MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9910
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3657 100
2 Original Caesar Cipher I 2487 100
3 Number Sequence — Part 2 I 1753 100
4 Caesar Encryption I 1220 100
5 Beaver Code I 979 100
6 Letter to the Templars — Part 1 I 852 100
7 Number Sequence — Part 3 I 816 100
8 Letter to the Templars — Part 2 I 677 100
9 Number Sequence — Part 4 I 669 100
10 A hidden word I 666 100
11 Letter to the Templars — Part 3 II 566 1091
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 475 100
13 Monoalphabetic Substitution I 474 100
14 Cracking SHA1-Hashed Passwords II 427 1086
15 Factorization Cipher — Part 1 I 423 100
16 Grille Cipher I 396 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 296 100
20 Number Sequence — Part 8 I 274 100
21 One-Time Pad with Flaws I 267 100
22 Snow White and the seven dwarfs I 251 100
23 Alice's Birthday Party (Part 1) II 249 1085
24 Alice's Birthday Party (Part 2) II 240 1085
25 From Russia with Love I 232 100
26 Broadcasting and low exponent — RSA-Attack II 191 1087
27 Modified Caesar Cipher I 191 100
28 How do you become a big cryptographer? I 191 100
29 Reserve Hand Procedure — Part 1 I 173 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1085
31 M-138 — Part 1 I 164 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Letter from the Alleged Countess Julie von Ortenburg I 157 100
34 Classical Ciphers^3 I 156 100
35 Enigma Messages with Repeated Letters — Part 1 I 153 100
36 Hybrid Encryption I II 140 1085
37 Nils away on travel I 140 100
38 RSA: Two different keys — same ciphertext II 139 1087
39 Pigpen with a twist — Part 1 I 137 100
40 The Book Code: A Challenge for Bookworms I 128 100
41 Factorization Cipher — Part 2 II 126 1088
42 Molehunt (Part 1/3) I 125 100
43 ¿No Hablas Español? No problemo! I 124 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 116 1085
46 A Secret Message from Castle Mansfeld I 113 100
47 Trifid Cipher I 108 100
48 A really long number sequence II 106 1088
49 ADFGVX — Part 2 I 104 100
50 Number Sequence — Part 6 I 103 100
51 M-138 — Part 2 II 102 1101
52 Image Noise I 101 100
53 Kaskade-S/T — Part 1 I 98 100
54 Playfair Encryption I 95 100
55 ADFGVX — Part 1 I 95 100
56 Playfair with hints about the grid I 91 100
57 Autokey Cipher I 91 100
58 Double Columnar Transposition I 90 100
59 Enigma Combinatorics I 90 100
60 Heartbleed — Part 1 I 89 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 86 100
62 ECDH-Key Exchange for Beginners I 84 100
63 A hidden word — Part 2 I 81 100
64 Factorization Cipher — Part 3 II 80 1089
65 ORYX Stream Cipher Part I II 76 1085
66 The Last Note I 76 100
67 Enigma Part 2 II 75 1085
68 Zodiac Cipher I 75 100
69 Cryptanalysis Hacking Puzzles — Part 2 I 74 100
70 Number Sequence — Part 10 I 73 100
71 Partial Key Exposure with RSA — Part 1 II 72 1089
72 Hill Cipher with Sudoku Key I 71 100
73 Number Sequence — Part 9 I 71 100
74 Number Sequence — Part 5 I 70 100
75 Molehunt (Part 3/3) II 70 1085
76 Enigma Messages with Repeated Letters — Part 3 I 68 100
77 Enigma Messages with Repeated Letters — Part 2 I 67 100
78 Enigma Messages I 67 100
79 Enigma Messages with Repeated Letters — Part 5 I 65 100
80 Smartcard RSA II 64 1085
81 Multilingual Monoalphabetic Substitution I 64 100
82 BCR code (Book-Caesar-RSA) II 64 1091
83 Cascading Encryption — Part 1/3 I 63 100
84 Number Sequence — Part 7 I 60 100
85 Turing Bombe Enigma I I 60 100
86 Heartbleed — Part 2 I 60 100
87 AES key — encoded in the machine readable zone of a European ePassport II 60 1089
88 Enigma Messages with Repeated Letters — Part 4 I 59 100
89 Unusual encryption using a diophantine equation II 57 1088
90 Recycled One-Time Pad I 56 100
91 Monoalphabetic substitution with camouflage — Part 1 I 54 100
92 An Invisible Message I 53 100
93 Kaskade-S/T — Part 2 II 48 1086
94 M-138 — Part 3 II 47 1101
95 The Einstein Enigma II 45 1135
96 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
97 Unconcealed RSA messages II 44 1088
98 New Year's Greetings — Part 1 I 44 100
99 ORYX Stream Cipher Part II II 44 1085
100 News from Castle Mansfeld I 43 100
101 Keyshanc — Part 1 II 42 1090
102 Monoalphabetic substitution with camouflage — Part 4 I 42 100
103 New Year's Greetings — Part 2 I 41 100
104 Strange Message from Thessaloniki I 41 100
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1086
106 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
107 RSA Factoring Challenge: RSA-704 II 40 0
108 Weakened Granit — Part 1 I 39 100
109 Music Code — Part 1 I 38 100
110 Modular Sequences I 38 100
111 New Year's Greetings — Part 3 I 38 100
112 An 'unhearable' message I 38 100
113 Music Code — Part 2 II 38 1087
114 New Year's Greetings — Part 4 I 36 100
115 Pigpen with a twist — Part 2 II 36 1088
116 Ku Klux Klan X 36 var
117 Double Column Transposition — Part 4 II 36 1098
118 Double Column Transposition — Part 2 II 35 1098
119 CMEA 1 II 35 1086
120 Summer Job II 34 1144
121 Keyshanc — Part 2 II 33 1090
122 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1085
123 RSA Factoring Challenge: RSA-210 II 33 0
124 Advent-Challenge — Part 2 II 32 1132
125 Pigpen with a twist — Part 3 II 32 1088
126 Double Column Transposition — Part 3 II 31 1098
127 Heartbleed — Part 3 II 30 1099
128 ORYX Stream Cipher — Part 3 (revised) II 29 1094
129 Kaskade-S/T — Part 3 II 29 1086
130 Advent Challenge — Part 4 II 29 1132
131 Trendy Messenger II 28 1144
132 Advent Challenge — Part 3 II 28 1132
133 Fastest in the West II 26 1144
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1089
135 Lattice Part 1 II 24 1086
136 CMEA 2 III 24 13136
137 Spanish Strip Cipher — Part 1 II 24 1097
138 Double Column Transposition — Part 1 II 23 1097
139 Homophonic Encryption — Part 1 II 22 1196
140 Typex — Part 1 II 21 1093
141 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
142 RSA with Special d III 21 13130
143 Spanish Strip Cipher — Part 2 II 20 1097
144 Monoalphabetic Substitution with Nostradamus Flavor II 19 1176
145 Homophonic Encryption — Part 2 II 19 1197
146 RSA Factoring Challenge: RSA-220 II 19 0
147 Homophonic Encryption — Part 3 II 18 1197
148 Handycipher made in love — Part 1 II 18 1176
149 Typex — Part 2 II 18 1093
150 RSA Factoring Challenge: RSA-230 II 16 0
151 Concealed Messages — Vigenère's Night Sky X 16 var
152 M-138 — Part 4 II 16 1101
153 Weakened Handycipher — Part 1 II 15 1103
154 Purple 1 II 15 1085
155 Breaking a Filter Generator II 15 1154
156 Weakened Handycipher — Part 3 II 14 1103
157 Homophonic Encryption — Part 4 II 14 1197
158 New Year's Greetings — Part 5 II 14 1110
159 AES ECB Wrong Encoding II 14 1132
160 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1112
161 Handycipher made in love — Part 2 II 13 1202
162 Weakened Handycipher — Part 2 II 13 1103
163 A Cloaked Substitution Cipher — Part 1 II 13 1265
164 Flawed Usage of a OTP Cipher by the BND II 13 1105
165 A Cloaked Substitution Cipher — Part 2 II 12 1270
166 Sigaba Part 1 II 12 1085
167 ORYX Stream Cipher — Part 4a II 11 1097
168 Cascading Encryption — Part 3/3 II 11 1093
169 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
170 Cascading Encryption — Part 2/3 II 11 1093
171 Kaskade-S/T — Part 5 II 10 1087
172 Akelarre Part 1 II 9 1085
173 Hilly — Part 1 II 8 1118
174 Handycipher — Part 2 II 7 1102
175 Double Column Transposition — Part 5 II 7 1098
176 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1124
177 Handycipher — Part 3 III 6 13418
178 Handycipher — Part 6 III 5 13576
179 Handycipher — Part 5 III 5 13576
180 Weakened Handycipher — Part 4 II 5 1112
181 The T52 Sturgeon Challenge — Part 1 II 5 1229
182 Weakened Handycipher — Part 5 II 5 1112
183 Weakened Handycipher — Part 6 II 5 1112
184 Handycipher — Part 1 II 5 1102
185 The T52 Sturgeon Challenge — Part 3 II 4 1235
186 The T52 Sturgeon Challenge — Part 2 II 4 1235
187 Handycipher — Part 4 III 4 13576
188 Holographic Encryption — Part 1 II 4 1121
189 Notes of an Italian Soldier X 4 var
190 The Vatican Challenge — Part 1 X 3 var
191 Extended Handycipher — Part 4 III 3 13576
192 Spirale — Part 1 II 3 1105
193 The Vatican Challenge — Part 2 X 3 var
194 Extended Handycipher — Part 5 III 3 13576
195 Handycipher — Part 9 III 3 13669
196 Spirale — Part 3 II 3 1105
197 Handycipher — Part 8 III 3 13669
198 Spirale — Part 2 II 3 1105
199 Sigaba Part 2 III 3 13130
200 Extended Handycipher — Part 1 II 3 1103
201 The T52 Sturgeon Challenge — Part 4 II 3 1235
202 Extended Handycipher — Part 3 II 3 1103
203 Extended Handycipher — Part 2 II 3 1103
204 "The Road" — Part 1 II 3 1163
205 Extended Handycipher — Part 6 III 2 13576
206 Handycipher — Part 7 III 2 13669
207 The T52 Sturgeon Challenge — Part 5 II 2 1252
208 The T52 Sturgeon Challenge — Part 7 II 2 1252
209 The T52 Sturgeon Challenge — Part 12 II 2 1252
210 The T52 Sturgeon Challenge — Part 6 II 2 1252
211 ElsieFour — Part 1 III 2 13819
212 Double Column Transposition X 2 var
213 Weakened ElsieFour — Part 3 II 2 1128
214 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
215 The T52 Sturgeon Challenge — Part 8 II 2 1252
216 The T52 Sturgeon Challenge — Part 11 II 2 1252
217 Holographic Encryption — Part 2 II 2 1121
218 ORYX Stream Cipher — Part 4b III 2 13339
219 Unknown Author X 2 var
220 The T52 Sturgeon Challenge — Part 9 II 1 1252
221 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1112
222 Beale Ciphers X 1 var
223 The Vatican Challenge — Part 4 X 1 var
224 Weakened ElsieFour — Part 1 II 1 1140
225 Hilly — Part 2 II 1 1129
226 Handycipher — Part 10 II 1 1218
227 The T52 Sturgeon Challenge — Part 10 II 1 1252
228 Substitution Cipher with Non-Prefix Codes III 1 13161
229 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1090
230 RSA Factoring Challenge: RSA-309 III 0 13195
231 "The Road" — Part 3 II 0 1163
232 D'Agapeyeff X 0 var
233 RSA Factoring Challenge: RSA-300 III 0 13195
234 RSA Factoring Challenge: RSA-280 III 0 13195
235 RSA Factoring Challenge: RSA-290 III 0 13195
236 "The Road" — Part 2 II 0 1163
237 ORYX Stream Cipher — Part 4d III 0 13280
238 RSA Factoring Challenge: RSA-310 III 0 13195
239 Dorabella X 0 var
240 RSA Factoring Challenge: RSA-1024 III 0 13195
241 Twelve-Year-Old Murder Case X 0 var
242 The Heavy T52 Sturgeon Challenge — Part 2 III 0 16839
243 RSA Factoring Challenge: RSA-896 III 0 13195
244 The Heavy T52 Sturgeon Challenge — Part 1 III 0 16351
245 ORYX Stream Cipher — Part 4c III 0 13339
246 RSA Factoring Challenge: RSA-250 III 0 13195
247 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13141
248 Double Column Transposition Reloaded — Part 1 III 0 13313
249 Double Column Transposition Reloaded — Part 3 III 0 13313
250 Spanish Strip Cipher — Part 3 X 0 var
251 The Vatican Challenge — Part 5 X 0 var
252 RSA Factoring Challenge: RSA-320 III 0 13195
253 RSA Factoring Challenge: RSA-260 III 0 13195
254 Double Column Transposition Reloaded — Part 2 III 0 13313
255 RSA Factoring Challenge: RSA-232 III 0 13195
256 The Vatican Challenge — Part 3 X 0 var
257 RSA Factoring Challenge: RSA-240 III 0 13195
258 RSA Factoring Challenge: RSA-270 III 0 13195
259 RSA Factoring Challenge: RSA-350 III 0 13195
260 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1112
261 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1112
262 RSA Factoring Challenge: RSA-440 III 0 13195
263 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1112
264 Weakened Granit — Part 3 II 0 1106
265 Digital Signatures: DSA with Medium Fields III 0 13172
266 Weakened Granit — Part 2 II 0 1106
267 RSA Factoring Challenge: RSA-450 III 0 13195
268 RSA Factoring Challenge: RSA-460 III 0 13195
269 RSA Factoring Challenge: RSA-480 III 0 13195
270 RSA Factoring Challenge: RSA-617 III 0 13195
271 RSA Factoring Challenge: RSA-490 III 0 13195
272 RSA Factoring Challenge: RSA-470 III 0 13195
273 RSA Factoring Challenge: RSA-2048 III 0 13195
274 RSA Factoring Challenge: RSA-1536 III 0 13195
275 The third ENIGMA M4 message X 0 var
276 RSA Factoring Challenge: RSA-430 III 0 13195
277 World Record Challenge: Break 65 Bits of AES III 0 13130
278 Double-Column Transposition/Granit — Part 2 II 0 1104
279 Double-Column Transposition/Granit — Part 3 II 0 1104
280 RSA Factoring Challenge: RSA-360 III 0 13195
281 Double-Column Transposition/Granit — Part 1 II 0 1104
282 Weakened ElsieFour — Part 2 II 0 1140
283 RSA Factoring Challenge: RSA-340 III 0 13195
284 RSA Factoring Challenge: RSA-500 III 0 13195
285 RSA Factoring Challenge: RSA-370 III 0 13195
286 RSA Factoring Challenge: RSA-380 III 0 13195
287 Kaskade-S/T — Part 4 II 0 1087
288 Spirale — Part 4 III 0 13468
289 RSA Factoring Challenge: RSA-420 III 0 13195
290 RSA Factoring Challenge: RSA-410 III 0 13195
291 Kryptos X 0 var
292 RSA Factoring Challenge: RSA-390 III 0 13195
293 RSA Factoring Challenge: RSA-400 III 0 13195
294 RSA Factoring Challenge: RSA-330 III 0 13195
 
 
powered by the CrypTool project  CrypTool

 

   +++    [18:21 - 23.10.2019] Miles solved the Level I challenge 'Number Sequence — Part 8'    +++    [18:15 - 23.10.2019] Miles solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [03:07 - 23.10.2019] alfred_noble solved the Level I challenge 'Number Sequence — Part 3'    +++    [22:15 - 22.10.2019] Greko solved the Level II challenge 'Homophonic Encryption — Part 2'    +++    [17:57 - 22.10.2019] Gerben solved the Level I challenge 'Number Sequence — Part 9'    +++