA-460 III 0 13196
269 RSA Factoring Challenge: RSA-470 III 0 13196
270 RSA Factoring Challenge: RSA-500 III 0 13196
271 RSA Factoring Challenge: RSA-480 III 0 13196
272 RSA Factoring Challenge: RSA-1536 III 0 13196
273 RSA Factoring Challenge: RSA-617 III 0 13196
274 The third ENIGMA M4 message X 0 var
275 RSA Factoring Challenge: RSA-2048 III 0 13196
276 RSA Factoring Challenge: RSA-420 III 0 13196
277 Digital Signatures: DSA with Medium Fields III 0 13173
278 Double-Column Transposition/Granit — Part 2 II 0 1104
279 Double-Column Transposition/Granit — Part 3 II 0 1104
280 RSA Factoring Challenge: RSA-350 III 0 13196
281 Double-Column Transposition/Granit — Part 1 II 0 1104
282 Weakened ElsieFour — Part 2 II 0 1141
283 RSA Factoring Challenge: RSA-330 III 0 13196
284 RSA Factoring Challenge: RSA-490 III 0 13196
285 RSA Factoring Challenge: RSA-360 III 0 13196
286 RSA Factoring Challenge: RSA-370 III 0 13196
287 Spirale — Part 4 III 0 13470
288 RSA Factoring Challenge: RSA-410 III 0 13196
289 ORYX Stream Cipher — Part 4c III 0 13341
290 RSA Factoring Challenge: RSA-400 III 0 13196
291 Kryptos X 0 var
292 RSA Factoring Challenge: RSA-380 III 0 13196
293 RSA Factoring Challenge: RSA-390 III 0 13196
294 RSA Factoring Challenge: RSA-320 III 0 13196
 
 
powered by the CrypTool project  CrypTool

 

   +++    [13:47 - 17.10.2019] jborregognzlzz solved the Level I challenge 'Number Sequence — Part 2'    +++    [13:43 - 17.10.2019] pondorondo solved the Level I challenge 'Original Caesar Cipher'    +++    [13:40 - 17.10.2019] pondorondo solved the Level I challenge 'Caesar Encryption'    +++    [09:46 - 17.10.2019] CrucioMercutio solved the Level I challenge 'Number Sequence — Part 2'    +++    [09:37 - 17.10.2019] CrucioMercutio solved the Level I challenge 'Original Caesar Cipher'    +++