MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9693
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3573 100
2 Original Caesar Cipher I 2420 100
3 Number Sequence — Part 2 I 1709 100
4 Caesar Encryption I 1196 100
5 Beaver Code I 960 100
6 Letter to the Templars — Part 1 I 839 100
7 Number Sequence — Part 3 I 804 100
8 Letter to the Templars — Part 2 I 667 100
9 Number Sequence — Part 4 I 658 100
10 A hidden word I 643 100
11 Letter to the Templars — Part 3 II 553 1092
12 Monoalphabetic Substitution I 475 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 467 100
14 Cracking SHA1-Hashed Passwords II 418 1087
15 Factorization Cipher — Part 1 I 418 100
16 Grille Cipher I 392 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 280 100
20 One-Time Pad with Flaws I 266 100
21 Number Sequence — Part 8 I 265 100
22 Snow White and the seven dwarfs I 247 100
23 Alice's Birthday Party (Part 1) II 245 1086
24 Alice's Birthday Party (Part 2) II 237 1086
25 From Russia with Love I 231 100
26 How do you become a big cryptographer? I 190 100
27 Broadcasting and low exponent — RSA-Attack II 190 1088
28 Modified Caesar Cipher I 189 100
29 Reserve Hand Procedure — Part 1 I 171 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 164 1086
31 M-138 — Part 1 I 160 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 160 1086
33 Classical Ciphers^3 I 156 100
34 Letter from the Alleged Countess Julie von Ortenburg I 155 100
35 Enigma Messages with Repeated Letters — Part 1 I 150 100
36 Hybrid Encryption I II 139 1086
37 Nils away on travel I 138 100
38 Pigpen with a twist — Part 1 I 135 100
39 RSA: Two different keys — same ciphertext II 134 1088
40 The Book Code: A Challenge for Bookworms I 126 100
41 Factorization Cipher — Part 2 II 125 1089
42 Molehunt (Part 1/3) I 123 100
43 ¿No Hablas Español? No problemo! I 121 100
44 Molehunt (Part 2/3) I 120 100
45 Enigma Part 1 II 116 1086
46 A Secret Message from Castle Mansfeld I 112 100
47 A really long number sequence II 105 1088
48 Trifid Cipher I 105 100
49 ADFGVX — Part 2 I 103 100
50 Number Sequence — Part 6 I 101 100
51 Image Noise I 99 100
52 M-138 — Part 2 II 99 1102
53 Kaskade-S/T — Part 1 I 95 100
54 ADFGVX — Part 1 I 94 100
55 Playfair Encryption I 93 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 89 100
58 Double Columnar Transposition I 88 100
59 Heartbleed — Part 1 I 87 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 85 100
61 ECDH-Key Exchange for Beginners I 81 100
62 Factorization Cipher — Part 3 II 80 1089
63 Autokey Cipher I 80 100
64 A hidden word — Part 2 I 79 100
65 ORYX Stream Cipher Part I II 75 1086
66 Enigma Part 2 II 75 1086
67 Zodiac Cipher I 75 100
68 The Last Note I 75 100
69 Partial Key Exposure with RSA — Part 1 II 72 1090
70 Hill Cipher with Sudoku Key I 70 100
71 Number Sequence — Part 10 I 69 100
72 Number Sequence — Part 5 I 69 100
73 Molehunt (Part 3/3) II 68 1086
74 Number Sequence — Part 9 I 67 100
75 Enigma Messages with Repeated Letters — Part 3 I 67 100
76 Enigma Messages with Repeated Letters — Part 2 I 66 100
77 Enigma Messages I 65 100
78 Smartcard RSA II 64 1086
79 Enigma Messages with Repeated Letters — Part 5 I 64 100
80 BCR code (Book-Caesar-RSA) II 62 1092
81 Cascading Encryption — Part 1/3 I 62 100
82 Multilingual Monoalphabetic Substitution I 61 100
83 Turing Bombe Enigma I I 59 100
84 Heartbleed — Part 2 I 59 100
85 Enigma Messages with Repeated Letters — Part 4 I 58 100
86 Cryptanalysis Hacking Puzzles — Part 2 I 58 101
87 Number Sequence — Part 7 I 58 100
88 AES key — encoded in the machine readable zone of a European ePassport II 58 1089
89 Recycled One-Time Pad I 54 100
90 Monoalphabetic substitution with camouflage — Part 1 I 53 100
91 Unusual encryption using a diophantine equation II 53 1088
92 An Invisible Message I 52 100
93 Kaskade-S/T — Part 2 II 46 1087
94 The Einstein Enigma II 45 1141
95 M-138 — Part 3 II 45 1102
96 Unconcealed RSA messages II 44 1089
97 ORYX Stream Cipher Part II II 43 1086
98 New Year's Greetings — Part 1 I 43 100
99 Monoalphabetic substitution with camouflage — Part 2 II 42 1089
100 News from Castle Mansfeld I 41 100
101 Keyshanc — Part 1 II 41 1091
102 RSA Factoring Challenge: RSA-704 II 40 0
103 Strange Message from Thessaloniki I 40 100
104 Monoalphabetic substitution with camouflage — Part 4 I 40 100
105 Monoalphabetic substitution with camouflage — Part 3 II 39 1089
106 New Year's Greetings — Part 2 I 39 100
107 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1086
108 Weakened Granit — Part 1 I 38 100
109 Music Code — Part 1 I 37 100
110 Music Code — Part 2 II 37 1087
111 An 'unhearable' message I 37 100
112 New Year's Greetings — Part 3 I 36 100
113 Pigpen with a twist — Part 2 II 36 1088
114 Ku Klux Klan X 36 var
115 Double Column Transposition — Part 4 II 36 1099
116 New Year's Greetings — Part 4 I 35 100
117 CMEA 1 II 35 1086
118 Modular Sequences I 34 100
119 Summer Job II 34 1152
120 Double Column Transposition — Part 2 II 34 1099
121 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
122 RSA Factoring Challenge: RSA-210 II 33 0
123 Pigpen with a twist — Part 3 II 32 1088
124 Advent-Challenge — Part 2 II 32 1138
125 Keyshanc — Part 2 II 32 1091
126 Double Column Transposition — Part 3 II 30 1099
127 Advent Challenge — Part 4 II 29 1138
128 Kaskade-S/T — Part 3 II 29 1087
129 ORYX Stream Cipher — Part 3 (revised) II 28 1095
130 Heartbleed — Part 3 II 28 1101
131 Advent Challenge — Part 3 II 28 1138
132 Trendy Messenger II 28 1152
133 CMEA 2 III 24 13148
134 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1090
135 Lattice Part 1 II 24 1087
136 Fastest in the West II 24 1152
137 Spanish Strip Cipher — Part 1 II 23 1098
138 Double Column Transposition — Part 1 II 22 1098
139 Typex — Part 1 II 21 1094
140 RSA with Special d III 21 13141
141 Homophonic Encryption — Part 1 II 20 1247
142 Cryptanalysis Hacking Puzzles — Part 1 I 20 100
143 RSA Factoring Challenge: RSA-220 II 19 0
144 Monoalphabetic Substitution with Nostradamus Flavor II 18 1201
145 Spanish Strip Cipher — Part 2 II 18 1098
146 Typex — Part 2 II 18 1094
147 Homophonic Encryption — Part 2 II 17 1251
148 Handycipher made in love — Part 1 II 17 1201
149 Homophonic Encryption — Part 3 II 16 1251
150 M-138 — Part 4 II 16 1102
151 Concealed Messages — Vigenère's Night Sky X 16 var
152 RSA Factoring Challenge: RSA-230 II 16 0
153 Weakened Handycipher — Part 1 II 15 1105
154 Purple 1 II 15 1086
155 AES ECB Wrong Encoding II 14 1138
156 New Year's Greetings — Part 5 II 14 1112
157 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1115
158 Weakened Handycipher — Part 3 II 14 1105
159 Weakened Handycipher — Part 2 II 13 1105
160 Sigaba Part 1 II 12 1086
161 Breaking a Filter Generator II 12 1166
162 Flawed Usage of a OTP Cipher by the BND II 12 1107
163 Handycipher made in love — Part 2 II 12 1266
164 Cascading Encryption — Part 3/3 II 11 1094
165 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
166 ORYX Stream Cipher — Part 4a II 11 1099
167 Cascading Encryption — Part 2/3 II 11 1094
168 Homophonic Encryption — Part 4 II 11 1251
169 Kaskade-S/T — Part 5 II 10 1087
170 Akelarre Part 1 II 9 1086
171 Handycipher — Part 2 II 7 1104
172 Hilly — Part 1 II 6 1121
173 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1128
174 Handycipher — Part 3 III 6 13444
175 Double Column Transposition — Part 5 II 6 1100
176 Handycipher — Part 1 II 5 1104
177 Handycipher — Part 6 III 5 13615
178 Weakened Handycipher — Part 6 II 5 1115
179 Handycipher — Part 5 III 5 13615
180 Weakened Handycipher — Part 5 II 5 1115
181 Weakened Handycipher — Part 4 II 5 1115
182 Notes of an Italian Soldier X 4 var
183 Holographic Encryption — Part 1 II 4 1124
184 Handycipher — Part 4 III 4 13615
185 Spirale — Part 2 II 3 1107
186 Spirale — Part 1 II 3 1107
187 Extended Handycipher — Part 4 III 3 13615
188 Handycipher — Part 9 III 3 13718
189 Spirale — Part 3 II 3 1107
190 The Vatican Challenge — Part 1 X 3 var
191 Extended Handycipher — Part 5 III 3 13615
192 Sigaba Part 2 III 3 13141
193 The Vatican Challenge — Part 2 X 3 var
194 "The Road" — Part 1 II 3 1181
195 Extended Handycipher — Part 3 II 3 1104
196 Handycipher — Part 8 III 3 13718
197 Extended Handycipher — Part 2 II 3 1104
198 Extended Handycipher — Part 1 II 3 1104
199 Handycipher — Part 7 III 2 13718
200 Double Column Transposition X 2 var
201 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
202 The T52 Sturgeon Challenge — Part 1 II 2 1485
203 Weakened ElsieFour — Part 3 II 2 1133
204 ElsieFour — Part 1 III 2 13888
205 Holographic Encryption — Part 2 II 2 1124
206 Extended Handycipher — Part 6 III 2 13615
207 Unknown Author X 2 var
208 ORYX Stream Cipher — Part 4b III 2 13361
209 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1115
210 Substitution Cipher with Non-Prefix Codes III 1 13174
211 The T52 Sturgeon Challenge — Part 3 II 1 2000
212 Weakened ElsieFour — Part 1 II 1 1148
213 Beale Ciphers X 1 var
214 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1091
215 Hilly — Part 2 II 1 1134
216 The T52 Sturgeon Challenge — Part 2 II 1 2000
217 Handycipher — Part 10 II 1 1344
218 Digital Signatures: DSA with Medium Fields III 0 13186
219 RSA Factoring Challenge: RSA-410 III 0 13209
220 RSA Factoring Challenge: RSA-440 III 0 13209
221 RSA Factoring Challenge: RSA-430 III 0 13209
222 RSA Factoring Challenge: RSA-420 III 0 13209
223 RSA Factoring Challenge: RSA-460 III 0 13209
224 RSA Factoring Challenge: RSA-340 III 0 13209
225 RSA Factoring Challenge: RSA-490 III 0 13209
226 RSA Factoring Challenge: RSA-500 III 0 13209
227 RSA Factoring Challenge: RSA-617 III 0 13209
228 RSA Factoring Challenge: RSA-350 III 0 13209
229 The Vatikan Challenge — Part 3 X 0 var
230 The T52 Sturgeon Challenge — Part 4 II 0 2000
231 The Vatican Challenge — Part 5 X 0 var
232 The Vatican Challenge — Part 4 X 0 var
233 RSA Factoring Challenge: RSA-2048 III 0 13209
234 RSA Factoring Challenge: RSA-470 III 0 13209
235 Dorabella X 0 var
236 RSA Factoring Challenge: RSA-450 III 0 13209
237 D'Agapeyeff X 0 var
238 The third ENIGMA M4 message X 0 var
239 Double Column Transposition Reloaded — Part 1 III 0 13333
240 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13153
241 RSA Factoring Challenge: RSA-1536 III 0 13209
242 "The Road" — Part 3 II 0 1181
243 "The Road" — Part 2 II 0 1181
244 Weakened ElsieFour — Part 2 II 0 1148
245 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1115
246 Double-Column Transposition/Granit — Part 1 II 0 1106
247 RSA Factoring Challenge: RSA-480 III 0 13209
248 ORYX Stream Cipher — Part 4c III 0 13361
249 Double-Column Transposition/Granit — Part 2 II 0 1106
250 Double-Column Transposition/Granit — Part 3 II 0 1106
251 RSA Factoring Challenge: RSA-896 III 0 13209
252 World Record Challenge: Break 65 Bits of AES III 0 13141
253 Spirale — Part 4 III 0 13498
254 RSA Factoring Challenge: RSA-390 III 0 13209
255 RSA Factoring Challenge: RSA-280 III 0 13209
256 RSA Factoring Challenge: RSA-309 III 0 13209
257 RSA Factoring Challenge: RSA-300 III 0 13209
258 RSA Factoring Challenge: RSA-380 III 0 13209
259 RSA Factoring Challenge: RSA-1024 III 0 13209
260 RSA Factoring Challenge: RSA-360 III 0 13209
261 RSA Factoring Challenge: RSA-290 III 0 13209
262 RSA Factoring Challenge: RSA-310 III 0 13209
263 Weakened Granit — Part 2 II 0 1108
264 Weakened Granit — Part 3 II 0 1108
265 RSA Factoring Challenge: RSA-320 III 0 13209
266 Kryptos X 0 var
267 ORYX Stream Cipher — Part 4d III 0 13298
268 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1115
269 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1115
270 Double Column Transposition Reloaded — Part 3 III 0 13333
271 RSA Factoring Challenge: RSA-330 III 0 13209
272 RSA Factoring Challenge: RSA-370 III 0 13209
273 Kaskade-S/T — Part 4 II 0 1087
274 Spanish Strip Cipher — Part 3 X 0 var
275 RSA Factoring Challenge: RSA-250 III 0 13209
276 RSA Factoring Challenge: RSA-260 III 0 13209
277 RSA Factoring Challenge: RSA-270 III 0 13209
278 RSA Factoring Challenge: RSA-240 III 0 13209
279 RSA Factoring Challenge: RSA-232 III 0 13209
280 Twelve-Year-Old Murder Case X 0 var
281 RSA Factoring Challenge: RSA-400 III 0 13209
282 Double Column Transposition Reloaded — Part 2 III 0 13333
 
 
powered by the CrypTool project  CrypTool

 

   +++    [14:32 - 23.07.2019] MarVardoul solved the Level I challenge 'Number Sequence'    +++    [12:53 - 23.07.2019] ludimus solved the Level I challenge 'Modified Caesar Cipher'    +++    [10:23 - 23.07.2019] ludimus solved the Level II challenge 'Not-so-Secret Message from Malawi — Part I (RSA)'    +++    [09:52 - 23.07.2019] yann solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [07:38 - 23.07.2019] Yokozuna solved the Level II challenge 'The T52 Sturgeon Challenge — Part 3'    +++