MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

6269
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.

In addition MysteryTwister C3 offers various raffles each month. You can find information about the current raffle here. For example it’s possible to win Amazon coupons, trophies, coffee cups or T-shirts.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2219 100
2 Original Caesar Cipher I 1391 100
3 Number Sequence — Part 2 I 964 100
4 Caesar Encryption I 751 100
5 Beaver Code I 501 100
6 Letter to the Templars — Part 1 I 449 100
7 Number Sequence — Part 3 I 445 100
8 Letter to the Templars — Part 2 I 370 100
9 Monoalphabetic Substitution I 355 100
10 Number Sequence — Part 4 I 353 100
11 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 304 100
12 A hidden word I 285 100
13 Factorization Cipher — Part 1 I 274 100
14 Letter to the Templars — Part 3 II 263 1120
15 Homophonic Encryption Part 1 I 247 100
16 Grille Cipher I 234 100
17 Homophonic Encryption Part 2 I 216 100
18 Cracking SHA1-Hashed Passwords II 197 1105
19 One-Time Pad with Flaws I 194 100
20 Snow White and the seven dwarfs I 164 100
21 Alice's Birthday Party (Part 1) II 150 1102
22 Alice's Birthday Party (Part 2) II 141 1102
23 Reserve Hand Procedure — Part 1 I 125 100
24 Modified Caesar Cipher I 122 100
25 From Russia with Love I 120 100
26 Letter from the Alleged Countess Julie von Ortenburg I 115 100
27 How do you become a big cryptographer? I 114 100
28 Classical Ciphers^3 I 112 100
29 Broadcasting and low exponent — RSA-Attack II 103 1108
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 101 1102
31 Not-so-Secret Message from Malawi — Part I (RSA) II 99 1102
32 Hybrid Encryption I II 91 1103
33 Pigpen with a twist — Part 1 I 91 100
34 Enigma Messages with Repeated Letters — Part 1 I 87 100
35 RSA: Two different keys — same ciphertext II 86 1108
36 The Book Code: A Challenge for Bookworms I 86 100
37 Enigma Part 1 II 85 1102
38 A Secret Message from Castle Mansfeld I 84 100
39 Molehunt (Part 1/3) I 84 100
40 Molehunt (Part 2/3) I 83 100
41 Factorization Cipher — Part 2 II 80 1111
42 Nils away on travel I 77 100
43 A really long number sequence II 76 1109
44 M-138 — Part 1 I 75 101
45 Kaskade-S/T — Part 1 I 74 100
46 Trifid Cipher I 71 100
47 ¿No Hablas Español? No problemo! I 67 100
48 Enigma Combinatorics I 66 100
49 ADFGVX — Part 2 I 65 100
50 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 63 100
51 ADFGVX — Part 1 I 57 100
52 ECDH-Key Exchange for Beginners I 57 100
53 Double Columnar Transposition I 56 100
54 Playfair Encryption I 56 100
55 Zodiac Cipher I 56 100
56 ORYX Stream Cipher Part I II 54 1102
57 Playfair with hints about the grid I 53 100
58 Enigma Part 2 II 51 1102
59 Molehunt (Part 3/3) II 49 1102
60 Factorization Cipher — Part 3 II 49 1112
61 Smartcard RSA II 48 1103
62 Turing Bombe Enigma I I 47 100
63 Hill Cipher with Sudoku Key I 44 100
64 BCR code (Book-Caesar-RSA) II 43 1119
65 M-138 — Part 2 II 42 1204
66 Partial Key Exposure with RSA — Part 1 II 42 1112
67 Heartbleed — Part 1 I 41 100
68 Cascading Encryption — Part 1/3 I 40 100
69 Number Sequence — Part 5 I 39 100
70 Enigma Messages with Repeated Letters — Part 2 I 38 100
71 An Invisible Message I 37 100
72 Enigma Messages I 37 100
73 AES key — encoded in the machine readable zone of a European ePassport II 37 1112
74 Multilingual Monoalphabetic Substitution I 37 100
75 Enigma Messages with Repeated Letters — Part 3 I 36 100
76 Kaskade-S/T — Part 2 II 35 1105
77 Enigma Messages with Repeated Letters — Part 5 I 33 100
78 Recycled One-Time Pad I 33 100
79 The Last Note I 32 100
80 Unusual encryption using a diophantine equation II 30 1109
81 Keyshanc — Part 1 II 30 1115
82 Enigma Messages with Repeated Letters — Part 4 I 29 100
83 Heartbleed — Part 2 I 29 100
84 Monoalphabetic substitution with camouflage — Part 1 I 29 100
85 Music Code — Part 1 I 28 100
86 Strange Message from Thessaloniki I 28 100
87 Music Code — Part 2 II 28 1106
88 RSA Factoring Challenge: RSA-704 II 27 0
89 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 27 1104
90 ORYX Stream Cipher Part II II 27 1102
91 Unconcealed RSA messages II 25 1110
92 Monoalphabetic substitution with camouflage — Part 4 I 24 100
93 Number Sequence — Part 6 I 23 102
94 Not-so-Secret Message from Malawi — Part II (ECC) II 23 1102
95 Pigpen with a twist — Part 2 II 23 1109
96 Keyshanc — Part 2 II 23 1115
97 A hidden word — Part 2 I 23 103
98 Monoalphabetic substitution with camouflage — Part 2 II 22 1111
99 Ku Klux Klan X 22 var
100 An 'unhearable' message I 22 100
101 Monoalphabetic substitution with camouflage — Part 3 II 21 1111
102 Kaskade-S/T — Part 3 II 21 1105
103 Pigpen with a twist — Part 3 II 20 1109
104 CMEA 1 II 19 1103
105 Double Column Transposition — Part 2 II 18 1155
106 Double Column Transposition — Part 4 II 18 1157
107 RSA Factoring Challenge: RSA-210 II 17 0
108 Number Sequence — Part 7 I 17 102
109 Lattice Part 1 II 16 1105
110 ORYX Stream Cipher — Part 3 (revised) II 15 1130
111 CMEA 2 III 15 13436
112 M-138 — Part 3 II 14 1204
113 Monoalphabetic Substitution with Camouflage — Part 5 II 14 1113
114 RSA with Special d III 14 13422
115 Typex — Part 1 II 14 1125
116 Typex — Part 2 II 13 1127
117 Spanish Strip Cipher — Part 1 II 13 1151
118 Double Column Transposition — Part 3 II 13 1155
119 Heartbleed — Part 3 II 12 1172
120 Double Column Transposition — Part 1 II 12 1152
121 Spanish Strip Cipher — Part 2 II 10 1151
122 Purple 1 II 10 1103
123 Concealed Messages — Vigenère's Night Sky X 10 var
124 Cascading Encryption — Part 2/3 II 9 1126
125 Cascading Encryption — Part 3/3 II 8 1127
126 Sigaba Part 1 II 7 1102
127 Akelarre Part 1 II 6 1103
128 Kaskade-S/T — Part 5 II 6 1106
129 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 6 1106
130 M-138 — Part 4 II 4 1204
131 Double Column Transposition — Part 5 II 4 1161
132 Notes of an Italian Soldier X 4 var
133 ORYX Stream Cipher — Part 4a II 3 1153
134 Weakened Handycipher — Part 2 II 3 1469
135 Weakened Handycipher — Part 1 II 3 1469
136 Weakened Handycipher — Part 3 II 3 1469
137 Double Column Transposition X 2 var
138 Beale Ciphers X 1 var
139 Sigaba Part 2 III 1 13422
140 Unknown Author X 1 var
141 ORYX Stream Cipher — Part 4b III 1 14164
142 Substitution Cipher with Non-Prefix Codes III 1 13495
143 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1116
144 Extended Handycipher — Part 1 II 0 1275
145 ORYX Stream Cipher — Part 4d III 0 13859
146 Handycipher — Part 1 II 0 1246
147 Handycipher — Part 2 II 0 1246
148 Handycipher — Part 3 III 0 15265
149 ORYX Stream Cipher — Part 4c III 0 14164
150 Spanish Strip Cipher — Part 3 X 0 var
151 Extended Handycipher — Part 2 II 0 1275
152 Double Column Transposition Reloaded — Part 1 III 0 14010
153 Double Column Transposition Reloaded — Part 2 III 0 14010
154 Double Column Transposition Reloaded — Part 3 III 0 14010
155 Extended Handycipher — Part 3 II 0 1275
156 RSA Factoring Challenge: RSA-310 III 0 13581
157 RSA Factoring Challenge: RSA-260 III 0 13581
158 RSA Factoring Challenge: RSA-250 III 0 13581
159 RSA Factoring Challenge: RSA-240 III 0 13581
160 RSA Factoring Challenge: RSA-232 III 0 13581
161 RSA Factoring Challenge: RSA-270 III 0 13581
162 RSA Factoring Challenge: RSA-896 III 0 13581
163 RSA Factoring Challenge: RSA-309 III 0 13581
164 RSA Factoring Challenge: RSA-300 III 0 13581
165 RSA Factoring Challenge: RSA-290 III 0 13581
166 RSA Factoring Challenge: RSA-280 III 0 13581
167 RSA Factoring Challenge: RSA-230 II 0 1112
168 RSA Factoring Challenge: RSA-220 II 0 1112
169 World Record Challenge: Break 65 Bits of AES III 0 13422
170 Kryptos X 0 var
171 Dorabella X 0 var
172 D'Agapeyeff X 0 var
173 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13448
174 Twelve-Year-Old Murder Case X 0 var
175 The third ENIGMA M4 message X 0 var
176 Digital Signatures: DSA with Medium Fields III 0 13521
177 Kaskade-S/T — Part 4 II 0 1106
178 RSA Factoring Challenge: RSA-1024 III 0 13581
179 RSA Factoring Challenge: RSA-320 III 0 13581
180 RSA Factoring Challenge: RSA-1536 III 0 13581
181 RSA Factoring Challenge: RSA-460 III 0 13581
182 RSA Factoring Challenge: RSA-450 III 0 13581
183 RSA Factoring Challenge: RSA-440 III 0 13581
184 RSA Factoring Challenge: RSA-470 III 0 13581
185 RSA Factoring Challenge: RSA-480 III 0 13581
186 RSA Factoring Challenge: RSA-617 III 0 13581
187 RSA Factoring Challenge: RSA-500 III 0 13581
188 RSA Factoring Challenge: RSA-490 III 0 13581
189 RSA Factoring Challenge: RSA-430 III 0 13581
190 RSA Factoring Challenge: RSA-420 III 0 13581
191 RSA Factoring Challenge: RSA-360 III 0 13581
192 RSA Factoring Challenge: RSA-350 III 0 13581
193 RSA Factoring Challenge: RSA-340 III 0 13581
194 RSA Factoring Challenge: RSA-330 III 0 13581
195 RSA Factoring Challenge: RSA-370 III 0 13581
196 RSA Factoring Challenge: RSA-380 III 0 13581
197 RSA Factoring Challenge: RSA-410 III 0 13581
198 RSA Factoring Challenge: RSA-400 III 0 13581
199 RSA Factoring Challenge: RSA-390 III 0 13581
200 RSA Factoring Challenge: RSA-2048 III 0 13581
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:58 - 23.05.2015] El Greco solved the Level II challenge 'Weakened Handycipher — Part 3'    +++    [00:47 - 23.05.2015] EESearch solved the Level I challenge 'A hidden word'    +++    [00:16 - 23.05.2015] Ammonym solved the Level I challenge 'Caesar Encryption'    +++    [00:10 - 23.05.2015] EESearch solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [22:49 - 22.05.2015] EESearch solved the Level I challenge 'Number Sequence — Part 4'    +++