MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9821
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3634 100
2 Original Caesar Cipher I 2466 100
3 Number Sequence — Part 2 I 1741 100
4 Caesar Encryption I 1210 100
5 Beaver Code I 973 100
6 Letter to the Templars — Part 1 I 848 100
7 Number Sequence — Part 3 I 812 100
8 Letter to the Templars — Part 2 I 674 100
9 Number Sequence — Part 4 I 665 100
10 A hidden word I 661 100
11 Letter to the Templars — Part 3 II 560 1091
12 Monoalphabetic Substitution I 476 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 471 100
14 Cracking SHA1-Hashed Passwords II 426 1087
15 Factorization Cipher — Part 1 I 421 100
16 Grille Cipher I 395 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 292 100
20 Number Sequence — Part 8 I 273 100
21 One-Time Pad with Flaws I 267 100
22 Snow White and the seven dwarfs I 251 100
23 Alice's Birthday Party (Part 1) II 248 1085
24 Alice's Birthday Party (Part 2) II 240 1085
25 From Russia with Love I 232 100
26 How do you become a big cryptographer? I 191 100
27 Modified Caesar Cipher I 191 100
28 Broadcasting and low exponent — RSA-Attack II 190 1088
29 Reserve Hand Procedure — Part 1 I 173 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1085
31 M-138 — Part 1 I 164 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Letter from the Alleged Countess Julie von Ortenburg I 157 100
34 Classical Ciphers^3 I 156 100
35 Enigma Messages with Repeated Letters — Part 1 I 153 100
36 Hybrid Encryption I II 140 1086
37 Nils away on travel I 139 100
38 Pigpen with a twist — Part 1 I 137 100
39 RSA: Two different keys — same ciphertext II 136 1088
40 The Book Code: A Challenge for Bookworms I 127 100
41 Factorization Cipher — Part 2 II 125 1089
42 Molehunt (Part 1/3) I 124 100
43 ¿No Hablas Español? No problemo! I 123 100
44 Molehunt (Part 2/3) I 122 100
45 Enigma Part 1 II 116 1085
46 A Secret Message from Castle Mansfeld I 112 100
47 Trifid Cipher I 107 100
48 A really long number sequence II 105 1088
49 ADFGVX — Part 2 I 103 100
50 Number Sequence — Part 6 I 102 100
51 M-138 — Part 2 II 102 1102
52 Image Noise I 101 100
53 Kaskade-S/T — Part 1 I 97 100
54 ADFGVX — Part 1 I 94 100
55 Playfair Encryption I 93 100
56 Double Columnar Transposition I 89 100
57 Enigma Combinatorics I 89 100
58 Playfair with hints about the grid I 89 100
59 Heartbleed — Part 1 I 87 100
60 Autokey Cipher I 87 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 85 100
62 ECDH-Key Exchange for Beginners I 82 100
63 Factorization Cipher — Part 3 II 80 1089
64 A hidden word — Part 2 I 79 100
65 ORYX Stream Cipher Part I II 76 1085
66 The Last Note I 75 100
67 Zodiac Cipher I 75 100
68 Enigma Part 2 II 75 1085
69 Partial Key Exposure with RSA — Part 1 II 72 1089
70 Cryptanalysis Hacking Puzzles — Part 2 I 71 100
71 Hill Cipher with Sudoku Key I 71 100
72 Number Sequence — Part 5 I 70 100
73 Number Sequence — Part 10 I 70 100
74 Molehunt (Part 3/3) II 69 1085
75 Enigma Messages with Repeated Letters — Part 3 I 68 100
76 Number Sequence — Part 9 I 68 100
77 Enigma Messages with Repeated Letters — Part 2 I 67 100
78 Enigma Messages I 67 100
79 Enigma Messages with Repeated Letters — Part 5 I 65 100
80 Smartcard RSA II 64 1085
81 BCR code (Book-Caesar-RSA) II 64 1091
82 Multilingual Monoalphabetic Substitution I 63 100
83 Cascading Encryption — Part 1/3 I 62 100
84 AES key — encoded in the machine readable zone of a European ePassport II 60 1089
85 Turing Bombe Enigma I I 59 100
86 Number Sequence — Part 7 I 59 100
87 Heartbleed — Part 2 I 59 100
88 Enigma Messages with Repeated Letters — Part 4 I 59 100
89 Unusual encryption using a diophantine equation II 55 1088
90 Recycled One-Time Pad I 54 100
91 Monoalphabetic substitution with camouflage — Part 1 I 54 100
92 An Invisible Message I 52 100
93 Kaskade-S/T — Part 2 II 48 1086
94 M-138 — Part 3 II 47 1102
95 The Einstein Enigma II 45 1137
96 ORYX Stream Cipher Part II II 44 1085
97 New Year's Greetings — Part 1 I 44 100
98 Unconcealed RSA messages II 44 1088
99 Monoalphabetic substitution with camouflage — Part 2 II 43 1089
100 News from Castle Mansfeld I 42 100
101 Monoalphabetic substitution with camouflage — Part 4 I 41 100
102 Keyshanc — Part 1 II 41 1090
103 New Year's Greetings — Part 2 I 41 100
104 RSA Factoring Challenge: RSA-704 II 40 0
105 Monoalphabetic substitution with camouflage — Part 3 II 40 1089
106 Strange Message from Thessaloniki I 40 100
107 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1086
108 Weakened Granit — Part 1 I 38 100
109 New Year's Greetings — Part 3 I 38 100
110 Music Code — Part 1 I 37 100
111 An 'unhearable' message I 37 100
112 Music Code — Part 2 II 37 1087
113 New Year's Greetings — Part 4 I 36 100
114 Double Column Transposition — Part 4 II 36 1098
115 Pigpen with a twist — Part 2 II 36 1088
116 Ku Klux Klan X 36 var
117 Modular Sequences I 35 100
118 CMEA 1 II 35 1086
119 Double Column Transposition — Part 2 II 35 1098
120 Summer Job II 34 1147
121 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1085
122 RSA Factoring Challenge: RSA-210 II 33 0
123 Advent-Challenge — Part 2 II 32 1134
124 Keyshanc — Part 2 II 32 1090
125 Pigpen with a twist — Part 3 II 32 1088
126 Double Column Transposition — Part 3 II 31 1098
127 ORYX Stream Cipher — Part 3 (revised) II 29 1094
128 Advent Challenge — Part 4 II 29 1134
129 Kaskade-S/T — Part 3 II 29 1086
130 Trendy Messenger II 28 1147
131 Heartbleed — Part 3 II 28 1100
132 Advent Challenge — Part 3 II 28 1134
133 Fastest in the West II 26 1147
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1089
135 CMEA 2 III 24 13141
136 Lattice Part 1 II 24 1086
137 Double Column Transposition — Part 1 II 23 1098
138 Spanish Strip Cipher — Part 1 II 23 1098
139 RSA with Special d III 21 13134
140 Typex — Part 1 II 21 1093
141 Homophonic Encryption — Part 1 II 21 1209
142 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
143 Spanish Strip Cipher — Part 2 II 19 1098
144 RSA Factoring Challenge: RSA-220 II 19 0
145 Monoalphabetic Substitution with Nostradamus Flavor II 19 1184
146 Typex — Part 2 II 18 1093
147 Homophonic Encryption — Part 2 II 18 1211
148 Handycipher made in love — Part 1 II 18 1184
149 Homophonic Encryption — Part 3 II 17 1211
150 RSA Factoring Challenge: RSA-230 II 16 0
151 M-138 — Part 4 II 16 1102
152 Concealed Messages — Vigenère's Night Sky X 16 var
153 Weakened Handycipher — Part 1 II 15 1104
154 Purple 1 II 15 1085
155 Breaking a Filter Generator II 14 1158
156 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1113
157 Weakened Handycipher — Part 3 II 14 1104
158 New Year's Greetings — Part 5 II 14 1110
159 AES ECB Wrong Encoding II 14 1134
160 Weakened Handycipher — Part 2 II 13 1104
161 Handycipher made in love — Part 2 II 13 1218
162 Homophonic Encryption — Part 4 II 12 1211
163 Flawed Usage of a OTP Cipher by the BND II 12 1106
164 A Cloaked Substitution Cipher — Part 1 II 12 1341
165 Sigaba Part 1 II 12 1085
166 Cascading Encryption — Part 2/3 II 11 1093
167 Cascading Encryption — Part 3/3 II 11 1093
168 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
169 ORYX Stream Cipher — Part 4a II 11 1098
170 A Cloaked Substitution Cipher — Part 2 II 11 1357
171 Kaskade-S/T — Part 5 II 10 1087
172 Akelarre Part 1 II 9 1086
173 Hilly — Part 1 II 8 1119
174 Double Column Transposition — Part 5 II 7 1099
175 Handycipher — Part 2 II 7 1103
176 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1125
177 Handycipher — Part 3 III 6 13428
178 Weakened Handycipher — Part 5 II 5 1113
179 Weakened Handycipher — Part 6 II 5 1113
180 Handycipher — Part 1 II 5 1103
181 Weakened Handycipher — Part 4 II 5 1113
182 Handycipher — Part 5 III 5 13591
183 Handycipher — Part 6 III 5 13591
184 Notes of an Italian Soldier X 4 var
185 Holographic Encryption — Part 1 II 4 1122
186 Handycipher — Part 4 III 4 13591
187 Extended Handycipher — Part 3 II 3 1103
188 Extended Handycipher — Part 2 II 3 1103
189 Handycipher — Part 9 III 3 13686
190 Spirale — Part 3 II 3 1106
191 Sigaba Part 2 III 3 13134
192 Extended Handycipher — Part 1 II 3 1103
193 The Vatican Challenge — Part 2 X 3 var
194 Extended Handycipher — Part 4 III 3 13591
195 Extended Handycipher — Part 5 III 3 13591
196 Spirale — Part 2 II 3 1106
197 Spirale — Part 1 II 3 1106
198 Handycipher — Part 8 III 3 13686
199 The Vatican Challenge — Part 1 X 3 var
200 The T52 Sturgeon Challenge — Part 1 II 3 1260
201 "The Road" — Part 1 II 3 1169
202 Weakened ElsieFour — Part 3 II 2 1130
203 Extended Handycipher — Part 6 III 2 13591
204 ElsieFour — Part 1 III 2 13843
205 Holographic Encryption — Part 2 II 2 1122
206 Handycipher — Part 7 III 2 13686
207 Double Column Transposition X 2 var
208 The T52 Sturgeon Challenge — Part 8 II 2 1307
209 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
210 The T52 Sturgeon Challenge — Part 4 II 2 1272
211 The T52 Sturgeon Challenge — Part 3 II 2 1272
212 The T52 Sturgeon Challenge — Part 2 II 2 1272
213 The T52 Sturgeon Challenge — Part 12 II 2 1307
214 The T52 Sturgeon Challenge — Part 11 II 2 1307
215 The T52 Sturgeon Challenge — Part 6 II 2 1307
216 The T52 Sturgeon Challenge — Part 5 II 2 1307
217 Unknown Author X 2 var
218 The T52 Sturgeon Challenge — Part 7 II 2 1307
219 ORYX Stream Cipher — Part 4b III 2 13347
220 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1113
221 The T52 Sturgeon Challenge — Part 10 II 1 1307
222 The T52 Sturgeon Challenge — Part 9 II 1 1307
223 The Vatican Challenge — Part 4 X 1 var
224 Handycipher — Part 10 II 1 1242
225 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1090
226 Weakened ElsieFour — Part 1 II 1 1143
227 Hilly — Part 2 II 1 1131
228 Substitution Cipher with Non-Prefix Codes III 1 13166
229 Beale Ciphers X 1 var
230 Weakened ElsieFour — Part 2 II 0 1143
231 Dorabella X 0 var
232 Kryptos X 0 var
233 The Vatican Challenge — Part 3 X 0 var
234 D'Agapeyeff X 0 var
235 "The Road" — Part 3 II 0 1169
236 "The Road" — Part 2 II 0 1169
237 The Vatican Challenge — Part 5 X 0 var
238 World Record Challenge: Break 65 Bits of AES III 0 13134
239 RSA Factoring Challenge: RSA-370 III 0 13201
240 RSA Factoring Challenge: RSA-380 III 0 13201
241 RSA Factoring Challenge: RSA-360 III 0 13201
242 RSA Factoring Challenge: RSA-350 III 0 13201
243 RSA Factoring Challenge: RSA-340 III 0 13201
244 RSA Factoring Challenge: RSA-390 III 0 13201
245 RSA Factoring Challenge: RSA-400 III 0 13201
246 RSA Factoring Challenge: RSA-440 III 0 13201
247 RSA Factoring Challenge: RSA-450 III 0 13201
248 RSA Factoring Challenge: RSA-430 III 0 13201
249 RSA Factoring Challenge: RSA-420 III 0 13201
250 RSA Factoring Challenge: RSA-410 III 0 13201
251 RSA Factoring Challenge: RSA-330 III 0 13201
252 RSA Factoring Challenge: RSA-320 III 0 13201
253 RSA Factoring Challenge: RSA-260 III 0 13201
254 RSA Factoring Challenge: RSA-270 III 0 13201
255 RSA Factoring Challenge: RSA-250 III 0 13201
256 RSA Factoring Challenge: RSA-240 III 0 13201
257 RSA Factoring Challenge: RSA-232 III 0 13201
258 RSA Factoring Challenge: RSA-896 III 0 13201
259 RSA Factoring Challenge: RSA-280 III 0 13201
260 RSA Factoring Challenge: RSA-1024 III 0 13201
261 RSA Factoring Challenge: RSA-310 III 0 13201
262 RSA Factoring Challenge: RSA-309 III 0 13201
263 RSA Factoring Challenge: RSA-300 III 0 13201
264 RSA Factoring Challenge: RSA-290 III 0 13201
265 RSA Factoring Challenge: RSA-460 III 0 13201
266 RSA Factoring Challenge: RSA-1536 III 0 13201
267 ORYX Stream Cipher — Part 4c III 0 13347
268 Double-Column Transposition/Granit — Part 1 II 0 1105
269 Spanish Strip Cipher — Part 3 X 0 var
270 Double Column Transposition Reloaded — Part 3 III 0 13320
271 Double Column Transposition Reloaded — Part 2 III 0 13320
272 Double-Column Transposition/Granit — Part 2 II 0 1105
273 Double-Column Transposition/Granit — Part 3 II 0 1105
274 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1113
275 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1113
276 Weakened Granit — Part 3 II 0 1106
277 Weakened Granit — Part 2 II 0 1106
278 Spirale — Part 4 III 0 13479
279 Double Column Transposition Reloaded — Part 1 III 0 13320
280 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13146
281 RSA Factoring Challenge: RSA-500 III 0 13201
282 RSA Factoring Challenge: RSA-617 III 0 13201
283 RSA Factoring Challenge: RSA-490 III 0 13201
284 RSA Factoring Challenge: RSA-480 III 0 13201
285 RSA Factoring Challenge: RSA-470 III 0 13201
286 RSA Factoring Challenge: RSA-2048 III 0 13201
287 The third ENIGMA M4 message X 0 var
288 ORYX Stream Cipher — Part 4d III 0 13287
289 Twelve-Year-Old Murder Case X 0 var
290 Kaskade-S/T — Part 4 II 0 1087
291 Digital Signatures: DSA with Medium Fields III 0 13177
292 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1113
 
 
powered by the CrypTool project  CrypTool

 

   +++    [07:08 - 19.09.2019] Bart13 solved the Level II challenge 'Hilly — Part 1'    +++    [23:59 - 18.09.2019] Byqq!T3qmxxZfRir solved the Level I challenge 'Number Sequence'    +++    [14:21 - 18.09.2019] h4rdl0ck solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [14:15 - 18.09.2019] lim0n solved the Level I challenge 'Image Noise'    +++    [07:21 - 18.09.2019] h4rdl0ck solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++