MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

6502
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


MTC3 — The new Crypto Cipher Contest

mtc3

Welcome to MTC3!



You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.

In addition MysteryTwister C3 offers various raffles each month. You can find information about the current raffle here. For example it’s possible to win Amazon coupons, trophies, coffee cups or T-shirts.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2324 100
2 Original Caesar Cipher I 1457 100
3 Number Sequence — Part 2 I 1020 100
4 Caesar Encryption I 774 100
5 Beaver Code I 528 100
6 Letter to the Templars — Part 1 I 471 100
7 Number Sequence — Part 3 I 465 100
8 Letter to the Templars — Part 2 I 390 100
9 Number Sequence — Part 4 I 372 100
10 Monoalphabetic Substitution I 364 100
11 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 313 100
12 A hidden word I 299 100
13 Factorization Cipher — Part 1 I 282 100
14 Letter to the Templars — Part 3 II 280 1116
15 Homophonic Encryption Part 1 I 257 100
16 Grille Cipher I 247 100
17 Homophonic Encryption Part 2 I 223 100
18 Cracking SHA1-Hashed Passwords II 206 1104
19 One-Time Pad with Flaws I 200 100
20 Snow White and the seven dwarfs I 174 100
21 Alice's Birthday Party (Part 1) II 155 1101
22 Alice's Birthday Party (Part 2) II 145 1101
23 Reserve Hand Procedure — Part 1 I 130 100
24 Modified Caesar Cipher I 128 100
25 From Russia with Love I 125 100
26 Letter from the Alleged Countess Julie von Ortenburg I 120 100
27 How do you become a big cryptographer? I 119 100
28 Classical Ciphers^3 I 116 100
29 Broadcasting and low exponent — RSA-Attack II 108 1106
30 Not-so-Secret Message from Malawi — Part I (RSA) II 104 1101
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 102 1101
32 Pigpen with a twist — Part 1 I 95 100
33 Hybrid Encryption I II 93 1101
34 Enigma Messages with Repeated Letters — Part 1 I 92 100
35 Molehunt (Part 1/3) I 88 100
36 RSA: Two different keys — same ciphertext II 88 1106
37 The Book Code: A Challenge for Bookworms I 88 100
38 Molehunt (Part 2/3) I 86 100
39 Enigma Part 1 II 86 1101
40 A Secret Message from Castle Mansfeld I 85 100
41 M-138 — Part 1 I 84 100
42 Factorization Cipher — Part 2 II 83 1108
43 Nils away on travel I 80 100
44 A really long number sequence II 77 1107
45 Kaskade-S/T — Part 1 I 75 100
46 Trifid Cipher I 73 100
47 ¿No Hablas Español? No problemo! I 68 100
48 Enigma Combinatorics I 67 100
49 ADFGVX — Part 2 I 67 100
50 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 65 100
51 Playfair Encryption I 61 100
52 ECDH-Key Exchange for Beginners I 59 100
53 ADFGVX — Part 1 I 59 100
54 Zodiac Cipher I 59 100
55 Playfair with hints about the grid I 59 100
56 Double Columnar Transposition I 57 100
57 ORYX Stream Cipher Part I II 55 1101
58 Enigma Part 2 II 52 1101
59 Molehunt (Part 3/3) II 50 1101
60 Factorization Cipher — Part 3 II 50 1109
61 Smartcard RSA II 49 1101
62 M-138 — Part 2 II 47 1176
63 Turing Bombe Enigma I I 47 100
64 Heartbleed — Part 1 I 45 100
65 Hill Cipher with Sudoku Key I 45 100
66 Partial Key Exposure with RSA — Part 1 II 44 1110
67 BCR code (Book-Caesar-RSA) II 43 1116
68 Enigma Messages with Repeated Letters — Part 2 I 42 100
69 Enigma Messages I 41 100
70 Cascading Encryption — Part 1/3 I 41 100
71 Enigma Messages with Repeated Letters — Part 3 I 40 100
72 Number Sequence — Part 5 I 40 100
73 Multilingual Monoalphabetic Substitution I 39 100
74 An Invisible Message I 38 100
75 AES key — encoded in the machine readable zone of a European ePassport II 38 1109
76 Enigma Messages with Repeated Letters — Part 5 I 37 100
77 The Last Note I 36 100
78 Kaskade-S/T — Part 2 II 35 1103
79 Recycled One-Time Pad I 35 100
80 Enigma Messages with Repeated Letters — Part 4 I 33 100
81 Monoalphabetic substitution with camouflage — Part 1 I 33 100
82 Heartbleed — Part 2 I 32 100
83 Keyshanc — Part 1 II 31 1112
84 Unusual encryption using a diophantine equation II 31 1106
85 Number Sequence — Part 6 I 31 101
86 Strange Message from Thessaloniki I 29 100
87 Music Code — Part 2 II 29 1104
88 Music Code — Part 1 I 29 100
89 ORYX Stream Cipher Part II II 28 1101
90 A hidden word — Part 2 I 28 101
91 RSA Factoring Challenge: RSA-704 II 27 0
92 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 27 1102
93 Monoalphabetic substitution with camouflage — Part 4 I 26 100
94 Unconcealed RSA messages II 25 1108
95 Monoalphabetic substitution with camouflage — Part 2 II 24 1108
96 Not-so-Secret Message from Malawi — Part II (ECC) II 24 1101
97 Pigpen with a twist — Part 2 II 24 1106
98 An 'unhearable' message I 23 100
99 Keyshanc — Part 2 II 23 1112
100 Monoalphabetic substitution with camouflage — Part 3 II 23 1108
101 Ku Klux Klan X 22 var
102 Kaskade-S/T — Part 3 II 21 1103
103 Number Sequence — Part 7 I 20 101
104 Pigpen with a twist — Part 3 II 20 1106
105 CMEA 1 II 19 1102
106 Double Column Transposition — Part 4 II 18 1146
107 Double Column Transposition — Part 2 II 18 1145
108 RSA Factoring Challenge: RSA-210 II 17 0
109 ORYX Stream Cipher — Part 3 (revised) II 17 1125
110 Lattice Part 1 II 16 1103
111 CMEA 2 III 15 13409
112 Monoalphabetic Substitution with Camouflage — Part 5 II 15 1111
113 M-138 — Part 3 II 14 1176
114 Typex — Part 1 II 14 1121
115 RSA with Special d III 14 13396
116 Typex — Part 2 II 13 1123
117 Spanish Strip Cipher — Part 1 II 13 1142
118 Double Column Transposition — Part 3 II 13 1145
119 Heartbleed — Part 3 II 12 1157
120 Double Column Transposition — Part 1 II 12 1143
121 Spanish Strip Cipher — Part 2 II 11 1142
122 Concealed Messages — Vigenère's Night Sky X 10 var
123 Purple 1 II 10 1101
124 Cascading Encryption — Part 3/3 II 9 1122
125 Cascading Encryption — Part 2/3 II 9 1122
126 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1104
127 Sigaba Part 1 II 7 1101
128 Akelarre Part 1 II 6 1101
129 Kaskade-S/T — Part 5 II 6 1104
130 Weakened Handycipher — Part 1 II 6 1225
131 M-138 — Part 4 II 5 1176
132 Weakened Handycipher — Part 3 II 5 1225
133 Notes of an Italian Soldier X 4 var
134 Double Column Transposition — Part 5 II 4 1150
135 Weakened Handycipher — Part 2 II 4 1225
136 ORYX Stream Cipher — Part 4a II 3 1144
137 Sigaba Part 2 III 2 13396
138 Double Column Transposition X 2 var
139 Flawed Usage of a OTP Cipher by the BND II 2 1547
140 Beale Ciphers X 1 var
141 Unknown Author X 1 var
142 Substitution Cipher with Non-Prefix Codes III 1 13464
143 Handycipher — Part 3 III 1 14677
144 Handycipher — Part 1 II 1 1193
145 Handycipher — Part 2 II 1 1193
146 ORYX Stream Cipher — Part 4b III 1 14038
147 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1114
148 Extended Handycipher — Part 1 II 0 1202
149 Double Column Transposition Reloaded — Part 1 III 0 13915
150 Double-Column Transposition/Granit — Part 2 II 0 1270
151 Spirale — Part 2 II 0 1547
152 Spirale — Part 3 II 0 1547
153 Extended Handycipher — Part 2 II 0 1202
154 Spirale — Part 4 II 0 1547
155 Extended Handycipher — Part 3 II 0 1202
156 Double Column Transposition Reloaded — Part 2 III 0 13915
157 Double-Column Transposition/Granit — Part 1 II 0 1270
158 Double Column Transposition Reloaded — Part 3 III 0 13915
159 Spanish Strip Cipher — Part 3 X 0 var
160 ORYX Stream Cipher — Part 4c III 0 14038
161 Double-Column Transposition/Granit — Part 3 II 0 1270
162 Spirale — Part 1 II 0 1547
163 RSA Factoring Challenge: RSA-350 III 0 13543
164 RSA Factoring Challenge: RSA-260 III 0 13543
165 RSA Factoring Challenge: RSA-250 III 0 13543
166 RSA Factoring Challenge: RSA-240 III 0 13543
167 RSA Factoring Challenge: RSA-232 III 0 13543
168 RSA Factoring Challenge: RSA-270 III 0 13543
169 RSA Factoring Challenge: RSA-896 III 0 13543
170 RSA Factoring Challenge: RSA-309 III 0 13543
171 RSA Factoring Challenge: RSA-300 III 0 13543
172 RSA Factoring Challenge: RSA-290 III 0 13543
173 RSA Factoring Challenge: RSA-280 III 0 13543
174 RSA Factoring Challenge: RSA-230 II 0 1110
175 RSA Factoring Challenge: RSA-220 II 0 1110
176 World Record Challenge: Break 65 Bits of AES III 0 13396
177 Kryptos X 0 var
178 Dorabella X 0 var
179 D'Agapeyeff X 0 var
180 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13420
181 Twelve-Year-Old Murder Case X 0 var
182 The third ENIGMA M4 message X 0 var
183 Digital Signatures: DSA with Medium Fields III 0 13488
184 Kaskade-S/T — Part 4 II 0 1104
185 RSA Factoring Challenge: RSA-1024 III 0 13543
186 RSA Factoring Challenge: RSA-310 III 0 13543
187 RSA Factoring Challenge: RSA-1536 III 0 13543
188 RSA Factoring Challenge: RSA-460 III 0 13543
189 RSA Factoring Challenge: RSA-450 III 0 13543
190 RSA Factoring Challenge: RSA-440 III 0 13543
191 RSA Factoring Challenge: RSA-470 III 0 13543
192 RSA Factoring Challenge: RSA-480 III 0 13543
193 RSA Factoring Challenge: RSA-2048 III 0 13543
194 RSA Factoring Challenge: RSA-617 III 0 13543
195 RSA Factoring Challenge: RSA-500 III 0 13543
196 RSA Factoring Challenge: RSA-490 III 0 13543
197 RSA Factoring Challenge: RSA-430 III 0 13543
198 RSA Factoring Challenge: RSA-420 III 0 13543
199 RSA Factoring Challenge: RSA-360 III 0 13543
200 RSA Factoring Challenge: RSA-340 III 0 13543
201 RSA Factoring Challenge: RSA-330 III 0 13543
202 RSA Factoring Challenge: RSA-320 III 0 13543
203 RSA Factoring Challenge: RSA-370 III 0 13543
204 RSA Factoring Challenge: RSA-380 III 0 13543
205 RSA Factoring Challenge: RSA-410 III 0 13543
206 RSA Factoring Challenge: RSA-400 III 0 13543
207 RSA Factoring Challenge: RSA-390 III 0 13543
208 ORYX Stream Cipher — Part 4d III 0 13790
 
 
powered by the CrypTool project  CrypTool

 

   +++    [01:09 - 30.08.2015] 81311518 solved the Level I challenge 'Number Sequence'    +++    [21:31 - 29.08.2015] Bassus solved the Level I challenge 'Original Caesar Cipher'    +++    [21:27 - 29.08.2015] Bassus solved the Level I challenge 'Number Sequence — Part 2'    +++    [21:20 - 29.08.2015] Bassus solved the Level I challenge 'Number Sequence'    +++    [11:55 - 29.08.2015] Integral solved the Level III challenge 'Sigaba Part 2'    +++