MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10098
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3713 100
2 Original Caesar Cipher I 2531 100
3 Number Sequence — Part 2 I 1788 100
4 Caesar Encryption I 1233 100
5 Beaver Code I 1002 100
6 Letter to the Templars — Part 1 I 873 100
7 Number Sequence — Part 3 I 833 100
8 Letter to the Templars — Part 2 I 698 100
9 Number Sequence — Part 4 I 688 100
10 A hidden word I 686 100
11 Letter to the Templars — Part 3 II 585 1090
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 484 100
13 Monoalphabetic Substitution I 477 100
14 Cracking SHA1-Hashed Passwords II 440 1086
15 Factorization Cipher — Part 1 I 433 100
16 Grille Cipher I 405 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 355 100
18 Advent-Challenge — Part 1 I 317 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 305 100
20 Number Sequence — Part 8 I 284 100
21 One-Time Pad with Flaws I 272 100
22 Snow White and the seven dwarfs I 255 100
23 Alice's Birthday Party (Part 1) II 254 1085
24 Alice's Birthday Party (Part 2) II 244 1085
25 From Russia with Love I 239 100
26 How do you become a big cryptographer? I 195 100
27 Broadcasting and low exponent — RSA-Attack II 194 1087
28 Modified Caesar Cipher I 194 100
29 Reserve Hand Procedure — Part 1 I 175 100
30 M-138 — Part 1 I 171 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 168 1085
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Classical Ciphers^3 I 159 100
34 Letter from the Alleged Countess Julie von Ortenburg I 158 100
35 Enigma Messages with Repeated Letters — Part 1 I 156 100
36 Nils away on travel I 144 100
37 Hybrid Encryption I II 143 1085
38 RSA: Two different keys — same ciphertext II 141 1087
39 Pigpen with a twist — Part 1 I 140 100
40 The Book Code: A Challenge for Bookworms I 131 100
41 ¿No Hablas Español? No problemo! I 129 100
42 Factorization Cipher — Part 2 II 127 1088
43 Molehunt (Part 1/3) I 125 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 117 1085
46 A Secret Message from Castle Mansfeld I 113 100
47 A really long number sequence II 109 1087
48 Trifid Cipher I 108 100
49 Number Sequence — Part 6 I 108 100
50 M-138 — Part 2 II 107 1100
51 ADFGVX — Part 2 I 105 100
52 Autokey Cipher I 103 100
53 Image Noise I 101 100
54 Kaskade-S/T — Part 1 I 98 100
55 ADFGVX — Part 1 I 96 100
56 Playfair Encryption I 95 100
57 Enigma Combinatorics I 93 100
58 Double Columnar Transposition I 92 100
59 Playfair with hints about the grid I 91 100
60 Heartbleed — Part 1 I 89 100
61 Cryptanalysis Hacking Puzzles — Part 2 I 88 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 87 100
63 ECDH-Key Exchange for Beginners I 85 100
64 A hidden word — Part 2 I 82 100
65 Factorization Cipher — Part 3 II 81 1088
66 The Last Note I 78 100
67 Zodiac Cipher I 77 100
68 Enigma Part 2 II 77 1085
69 Number Sequence — Part 5 I 77 100
70 Number Sequence — Part 10 I 77 100
71 ORYX Stream Cipher Part I II 76 1085
72 Number Sequence — Part 9 I 75 100
73 Partial Key Exposure with RSA — Part 1 II 74 1088
74 Enigma Messages with Repeated Letters — Part 3 I 71 100
75 Hill Cipher with Sudoku Key I 71 100
76 Molehunt (Part 3/3) II 70 1085
77 Enigma Messages with Repeated Letters — Part 2 I 70 100
78 Enigma Messages with Repeated Letters — Part 5 I 68 100
79 Enigma Messages I 68 100
80 Smartcard RSA II 65 1085
81 BCR code (Book-Caesar-RSA) II 65 1090
82 Multilingual Monoalphabetic Substitution I 65 100
83 Number Sequence — Part 7 I 64 100
84 Cascading Encryption — Part 1/3 I 63 100
85 Enigma Messages with Repeated Letters — Part 4 I 62 100
86 Turing Bombe Enigma I I 61 100
87 Heartbleed — Part 2 I 60 100
88 AES key — encoded in the machine readable zone of a European ePassport II 60 1088
89 Unusual encryption using a diophantine equation II 57 1087
90 Recycled One-Time Pad I 57 100
91 Monoalphabetic substitution with camouflage — Part 1 I 54 100
92 An Invisible Message I 54 100
93 Kaskade-S/T — Part 2 II 48 1085
94 The Einstein Enigma II 47 1130
95 M-138 — Part 3 II 47 1100
96 ORYX Stream Cipher Part II II 45 1085
97 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
98 Unconcealed RSA messages II 44 1087
99 New Year's Greetings — Part 1 I 44 100
100 News from Castle Mansfeld I 44 100
101 Keyshanc — Part 1 II 42 1089
102 Monoalphabetic substitution with camouflage — Part 4 I 42 100
103 Strange Message from Thessaloniki I 41 100
104 RSA Factoring Challenge: RSA-704 II 41 0
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1085
106 Modular Sequences I 41 100
107 New Year's Greetings — Part 2 I 41 100
108 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
109 Weakened Granit — Part 1 I 39 100
110 Music Code — Part 2 II 38 1086
111 New Year's Greetings — Part 3 I 38 100
112 An 'unhearable' message I 38 100
113 Music Code — Part 1 I 38 100
114 CMEA 1 II 38 1085
115 Pigpen with a twist — Part 2 II 37 1087
116 Summer Job II 36 1137
117 Double Column Transposition — Part 4 II 36 1097
118 New Year's Greetings — Part 4 I 36 100
119 RSA Factoring Challenge: RSA-210 II 35 0
120 Double Column Transposition — Part 2 II 35 1096
121 Ku Klux Klan X 35 var
122 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1085
123 Pigpen with a twist — Part 3 II 33 1087
124 Keyshanc — Part 2 II 33 1089
125 Advent-Challenge — Part 2 II 33 1127
126 Double Column Transposition — Part 3 II 31 1096
127 Heartbleed — Part 3 II 30 1098
128 ORYX Stream Cipher — Part 3 (revised) II 30 1093
129 Advent Challenge — Part 4 II 29 1128
130 Kaskade-S/T — Part 3 II 29 1085
131 Trendy Messenger II 28 1137
132 Advent Challenge — Part 3 II 28 1128
133 Fastest in the West II 27 1137
134 CMEA 2 III 26 13125
135 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1088
136 Lattice Part 1 II 24 1086
137 Spanish Strip Cipher — Part 1 II 24 1096
138 Homophonic Encryption — Part 1 II 23 1173
139 Double Column Transposition — Part 1 II 23 1096
140 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
141 RSA with Special d III 21 13119
142 RSA Factoring Challenge: RSA-220 II 21 0
143 Typex — Part 1 II 21 1092
144 Spanish Strip Cipher — Part 2 II 20 1096
145 Homophonic Encryption — Part 2 II 19 1174
146 Monoalphabetic Substitution with Nostradamus Flavor II 19 1161
147 Handycipher made in love — Part 1 II 18 1161
148 Homophonic Encryption — Part 3 II 18 1174
149 Typex — Part 2 II 18 1092
150 RSA Factoring Challenge: RSA-230 II 17 0
151 Concealed Messages — Vigenère's Night Sky X 16 var
152 Homophonic Encryption — Part 4 II 16 1174
153 M-138 — Part 4 II 16 1100
154 Breaking a Filter Generator II 16 1145
155 Weakened Handycipher — Part 1 II 15 1102
156 Purple 1 II 15 1085
157 AES ECB Wrong Encoding II 15 1127
158 New Year's Greetings — Part 5 II 14 1108
159 Weakened Handycipher — Part 3 II 14 1102
160 A Cloaked Substitution Cipher — Part 1 II 14 1203
161 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1110
162 Handycipher made in love — Part 2 II 13 1176
163 Weakened Handycipher — Part 2 II 13 1102
164 Flawed Usage of a OTP Cipher by the BND II 13 1104
165 A Cloaked Substitution Cipher — Part 2 II 13 1204
166 Sigaba Part 1 II 12 1085
167 Cascading Encryption — Part 3/3 II 11 1092
168 ORYX Stream Cipher — Part 4a II 11 1096
169 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
170 Cascading Encryption — Part 2/3 II 11 1092
171 Kaskade-S/T — Part 5 II 10 1086
172 Akelarre Part 1 II 9 1085
173 Polyphonic Substitution Cipher — Part 1 II 9 1268
174 Cipher ID — Part 1 II 8 1265
175 The T52 Sturgeon Challenge — Part 1 II 8 1190
176 Hilly — Part 1 II 8 1115
177 Handycipher — Part 2 II 7 1101
178 The T52 Sturgeon Challenge — Part 2 II 7 1192
179 Double Column Transposition — Part 5 II 7 1097
180 Handycipher — Part 3 III 6 13395
181 The T52 Sturgeon Challenge — Part 3 II 6 1192
182 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1120
183 Handycipher — Part 1 II 5 1101
184 Handycipher — Part 6 III 5 13542
185 Weakened Handycipher — Part 6 II 5 1110
186 "The Road" — Part 1 II 5 1152
187 The T52 Sturgeon Challenge — Part 4 II 5 1192
188 Weakened Handycipher — Part 4 II 5 1110
189 Holographic Encryption — Part 1 II 5 1118
190 Weakened Handycipher — Part 5 II 5 1110
191 Handycipher — Part 5 III 5 13542
192 Handycipher — Part 4 III 4 13542
193 Notes of an Italian Soldier X 4 var
194 RSA Factoring Challenge: RSA-240 III 4 0
195 Polyphonic Substitution Cipher — Part 2 II 4 1523
196 Extended Handycipher — Part 1 II 3 1101
197 Handycipher — Part 8 III 3 13626
198 Spirale — Part 2 II 3 1104
199 Spirale — Part 3 II 3 1104
200 Holographic Encryption — Part 2 II 3 1118
201 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1333
202 Extended Handycipher — Part 5 III 3 13542
203 Extended Handycipher — Part 4 III 3 13542
204 Spirale — Part 1 II 3 1104
205 Handycipher — Part 9 III 3 13626
206 Sigaba Part 2 III 3 13119
207 The Vatican Challenge — Part 2 X 3 var
208 The Vatican Challenge — Part 1 X 3 var
209 Extended Handycipher — Part 3 II 3 1101
210 Extended Handycipher — Part 2 II 3 1101
211 ElsieFour — Part 1 III 2 13760
212 Unknown Author X 2 var
213 Weakened ElsieFour — Part 3 II 2 1124
214 Extended Handycipher — Part 6 III 2 13542
215 Double Column Transposition X 2 var
216 ORYX Stream Cipher — Part 4b III 2 13320
217 Weakened ElsieFour — Part 1 II 2 1134
218 The T52 Sturgeon Challenge — Part 6 II 2 1199
219 The T52 Sturgeon Challenge — Part 9 II 2 1199
220 The T52 Sturgeon Challenge — Part 8 II 2 1199
221 Handycipher — Part 7 III 2 13626
222 The T52 Sturgeon Challenge — Part 7 II 2 1199
223 The T52 Sturgeon Challenge — Part 11 II 2 1199
224 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
225 The T52 Sturgeon Challenge — Part 5 II 2 1199
226 The T52 Sturgeon Challenge — Part 12 II 2 1199
227 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1110
228 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1089
229 The T52 Sturgeon Challenge — Part 10 II 1 1199
230 Handycipher — Part 10 II 1 1185
231 The Vatican Challenge — Part 4 X 1 var
232 Substitution Cipher with Non-Prefix Codes III 1 13149
233 Beale Ciphers X 1 var
234 Hilly — Part 2 II 1 1125
235 The Heavy T52 Sturgeon Challenge — Part 1 III 0 15002
236 The Heavy T52 Sturgeon Challenge — Part 3 III 0 15200
237 The Heavy T52 Sturgeon Challenge — Part 2 III 0 15064
238 The Vatican Challenge — Part 3 X 0 var
239 "The Road" — Part 2 II 0 1152
240 "The Road" — Part 3 II 0 1152
241 Weakened ElsieFour — Part 2 II 0 1134
242 The Vatican Challenge — Part 5 X 0 var
243 Double Column Transposition Reloaded — Part 1 III 0 13295
244 RSA Factoring Challenge: RSA-330 III 0 13182
245 RSA Factoring Challenge: RSA-340 III 0 13182
246 RSA Factoring Challenge: RSA-320 III 0 13182
247 RSA Factoring Challenge: RSA-310 III 0 13182
248 RSA Factoring Challenge: RSA-309 III 0 13182
249 RSA Factoring Challenge: RSA-1024 III 0 13182
250 RSA Factoring Challenge: RSA-350 III 0 13182
251 RSA Factoring Challenge: RSA-360 III 0 13182
252 RSA Factoring Challenge: RSA-400 III 0 13182
253 RSA Factoring Challenge: RSA-410 III 0 13182
254 RSA Factoring Challenge: RSA-390 III 0 13182
255 RSA Factoring Challenge: RSA-380 III 0 13182
256 RSA Factoring Challenge: RSA-370 III 0 13182
257 RSA Factoring Challenge: RSA-300 III 0 13182
258 RSA Factoring Challenge: RSA-290 III 0 13182
259 Digital Signatures: DSA with Medium Fields III 0 13160
260 World Record Challenge: Break 65 Bits of AES III 0 13119
261 Kaskade-S/T — Part 4 II 0 1086
262 Twelve-Year-Old Murder Case X 0 var
263 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13130
264 The third ENIGMA M4 message X 0 var
265 RSA Factoring Challenge: RSA-232 III 0 13182
266 RSA Factoring Challenge: RSA-896 III 0 13182
267 RSA Factoring Challenge: RSA-280 III 0 13182
268 RSA Factoring Challenge: RSA-270 III 0 13182
269 RSA Factoring Challenge: RSA-260 III 0 13182
270 RSA Factoring Challenge: RSA-250 III 0 13182
271 RSA Factoring Challenge: RSA-420 III 0 13182
272 RSA Factoring Challenge: RSA-430 III 0 13182
273 ORYX Stream Cipher — Part 4c III 0 13320
274 Double-Column Transposition/Granit — Part 1 II 0 1103
275 Spanish Strip Cipher — Part 3 X 0 var
276 Double Column Transposition Reloaded — Part 3 III 0 13295
277 Double Column Transposition Reloaded — Part 2 III 0 13295
278 Double-Column Transposition/Granit — Part 2 II 0 1103
279 Double-Column Transposition/Granit — Part 3 II 0 1103
280 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1110
281 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1110
282 Weakened Granit — Part 3 II 0 1104
283 Weakened Granit — Part 2 II 0 1104
284 Spirale — Part 4 III 0 13441
285 D'Agapeyeff X 0 var
286 ORYX Stream Cipher — Part 4d III 0 13264
287 RSA Factoring Challenge: RSA-1536 III 0 13182
288 RSA Factoring Challenge: RSA-470 III 0 13182
289 RSA Factoring Challenge: RSA-460 III 0 13182
290 RSA Factoring Challenge: RSA-450 III 0 13182
291 RSA Factoring Challenge: RSA-440 III 0 13182
292 RSA Factoring Challenge: RSA-480 III 0 13182
293 RSA Factoring Challenge: RSA-490 III 0 13182
294 Kryptos X 0 var
295 Dorabella X 0 var
296 RSA Factoring Challenge: RSA-2048 III 0 13182
297 RSA Factoring Challenge: RSA-617 III 0 13182
298 RSA Factoring Challenge: RSA-500 III 0 13182
299 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1110
 
 
powered by the CrypTool project  CrypTool

 

   +++    [22:03 - 21.01.2020] KryptoDash69 solved the Level I challenge 'Number Sequence'    +++    [14:16 - 21.01.2020] lim0n solved the Level II challenge 'A really long number sequence'    +++    [12:40 - 21.01.2020] Codebrecher solved the Level I challenge 'Grille Cipher'    +++    [11:02 - 21.01.2020] xmenxmen2777 solved the Level I challenge 'Original Caesar Cipher'    +++    [10:55 - 21.01.2020] Codebrecher solved the Level I challenge 'Number Sequence'    +++