MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8949
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3264 100
2 Original Caesar Cipher I 2178 100
3 Number Sequence — Part 2 I 1530 100
4 Caesar Encryption I 1088 100
5 Beaver Code I 844 100
6 Letter to the Templars — Part 1 I 752 100
7 Number Sequence — Part 3 I 707 100
8 Letter to the Templars — Part 2 I 597 100
9 Number Sequence — Part 4 I 563 100
10 A hidden word I 549 100
11 Letter to the Templars — Part 3 II 488 1095
12 Monoalphabetic Substitution I 455 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 419 100
14 Factorization Cipher — Part 1 I 374 100
15 Grille Cipher I 348 100
16 Cracking SHA1-Hashed Passwords II 344 1090
17 Homophonic Encryption Part 1 I 321 100
18 Homophonic Encryption Part 2 I 275 100
19 One-Time Pad with Flaws I 246 100
20 Snow White and the seven dwarfs I 233 100
21 Alice's Birthday Party (Part 1) II 219 1088
22 Alice's Birthday Party (Part 2) II 209 1088
23 From Russia with Love I 205 100
24 Advent-Challenge — Part 1 I 201 100
25 Number Sequence — Part 8 I 198 100
26 How do you become a big cryptographer? I 172 100
27 Broadcasting and low exponent — RSA-Attack II 169 1091
28 Modified Caesar Cipher I 168 100
29 Reserve Hand Procedure — Part 1 I 163 100
30 Letter from the Alleged Countess Julie von Ortenburg I 152 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 148 1088
32 Classical Ciphers^3 I 144 100
33 Brute-Force-Attack on Triple-DES with Reduced Key Space II 142 1088
34 M-138 — Part 1 I 142 100
35 Enigma Messages with Repeated Letters — Part 1 I 140 100
36 Hybrid Encryption I II 127 1088
37 Nils away on travel I 126 100
38 Pigpen with a twist — Part 1 I 123 100
39 RSA: Two different keys — same ciphertext II 122 1091
40 The Book Code: A Challenge for Bookworms I 120 100
41 Molehunt (Part 1/3) I 116 100
42 Factorization Cipher — Part 2 II 113 1092
43 Enigma Part 1 II 113 1088
44 Molehunt (Part 2/3) I 112 100
45 A Secret Message from Castle Mansfeld I 110 100
46 ¿No Hablas Español? No problemo! I 108 100
47 Trifid Cipher I 102 100
48 A really long number sequence II 97 1091
49 ADFGVX — Part 2 I 96 100
50 Kaskade-S/T — Part 1 I 91 100
51 ADFGVX — Part 1 I 88 100
52 Enigma Combinatorics I 87 100
53 Playfair Encryption I 86 100
54 Heartbleed — Part 1 I 85 100
55 M-138 — Part 2 II 84 1108
56 Image Noise I 83 100
57 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
58 Double Columnar Transposition I 83 100
59 Number Sequence — Part 6 I 82 100
60 Playfair with hints about the grid I 81 100
61 ECDH-Key Exchange for Beginners I 77 100
62 The Last Note I 73 100
63 ORYX Stream Cipher Part I II 73 1088
64 Zodiac Cipher I 72 100
65 Enigma Part 2 II 71 1088
66 Factorization Cipher — Part 3 II 71 1092
67 A hidden word — Part 2 I 70 100
68 Enigma Messages with Repeated Letters — Part 3 I 64 100
69 Partial Key Exposure with RSA — Part 1 II 64 1093
70 Molehunt (Part 3/3) II 64 1088
71 Hill Cipher with Sudoku Key I 63 100
72 Enigma Messages with Repeated Letters — Part 2 I 63 100
73 Number Sequence — Part 5 I 62 100
74 BCR code (Book-Caesar-RSA) II 61 1095
75 Enigma Messages I 60 100
76 Smartcard RSA II 59 1088
77 Enigma Messages with Repeated Letters — Part 5 I 59 100
78 Cascading Encryption — Part 1/3 I 59 100
79 Multilingual Monoalphabetic Substitution I 58 100
80 Turing Bombe Enigma I I 56 100
81 Heartbleed — Part 2 I 56 100
82 Enigma Messages with Repeated Letters — Part 4 I 55 100
83 AES key — encoded in the machine readable zone of a European ePassport II 54 1092
84 Recycled One-Time Pad I 50 100
85 Unusual encryption using a diophantine equation II 48 1091
86 Monoalphabetic substitution with camouflage — Part 1 I 48 100
87 An Invisible Message I 48 100
88 Kaskade-S/T — Part 2 II 45 1089
89 Number Sequence — Part 9 I 43 100
90 Number Sequence — Part 7 I 42 100
91 Keyshanc — Part 1 II 41 1094
92 ORYX Stream Cipher Part II II 41 1088
93 Number Sequence — Part 10 I 40 101
94 New Year's Greetings — Part 1 I 39 100
95 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1089
96 Strange Message from Thessaloniki I 38 100
97 News from Castle Mansfeld I 38 100
98 Monoalphabetic substitution with camouflage — Part 2 II 38 1092
99 Monoalphabetic substitution with camouflage — Part 4 I 37 100
100 Unconcealed RSA messages II 37 1092
101 Music Code — Part 2 II 36 1090
102 Music Code — Part 1 I 36 100
103 M-138 — Part 3 II 35 1108
104 Monoalphabetic substitution with camouflage — Part 3 II 35 1092
105 The Einstein Enigma II 35 1180
106 Weakened Granit — Part 1 I 35 100
107 New Year's Greetings — Part 2 I 35 100
108 Ku Klux Klan X 34 var
109 Double Column Transposition — Part 4 II 34 1104
110 Pigpen with a twist — Part 2 II 34 1091
111 New Year's Greetings — Part 3 I 34 100
112 An 'unhearable' message I 34 100
113 RSA Factoring Challenge: RSA-704 II 33 0
114 Double Column Transposition — Part 2 II 33 1104
115 New Year's Greetings — Part 4 I 33 100
116 CMEA 1 II 33 1089
117 Keyshanc — Part 2 II 32 1094
118 Pigpen with a twist — Part 3 II 31 1091
119 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1088
120 Double Column Transposition — Part 3 II 29 1104
121 Heartbleed — Part 3 II 28 1106
122 Kaskade-S/T — Part 3 II 28 1089
123 Advent-Challenge — Part 2 II 26 1170
124 ORYX Stream Cipher — Part 3 (revised) II 26 1098
125 RSA Factoring Challenge: RSA-210 II 25 0
126 Monoalphabetic Substitution with Camouflage — Part 5 II 23 1093
127 Advent Challenge — Part 4 II 23 1170
128 Lattice Part 1 II 22 1089
129 CMEA 2 III 22 13190
130 Summer Job II 21 1227
131 Double Column Transposition — Part 1 II 20 1103
132 Advent Challenge — Part 3 II 20 1171
133 Typex — Part 1 II 20 1097
134 RSA with Special d III 19 13183
135 Spanish Strip Cipher — Part 1 II 19 1103
136 Typex — Part 2 II 18 1098
137 Fastest in the West II 18 1227
138 Trendy Messenger II 18 1227
139 Spanish Strip Cipher — Part 2 II 17 1103
140 Concealed Messages — Vigenère's Night Sky X 16 var
141 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1126
142 Purple 1 II 14 1088
143 M-138 — Part 4 II 13 1108
144 AES ECB Wrong Encoding II 13 1170
145 New Year's Greetings — Part 5 II 12 1121
146 Sigaba Part 1 II 12 1088
147 Flawed Usage of a OTP Cipher by the BND II 12 1114
148 RSA Factoring Challenge: RSA-220 II 11 0
149 ORYX Stream Cipher — Part 4a II 10 1103
150 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 10 1090
151 Cascading Encryption — Part 3/3 II 10 1097
152 Weakened Handycipher — Part 3 II 10 1112
153 Cascading Encryption — Part 2/3 II 10 1097
154 Weakened Handycipher — Part 1 II 10 1112
155 Kaskade-S/T — Part 5 II 9 1090
156 Weakened Handycipher — Part 2 II 9 1112
157 Akelarre Part 1 II 7 1088
158 Hilly — Part 1 II 5 1136
159 Double Column Transposition — Part 5 II 5 1105
160 Handycipher — Part 3 III 5 13543
161 Handycipher — Part 2 II 5 1110
162 Handycipher — Part 6 III 4 13774
163 Handycipher — Part 5 III 4 13774
164 Handycipher — Part 1 II 4 1110
165 Weakened Handycipher — Part 4 II 4 1125
166 Notes of an Italian Soldier X 4 var
167 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 4 1148
168 Weakened Handycipher — Part 6 II 4 1125
169 Weakened Handycipher — Part 5 II 4 1125
170 The Vatikan Challenge — Part 2 X 3 var
171 Sigaba Part 2 III 3 13183
172 The Vatican Challenge — Part 1 X 3 var
173 Spirale — Part 1 II 3 1114
174 Holographic Encryption — Part 1 II 3 1141
175 Handycipher — Part 4 III 3 13774
176 Spirale — Part 2 II 3 1114
177 Spirale — Part 3 II 3 1114
178 Weakened ElsieFour — Part 3 II 2 1158
179 ORYX Stream Cipher — Part 4b III 2 13438
180 Double Column Transposition X 2 var
181 Extended Handycipher — Part 1 II 2 1110
182 Extended Handycipher — Part 3 II 2 1110
183 Extended Handycipher — Part 2 II 2 1110
184 Holographic Encryption — Part 2 II 2 1141
185 Handycipher — Part 8 III 2 13929
186 Handycipher — Part 9 III 2 13929
187 Extended Handycipher — Part 4 III 2 13774
188 Unknown Author X 2 var
189 Extended Handycipher — Part 5 III 2 13774
190 Handycipher — Part 7 III 1 13929
191 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1094
192 ElsieFour — Part 1 III 1 14238
193 Substitution Cipher with Non-Prefix Codes III 1 13220
194 Beale Ciphers X 1 var
195 Extended Handycipher — Part 6 III 1 13774
196 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1126
197 Weakened ElsieFour — Part 1 II 1 1204
198 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1126
199 Double Column Transposition Reloaded — Part 2 III 0 13404
200 Double Column Transposition Reloaded — Part 3 III 0 13404
201 Double Column Transposition Reloaded — Part 1 III 0 13404
202 RSA Factoring Challenge: RSA-617 III 0 13260
203 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1126
204 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1126
205 Hilly — Part 2 II 0 1160
206 RSA Factoring Challenge: RSA-490 III 0 13260
207 RSA Factoring Challenge: RSA-480 III 0 13260
208 RSA Factoring Challenge: RSA-240 III 0 13260
209 Weakened ElsieFour — Part 2 II 0 1204
210 RSA Factoring Challenge: RSA-230 II 0 1093
211 RSA Factoring Challenge: RSA-232 III 0 13260
212 RSA Factoring Challenge: RSA-250 III 0 13260
213 RSA Factoring Challenge: RSA-260 III 0 13260
214 Twelve-Year-Old Murder Case X 0 var
215 ORYX Stream Cipher — Part 4d III 0 13363
216 RSA Factoring Challenge: RSA-280 III 0 13260
217 RSA Factoring Challenge: RSA-896 III 0 13260
218 RSA Factoring Challenge: RSA-270 III 0 13260
219 Kryptos X 0 var
220 Kaskade-S/T — Part 4 II 0 1090
221 RSA Factoring Challenge: RSA-290 III 0 13260
222 RSA Factoring Challenge: RSA-440 III 0 13260
223 RSA Factoring Challenge: RSA-2048 III 0 13260
224 ORYX Stream Cipher — Part 4c III 0 13438
225 RSA Factoring Challenge: RSA-350 III 0 13260
226 RSA Factoring Challenge: RSA-340 III 0 13260
227 World Record Challenge: Break 65 Bits of AES III 0 13183
228 The third ENIGMA M4 message X 0 var
229 Spanish Strip Cipher — Part 3 X 0 var
230 RSA Factoring Challenge: RSA-360 III 0 13260
231 RSA Factoring Challenge: RSA-370 III 0 13260
232 RSA Factoring Challenge: RSA-400 III 0 13260
233 RSA Factoring Challenge: RSA-430 III 0 13260
234 RSA Factoring Challenge: RSA-410 III 0 13260
235 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13196
236 RSA Factoring Challenge: RSA-390 III 0 13260
237 Dorabella X 0 var
238 RSA Factoring Challenge: RSA-380 III 0 13260
239 Double-Column Transposition/Granit — Part 1 II 0 1113
240 Double-Column Transposition/Granit — Part 2 II 0 1113
241 Digital Signatures: DSA with Medium Fields III 0 13232
242 RSA Factoring Challenge: RSA-310 III 0 13260
243 Weakened Granit — Part 3 II 0 1115
244 RSA Factoring Challenge: RSA-1024 III 0 13260
245 RSA Factoring Challenge: RSA-309 III 0 13260
246 RSA Factoring Challenge: RSA-1536 III 0 13260
247 RSA Factoring Challenge: RSA-420 III 0 13260
248 RSA Factoring Challenge: RSA-300 III 0 13260
249 Weakened Granit — Part 2 II 0 1115
250 RSA Factoring Challenge: RSA-320 III 0 13260
251 RSA Factoring Challenge: RSA-450 III 0 13260
252 D'Agapeyeff X 0 var
253 Double-Column Transposition/Granit — Part 3 II 0 1113
254 RSA Factoring Challenge: RSA-460 III 0 13260
255 RSA Factoring Challenge: RSA-500 III 0 13260
256 RSA Factoring Challenge: RSA-330 III 0 13260
257 Spirale — Part 4 III 0 13612
258 RSA Factoring Challenge: RSA-470 III 0 13260
 
 
powered by the CrypTool project  CrypTool

 

   +++    [16:58 - 24.09.2018] undead_army69 solved the Level I challenge 'Number Sequence'    +++    [16:06 - 24.09.2018] dk_1111 solved the Level I challenge 'Number Sequence — Part 4'    +++    [15:44 - 24.09.2018] dk_1111 solved the Level I challenge 'Number Sequence — Part 3'    +++    [14:56 - 24.09.2018] dk_1111 solved the Level I challenge 'A hidden word'    +++    [21:33 - 23.09.2018] obi99 solved the Level I challenge 'Caesar Encryption'    +++