MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

6376
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.

In addition MysteryTwister C3 offers various raffles each month. You can find information about the current raffle here. For example it’s possible to win Amazon coupons, trophies, coffee cups or T-shirts.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2266 100
2 Original Caesar Cipher I 1416 100
3 Number Sequence — Part 2 I 985 100
4 Caesar Encryption I 764 100
5 Beaver Code I 514 100
6 Letter to the Templars — Part 1 I 461 100
7 Number Sequence — Part 3 I 452 100
8 Letter to the Templars — Part 2 I 381 100
9 Number Sequence — Part 4 I 363 100
10 Monoalphabetic Substitution I 359 100
11 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 311 100
12 A hidden word I 294 100
13 Factorization Cipher — Part 1 I 279 100
14 Letter to the Templars — Part 3 II 271 1118
15 Homophonic Encryption Part 1 I 251 100
16 Grille Cipher I 240 100
17 Homophonic Encryption Part 2 I 220 100
18 Cracking SHA1-Hashed Passwords II 200 1105
19 One-Time Pad with Flaws I 199 100
20 Snow White and the seven dwarfs I 167 100
21 Alice's Birthday Party (Part 1) II 152 1102
22 Alice's Birthday Party (Part 2) II 142 1102
23 Reserve Hand Procedure — Part 1 I 128 100
24 Modified Caesar Cipher I 124 100
25 From Russia with Love I 121 100
26 Letter from the Alleged Countess Julie von Ortenburg I 117 100
27 How do you become a big cryptographer? I 116 100
28 Classical Ciphers^3 I 113 100
29 Broadcasting and low exponent — RSA-Attack II 103 1107
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 101 1102
31 Not-so-Secret Message from Malawi — Part I (RSA) II 100 1102
32 Pigpen with a twist — Part 1 I 92 100
33 Hybrid Encryption I II 91 1102
34 Enigma Messages with Repeated Letters — Part 1 I 91 100
35 The Book Code: A Challenge for Bookworms I 87 100
36 RSA: Two different keys — same ciphertext II 86 1107
37 Enigma Part 1 II 86 1102
38 Molehunt (Part 1/3) I 85 100
39 A Secret Message from Castle Mansfeld I 85 100
40 Molehunt (Part 2/3) I 84 100
41 Factorization Cipher — Part 2 II 81 1110
42 M-138 — Part 1 I 81 101
43 Nils away on travel I 80 100
44 A really long number sequence II 76 1108
45 Kaskade-S/T — Part 1 I 74 100
46 Trifid Cipher I 73 100
47 ¿No Hablas Español? No problemo! I 68 100
48 Enigma Combinatorics I 67 100
49 ADFGVX — Part 2 I 66 100
50 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 63 100
51 ADFGVX — Part 1 I 58 100
52 Zodiac Cipher I 58 100
53 Playfair Encryption I 57 100
54 ECDH-Key Exchange for Beginners I 57 100
55 Double Columnar Transposition I 56 100
56 Playfair with hints about the grid I 55 100
57 ORYX Stream Cipher Part I II 55 1102
58 Enigma Part 2 II 52 1102
59 Factorization Cipher — Part 3 II 49 1110
60 Molehunt (Part 3/3) II 49 1102
61 Smartcard RSA II 48 1102
62 Turing Bombe Enigma I I 47 100
63 M-138 — Part 2 II 46 1189
64 Hill Cipher with Sudoku Key I 44 100
65 Heartbleed — Part 1 I 44 100
66 BCR code (Book-Caesar-RSA) II 43 1117
67 Enigma Messages with Repeated Letters — Part 2 I 42 100
68 Partial Key Exposure with RSA — Part 1 II 42 1111
69 Cascading Encryption — Part 1/3 I 41 100
70 Enigma Messages with Repeated Letters — Part 3 I 40 100
71 Multilingual Monoalphabetic Substitution I 39 100
72 Enigma Messages I 39 100
73 Number Sequence — Part 5 I 39 100
74 Enigma Messages with Repeated Letters — Part 5 I 37 100
75 An Invisible Message I 37 100
76 AES key — encoded in the machine readable zone of a European ePassport II 37 1111
77 Kaskade-S/T — Part 2 II 35 1104
78 The Last Note I 35 100
79 Recycled One-Time Pad I 33 100
80 Enigma Messages with Repeated Letters — Part 4 I 33 100
81 Heartbleed — Part 2 I 31 100
82 Unusual encryption using a diophantine equation II 30 1108
83 Keyshanc — Part 1 II 30 1114
84 Monoalphabetic substitution with camouflage — Part 1 I 30 100
85 Music Code — Part 1 I 28 100
86 ORYX Stream Cipher Part II II 28 1102
87 Music Code — Part 2 II 28 1105
88 Strange Message from Thessaloniki I 28 100
89 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 27 1103
90 RSA Factoring Challenge: RSA-704 II 27 0
91 Number Sequence — Part 6 I 26 101
92 Unconcealed RSA messages II 25 1109
93 A hidden word — Part 2 I 24 101
94 Monoalphabetic substitution with camouflage — Part 4 I 24 100
95 Pigpen with a twist — Part 2 II 24 1108
96 Keyshanc — Part 2 II 23 1114
97 Not-so-Secret Message from Malawi — Part II (ECC) II 23 1102
98 An 'unhearable' message I 22 100
99 Ku Klux Klan X 22 var
100 Monoalphabetic substitution with camouflage — Part 2 II 22 1110
101 Kaskade-S/T — Part 3 II 21 1104
102 Monoalphabetic substitution with camouflage — Part 3 II 21 1110
103 Pigpen with a twist — Part 3 II 20 1108
104 Number Sequence — Part 7 I 19 101
105 CMEA 1 II 19 1102
106 Double Column Transposition — Part 4 II 18 1152
107 Double Column Transposition — Part 2 II 18 1150
108 RSA Factoring Challenge: RSA-210 II 17 0
109 Lattice Part 1 II 16 1104
110 CMEA 2 III 15 13424
111 ORYX Stream Cipher — Part 3 (revised) II 15 1128
112 RSA with Special d III 14 13410
113 Typex — Part 1 II 14 1123
114 Monoalphabetic Substitution with Camouflage — Part 5 II 14 1112
115 M-138 — Part 3 II 14 1189
116 Typex — Part 2 II 13 1125
117 Double Column Transposition — Part 3 II 13 1150
118 Spanish Strip Cipher — Part 1 II 13 1146
119 Heartbleed — Part 3 II 12 1164
120 Double Column Transposition — Part 1 II 12 1147
121 Spanish Strip Cipher — Part 2 II 11 1146
122 Purple 1 II 10 1102
123 Concealed Messages — Vigenère's Night Sky X 10 var
124 Cascading Encryption — Part 2/3 II 9 1124
125 Cascading Encryption — Part 3/3 II 9 1124
126 Sigaba Part 1 II 7 1102
127 Akelarre Part 1 II 6 1102
128 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 6 1105
129 Kaskade-S/T — Part 5 II 6 1105
130 Weakened Handycipher — Part 3 II 5 1276
131 M-138 — Part 4 II 4 1189
132 Double Column Transposition — Part 5 II 4 1156
133 Weakened Handycipher — Part 1 II 4 1276
134 Weakened Handycipher — Part 2 II 4 1276
135 Notes of an Italian Soldier X 4 var
136 ORYX Stream Cipher — Part 4a II 3 1148
137 Double Column Transposition X 2 var
138 Handycipher — Part 1 II 1 1215
139 Beale Ciphers X 1 var
140 Handycipher — Part 3 III 1 14928
141 Unknown Author X 1 var
142 Handycipher — Part 2 II 1 1215
143 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1115
144 Substitution Cipher with Non-Prefix Codes III 1 13480
145 ORYX Stream Cipher — Part 4b III 1 14101
146 Sigaba Part 2 III 1 13410
147 Double Column Transposition Reloaded — Part 2 III 0 13964
148 Double Column Transposition Reloaded — Part 3 III 0 13964
149 Double-Column Transposition/Granit — Part 2 II 0 1547
150 Double-Column Transposition/Granit — Part 3 II 0 1547
151 Double Column Transposition Reloaded — Part 1 III 0 13964
152 Double-Column Transposition/Granit — Part 1 II 0 1547
153 ORYX Stream Cipher — Part 4c III 0 14101
154 Extended Handycipher — Part 3 II 0 1229
155 Extended Handycipher — Part 1 II 0 1229
156 Spanish Strip Cipher — Part 3 X 0 var
157 Extended Handycipher — Part 2 II 0 1229
158 RSA Factoring Challenge: RSA-330 III 0 13563
159 RSA Factoring Challenge: RSA-260 III 0 13563
160 RSA Factoring Challenge: RSA-250 III 0 13563
161 RSA Factoring Challenge: RSA-240 III 0 13563
162 RSA Factoring Challenge: RSA-232 III 0 13563
163 RSA Factoring Challenge: RSA-270 III 0 13563
164 RSA Factoring Challenge: RSA-896 III 0 13563
165 RSA Factoring Challenge: RSA-309 III 0 13563
166 RSA Factoring Challenge: RSA-300 III 0 13563
167 RSA Factoring Challenge: RSA-290 III 0 13563
168 RSA Factoring Challenge: RSA-280 III 0 13563
169 RSA Factoring Challenge: RSA-230 II 0 1111
170 RSA Factoring Challenge: RSA-220 II 0 1111
171 World Record Challenge: Break 65 Bits of AES III 0 13410
172 Kryptos X 0 var
173 Dorabella X 0 var
174 D'Agapeyeff X 0 var
175 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13435
176 Twelve-Year-Old Murder Case X 0 var
177 The third ENIGMA M4 message X 0 var
178 Digital Signatures: DSA with Medium Fields III 0 13506
179 Kaskade-S/T — Part 4 II 0 1105
180 RSA Factoring Challenge: RSA-1024 III 0 13563
181 RSA Factoring Challenge: RSA-310 III 0 13563
182 RSA Factoring Challenge: RSA-1536 III 0 13563
183 RSA Factoring Challenge: RSA-460 III 0 13563
184 RSA Factoring Challenge: RSA-450 III 0 13563
185 RSA Factoring Challenge: RSA-440 III 0 13563
186 RSA Factoring Challenge: RSA-470 III 0 13563
187 RSA Factoring Challenge: RSA-480 III 0 13563
188 RSA Factoring Challenge: RSA-2048 III 0 13563
189 RSA Factoring Challenge: RSA-617 III 0 13563
190 RSA Factoring Challenge: RSA-500 III 0 13563
191 RSA Factoring Challenge: RSA-490 III 0 13563
192 RSA Factoring Challenge: RSA-430 III 0 13563
193 RSA Factoring Challenge: RSA-420 III 0 13563
194 RSA Factoring Challenge: RSA-360 III 0 13563
195 RSA Factoring Challenge: RSA-350 III 0 13563
196 RSA Factoring Challenge: RSA-340 III 0 13563
197 RSA Factoring Challenge: RSA-320 III 0 13563
198 RSA Factoring Challenge: RSA-370 III 0 13563
199 RSA Factoring Challenge: RSA-380 III 0 13563
200 RSA Factoring Challenge: RSA-410 III 0 13563
201 RSA Factoring Challenge: RSA-400 III 0 13563
202 RSA Factoring Challenge: RSA-390 III 0 13563
203 ORYX Stream Cipher — Part 4d III 0 13826
 
 
powered by the CrypTool project  CrypTool

 

   +++    [15:10 - 07.07.2015] Destranix solved the Level I challenge 'A hidden word'    +++    [11:56 - 07.07.2015] Millie82 solved the Level I challenge 'Trifid Cipher'    +++    [10:12 - 07.07.2015] God Delusion solved the Level I challenge 'Number Sequence'    +++    [10:01 - 07.07.2015] God Delusion solved the Level II challenge 'Letter to the Templars — Part 3'    +++    [08:14 - 07.07.2015] nector solved the Level I challenge 'Number Sequence — Part 2'    +++