MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9651
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3552 100
2 Original Caesar Cipher I 2404 100
3 Number Sequence — Part 2 I 1701 100
4 Caesar Encryption I 1187 100
5 Beaver Code I 950 100
6 Letter to the Templars — Part 1 I 828 100
7 Number Sequence — Part 3 I 796 100
8 Letter to the Templars — Part 2 I 657 100
9 Number Sequence — Part 4 I 649 100
10 A hidden word I 636 100
11 Letter to the Templars — Part 3 II 545 1092
12 Monoalphabetic Substitution I 470 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 462 100
14 Factorization Cipher — Part 1 I 414 100
15 Cracking SHA1-Hashed Passwords II 410 1087
16 Grille Cipher I 385 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 346 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 297 100
19 Advent-Challenge — Part 1 I 272 100
20 One-Time Pad with Flaws I 263 100
21 Number Sequence — Part 8 I 259 100
22 Snow White and the seven dwarfs I 243 100
23 Alice's Birthday Party (Part 1) II 240 1086
24 Alice's Birthday Party (Part 2) II 232 1086
25 From Russia with Love I 228 100
26 How do you become a big cryptographer? I 187 100
27 Broadcasting and low exponent — RSA-Attack II 186 1088
28 Modified Caesar Cipher I 185 100
29 Reserve Hand Procedure — Part 1 I 170 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 161 1086
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 158 1086
32 Classical Ciphers^3 I 155 100
33 Letter from the Alleged Countess Julie von Ortenburg I 155 100
34 M-138 — Part 1 I 154 100
35 Enigma Messages with Repeated Letters — Part 1 I 147 100
36 Hybrid Encryption I II 137 1086
37 Nils away on travel I 135 100
38 Pigpen with a twist — Part 1 I 133 100
39 RSA: Two different keys — same ciphertext II 132 1088
40 The Book Code: A Challenge for Bookworms I 126 100
41 Factorization Cipher — Part 2 II 123 1089
42 Molehunt (Part 1/3) I 121 100
43 Molehunt (Part 2/3) I 118 100
44 ¿No Hablas Español? No problemo! I 118 100
45 Enigma Part 1 II 116 1086
46 A Secret Message from Castle Mansfeld I 111 100
47 Trifid Cipher I 104 100
48 A really long number sequence II 104 1089
49 ADFGVX — Part 2 I 101 100
50 Number Sequence — Part 6 I 99 100
51 Image Noise I 96 100
52 M-138 — Part 2 II 95 1103
53 Kaskade-S/T — Part 1 I 94 100
54 ADFGVX — Part 1 I 92 100
55 Playfair Encryption I 92 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 88 100
58 Heartbleed — Part 1 I 87 100
59 Double Columnar Transposition I 86 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 84 100
61 ECDH-Key Exchange for Beginners I 80 100
62 Factorization Cipher — Part 3 II 77 1090
63 Autokey Cipher I 76 100
64 A hidden word — Part 2 I 76 100
65 The Last Note I 75 100
66 Zodiac Cipher I 75 100
67 ORYX Stream Cipher Part I II 75 1086
68 Enigma Part 2 II 74 1086
69 Partial Key Exposure with RSA — Part 1 II 72 1090
70 Hill Cipher with Sudoku Key I 70 100
71 Molehunt (Part 3/3) II 67 1086
72 Enigma Messages with Repeated Letters — Part 3 I 67 100
73 Number Sequence — Part 5 I 66 100
74 Enigma Messages with Repeated Letters — Part 2 I 66 100
75 Number Sequence — Part 10 I 66 100
76 Enigma Messages I 65 100
77 Enigma Messages with Repeated Letters — Part 5 I 64 100
78 Number Sequence — Part 9 I 64 100
79 Smartcard RSA II 63 1086
80 Cascading Encryption — Part 1/3 I 61 100
81 Multilingual Monoalphabetic Substitution I 61 100
82 BCR code (Book-Caesar-RSA) II 61 1092
83 Turing Bombe Enigma I I 59 100
84 Heartbleed — Part 2 I 59 100
85 Enigma Messages with Repeated Letters — Part 4 I 58 100
86 AES key — encoded in the machine readable zone of a European ePassport II 58 1090
87 Number Sequence — Part 7 I 56 100
88 Unusual encryption using a diophantine equation II 53 1089
89 Monoalphabetic substitution with camouflage — Part 1 I 53 100
90 An Invisible Message I 52 100
91 Recycled One-Time Pad I 52 100
92 Cryptanalysis Hacking Puzzles — Part 2 I 50 101
93 Kaskade-S/T — Part 2 II 45 1087
94 Unconcealed RSA messages II 43 1089
95 ORYX Stream Cipher Part II II 43 1086
96 The Einstein Enigma II 43 1144
97 M-138 — Part 3 II 42 1103
98 Monoalphabetic substitution with camouflage — Part 2 II 41 1089
99 News from Castle Mansfeld I 41 100
100 Keyshanc — Part 1 II 41 1091
101 New Year's Greetings — Part 1 I 41 100
102 Strange Message from Thessaloniki I 40 100
103 Monoalphabetic substitution with camouflage — Part 4 I 40 100
104 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1087
105 RSA Factoring Challenge: RSA-704 II 39 0
106 Monoalphabetic substitution with camouflage — Part 3 II 39 1089
107 New Year's Greetings — Part 2 I 38 100
108 Weakened Granit — Part 1 I 38 100
109 Music Code — Part 2 II 37 1088
110 Music Code — Part 1 I 37 100
111 New Year's Greetings — Part 3 I 36 100
112 Ku Klux Klan X 36 var
113 Pigpen with a twist — Part 2 II 36 1089
114 An 'unhearable' message I 36 100
115 New Year's Greetings — Part 4 I 35 100
116 Double Column Transposition — Part 4 II 35 1099
117 CMEA 1 II 34 1086
118 Double Column Transposition — Part 2 II 34 1099
119 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
120 Summer Job II 32 1156
121 RSA Factoring Challenge: RSA-210 II 32 0
122 Pigpen with a twist — Part 3 II 32 1089
123 Keyshanc — Part 2 II 32 1091
124 Modular Sequences I 31 100
125 Advent-Challenge — Part 2 II 31 1139
126 Double Column Transposition — Part 3 II 30 1099
127 Kaskade-S/T — Part 3 II 29 1087
128 Heartbleed — Part 3 II 28 1101
129 ORYX Stream Cipher — Part 3 (revised) II 28 1095
130 Advent Challenge — Part 4 II 28 1140
131 Trendy Messenger II 27 1156
132 Advent Challenge — Part 3 II 27 1140
133 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1090
134 CMEA 2 III 24 13152
135 Lattice Part 1 II 24 1087
136 Fastest in the West II 23 1156
137 Spanish Strip Cipher — Part 1 II 23 1099
138 Double Column Transposition — Part 1 II 22 1099
139 Typex — Part 1 II 21 1094
140 RSA with Special d III 21 13145
141 Cryptanalysis Hacking Puzzles — Part 1 I 19 100
142 Monoalphabetic Substitution with Nostradamus Flavor II 18 1214
143 Typex — Part 2 II 18 1094
144 RSA Factoring Challenge: RSA-220 II 18 0
145 Spanish Strip Cipher — Part 2 II 18 1099
146 Homophonic Encryption — Part 1 II 17 1283
147 Handycipher made in love — Part 1 II 17 1214
148 Concealed Messages — Vigenère's Night Sky X 16 var
149 M-138 — Part 4 II 16 1103
150 Purple 1 II 15 1086
151 Weakened Handycipher — Part 1 II 15 1106
152 Homophonic Encryption — Part 2 II 15 1290
153 Weakened Handycipher — Part 3 II 14 1106
154 AES ECB Wrong Encoding II 14 1139
155 RSA Factoring Challenge: RSA-230 II 14 0
156 Homophonic Encryption — Part 3 II 14 1290
157 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1116
158 New Year's Greetings — Part 5 II 14 1113
159 Weakened Handycipher — Part 2 II 13 1106
160 Sigaba Part 1 II 12 1086
161 Breaking a Filter Generator II 12 1171
162 Handycipher made in love — Part 2 II 12 1321
163 Flawed Usage of a OTP Cipher by the BND II 12 1108
164 Cascading Encryption — Part 2/3 II 11 1094
165 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
166 ORYX Stream Cipher — Part 4a II 11 1099
167 Cascading Encryption — Part 3/3 II 11 1094
168 Kaskade-S/T — Part 5 II 10 1088
169 Akelarre Part 1 II 9 1086
170 Homophonic Encryption — Part 4 II 9 1290
171 Handycipher — Part 3 III 6 13452
172 Handycipher — Part 2 II 6 1104
173 Double Column Transposition — Part 5 II 6 1100
174 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1129
175 Hilly — Part 1 II 6 1122
176 Weakened Handycipher — Part 6 II 5 1115
177 Handycipher — Part 6 III 5 13628
178 Handycipher — Part 1 II 5 1104
179 Weakened Handycipher — Part 4 II 5 1115
180 Weakened Handycipher — Part 5 II 5 1115
181 Handycipher — Part 5 III 5 13628
182 Handycipher — Part 4 III 4 13628
183 Notes of an Italian Soldier X 4 var
184 Holographic Encryption — Part 1 II 3 1125
185 "The Road" — Part 1 II 3 1188
186 The Vatican Challenge — Part 1 X 3 var
187 The Vatikan Challenge — Part 2 X 3 var
188 Handycipher — Part 9 III 3 13733
189 Extended Handycipher — Part 5 III 3 13628
190 Extended Handycipher — Part 4 III 3 13628
191 Handycipher — Part 8 III 3 13733
192 Spirale — Part 3 II 3 1108
193 Spirale — Part 2 II 3 1108
194 Spirale — Part 1 II 3 1108
195 Extended Handycipher — Part 3 II 3 1105
196 Sigaba Part 2 III 3 13145
197 Extended Handycipher — Part 2 II 3 1105
198 Extended Handycipher — Part 1 II 3 1105
199 Double Column Transposition X 2 var
200 ORYX Stream Cipher — Part 4b III 2 13367
201 Extended Handycipher — Part 6 III 2 13628
202 Handycipher — Part 7 III 2 13733
203 Weakened ElsieFour — Part 3 II 2 1135
204 Unknown Author X 2 var
205 Holographic Encryption — Part 2 II 2 1125
206 ElsieFour — Part 1 III 2 13913
207 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
208 Weakened ElsieFour — Part 1 II 1 1151
209 Hilly — Part 2 II 1 1135
210 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1116
211 Substitution Cipher with Non-Prefix Codes III 1 13178
212 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1091
213 Beale Ciphers X 1 var
214 RSA Factoring Challenge: RSA-370 III 0 13214
215 RSA Factoring Challenge: RSA-380 III 0 13214
216 RSA Factoring Challenge: RSA-1536 III 0 13214
217 RSA Factoring Challenge: RSA-400 III 0 13214
218 RSA Factoring Challenge: RSA-390 III 0 13214
219 Kaskade-S/T — Part 4 II 0 1088
220 RSA Factoring Challenge: RSA-470 III 0 13214
221 RSA Factoring Challenge: RSA-617 III 0 13214
222 RSA Factoring Challenge: RSA-500 III 0 13214
223 RSA Factoring Challenge: RSA-2048 III 0 13214
224 RSA Factoring Challenge: RSA-480 III 0 13214
225 Twelve-Year-Old Murder Case X 0 var
226 RSA Factoring Challenge: RSA-460 III 0 13214
227 Dorabella X 0 var
228 ORYX Stream Cipher — Part 4d III 0 13304
229 "The Road" — Part 2 II 0 1188
230 RSA Factoring Challenge: RSA-420 III 0 13214
231 The third ENIGMA M4 message X 0 var
232 RSA Factoring Challenge: RSA-430 III 0 13214
233 RSA Factoring Challenge: RSA-410 III 0 13214
234 Weakened ElsieFour — Part 2 II 0 1151
235 RSA Factoring Challenge: RSA-450 III 0 13214
236 Digital Signatures: DSA with Medium Fields III 0 13190
237 Kryptos X 0 var
238 "The Road" — Part 3 II 0 1188
239 RSA Factoring Challenge: RSA-440 III 0 13214
240 RSA Factoring Challenge: RSA-340 III 0 13214
241 Weakened Granit — Part 3 II 0 1108
242 Weakened Granit — Part 2 II 0 1108
243 RSA Factoring Challenge: RSA-270 III 0 13214
244 RSA Factoring Challenge: RSA-260 III 0 13214
245 RSA Factoring Challenge: RSA-300 III 0 13214
246 RSA Factoring Challenge: RSA-240 III 0 13214
247 RSA Factoring Challenge: RSA-250 III 0 13214
248 Spirale — Part 4 III 0 13507
249 World Record Challenge: Break 65 Bits of AES III 0 13145
250 Double-Column Transposition/Granit — Part 2 II 0 1107
251 Double-Column Transposition/Granit — Part 1 II 0 1107
252 RSA Factoring Challenge: RSA-896 III 0 13214
253 Double-Column Transposition/Granit — Part 3 II 0 1107
254 D'Agapeyeff X 0 var
255 RSA Factoring Challenge: RSA-290 III 0 13214
256 RSA Factoring Challenge: RSA-280 III 0 13214
257 RSA Factoring Challenge: RSA-232 III 0 13214
258 RSA Factoring Challenge: RSA-309 III 0 13214
259 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1116
260 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1116
261 RSA Factoring Challenge: RSA-330 III 0 13214
262 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1116
263 RSA Factoring Challenge: RSA-490 III 0 13214
264 RSA Factoring Challenge: RSA-350 III 0 13214
265 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13157
266 Double Column Transposition Reloaded — Part 1 III 0 13339
267 Double Column Transposition Reloaded — Part 2 III 0 13339
268 RSA Factoring Challenge: RSA-310 III 0 13214
269 RSA Factoring Challenge: RSA-1024 III 0 13214
270 ORYX Stream Cipher — Part 4c III 0 13367
271 Spanish Strip Cipher — Part 3 X 0 var
272 Double Column Transposition Reloaded — Part 3 III 0 13339
273 RSA Factoring Challenge: RSA-320 III 0 13214
274 RSA Factoring Challenge: RSA-360 III 0 13214
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:12 - 25.06.2019] rnd solved the Level II challenge 'Weakened Handycipher — Part 1'    +++    [23:10 - 24.06.2019] Ertheb solved the Level II challenge 'Monoalphabetic substitution with camouflage — Part 2'    +++    [23:10 - 24.06.2019] RogueRamblers solved the Level I challenge 'Number Sequence — Part 7'    +++    [22:39 - 24.06.2019] RogueRamblers solved the Level I challenge 'Number Sequence — Part 10'    +++    [20:37 - 24.06.2019] Golansy solved the Level I challenge 'Caesar Encryption'    +++