MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10112
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3717 100
2 Original Caesar Cipher I 2535 100
3 Number Sequence — Part 2 I 1791 100
4 Caesar Encryption I 1235 100
5 Beaver Code I 1004 100
6 Letter to the Templars — Part 1 I 874 100
7 Number Sequence — Part 3 I 834 100
8 Letter to the Templars — Part 2 I 698 100
9 Number Sequence — Part 4 I 688 100
10 A hidden word I 687 100
11 Letter to the Templars — Part 3 II 585 1090
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 485 100
13 Monoalphabetic Substitution I 476 100
14 Cracking SHA1-Hashed Passwords II 440 1086
15 Factorization Cipher — Part 1 I 433 100
16 Grille Cipher I 405 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 355 100
18 Advent-Challenge — Part 1 I 318 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 305 100
20 Number Sequence — Part 8 I 284 100
21 One-Time Pad with Flaws I 272 100
22 Snow White and the seven dwarfs I 255 100
23 Alice's Birthday Party (Part 1) II 254 1084
24 Alice's Birthday Party (Part 2) II 244 1084
25 From Russia with Love I 239 100
26 How do you become a big cryptographer? I 195 100
27 Broadcasting and low exponent — RSA-Attack II 194 1086
28 Modified Caesar Cipher I 194 100
29 Reserve Hand Procedure — Part 1 I 175 100
30 M-138 — Part 1 I 171 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 168 1084
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1084
33 Classical Ciphers^3 I 159 100
34 Letter from the Alleged Countess Julie von Ortenburg I 158 100
35 Enigma Messages with Repeated Letters — Part 1 I 156 100
36 Nils away on travel I 144 100
37 Hybrid Encryption I II 143 1085
38 RSA: Two different keys — same ciphertext II 141 1087
39 Pigpen with a twist — Part 1 I 140 100
40 The Book Code: A Challenge for Bookworms I 131 100
41 ¿No Hablas Español? No problemo! I 129 100
42 Factorization Cipher — Part 2 II 127 1088
43 Molehunt (Part 1/3) I 125 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 117 1084
46 A Secret Message from Castle Mansfeld I 113 100
47 A really long number sequence II 109 1087
48 Number Sequence — Part 6 I 108 100
49 Trifid Cipher I 108 100
50 M-138 — Part 2 II 107 1100
51 ADFGVX — Part 2 I 105 100
52 Autokey Cipher I 103 100
53 Image Noise I 101 100
54 Kaskade-S/T — Part 1 I 98 100
55 ADFGVX — Part 1 I 96 100
56 Playfair Encryption I 95 100
57 Enigma Combinatorics I 93 100
58 Double Columnar Transposition I 92 100
59 Playfair with hints about the grid I 91 100
60 Heartbleed — Part 1 I 89 100
61 Cryptanalysis Hacking Puzzles — Part 2 I 88 100
62 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 87 100
63 ECDH-Key Exchange for Beginners I 85 100
64 A hidden word — Part 2 I 82 100
65 Factorization Cipher — Part 3 II 81 1088
66 The Last Note I 78 100
67 Number Sequence — Part 10 I 77 100
68 Enigma Part 2 II 77 1084
69 Zodiac Cipher I 77 100
70 Number Sequence — Part 5 I 77 100
71 ORYX Stream Cipher Part I II 76 1084
72 Number Sequence — Part 9 I 75 100
73 Partial Key Exposure with RSA — Part 1 II 74 1088
74 Hill Cipher with Sudoku Key I 71 100
75 Enigma Messages with Repeated Letters — Part 3 I 71 100
76 Enigma Messages with Repeated Letters — Part 2 I 70 100
77 Molehunt (Part 3/3) II 70 1085
78 Enigma Messages with Repeated Letters — Part 5 I 68 100
79 Enigma Messages I 68 100
80 Multilingual Monoalphabetic Substitution I 65 100
81 Smartcard RSA II 65 1085
82 BCR code (Book-Caesar-RSA) II 65 1090
83 Number Sequence — Part 7 I 64 100
84 Cascading Encryption — Part 1/3 I 63 100
85 Enigma Messages with Repeated Letters — Part 4 I 62 100
86 Turing Bombe Enigma I I 61 100
87 Heartbleed — Part 2 I 60 100
88 AES key — encoded in the machine readable zone of a European ePassport II 60 1088
89 Recycled One-Time Pad I 57 100
90 Unusual encryption using a diophantine equation II 57 1087
91 An Invisible Message I 54 100
92 Monoalphabetic substitution with camouflage — Part 1 I 54 100
93 Kaskade-S/T — Part 2 II 48 1085
94 The Einstein Enigma II 47 1130
95 M-138 — Part 3 II 47 1100
96 ORYX Stream Cipher Part II II 45 1084
97 New Year's Greetings — Part 1 I 44 100
98 News from Castle Mansfeld I 44 100
99 Unconcealed RSA messages II 44 1087
100 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
101 Monoalphabetic substitution with camouflage — Part 4 I 42 100
102 Keyshanc — Part 1 II 42 1089
103 Modular Sequences I 41 100
104 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1085
105 Strange Message from Thessaloniki I 41 100
106 New Year's Greetings — Part 2 I 41 100
107 RSA Factoring Challenge: RSA-704 II 41 0
108 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
109 Weakened Granit — Part 1 I 39 100
110 New Year's Greetings — Part 3 I 38 100
111 Music Code — Part 1 I 38 100
112 CMEA 1 II 38 1085
113 Music Code — Part 2 II 38 1086
114 An 'unhearable' message I 38 100
115 Pigpen with a twist — Part 2 II 37 1087
116 New Year's Greetings — Part 4 I 36 100
117 Double Column Transposition — Part 4 II 36 1097
118 Summer Job II 36 1137
119 Double Column Transposition — Part 2 II 35 1096
120 Ku Klux Klan X 35 var
121 RSA Factoring Challenge: RSA-210 II 35 0
122 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1084
123 Keyshanc — Part 2 II 33 1089
124 Advent-Challenge — Part 2 II 33 1127
125 Pigpen with a twist — Part 3 II 33 1087
126 Double Column Transposition — Part 3 II 31 1096
127 Heartbleed — Part 3 II 30 1098
128 ORYX Stream Cipher — Part 3 (revised) II 30 1093
129 Kaskade-S/T — Part 3 II 29 1085
130 Advent Challenge — Part 4 II 29 1127
131 Advent Challenge — Part 3 II 28 1127
132 Trendy Messenger II 28 1137
133 Fastest in the West II 27 1137
134 CMEA 2 III 26 13124
135 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1088
136 Spanish Strip Cipher — Part 1 II 24 1096
137 Lattice Part 1 II 24 1086
138 Homophonic Encryption — Part 1 II 23 1172
139 Double Column Transposition — Part 1 II 23 1096
140 Typex — Part 1 II 21 1092
141 RSA with Special d III 21 13118
142 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
143 RSA Factoring Challenge: RSA-220 II 21 0
144 Spanish Strip Cipher — Part 2 II 20 1096
145 Monoalphabetic Substitution with Nostradamus Flavor II 19 1160
146 Homophonic Encryption — Part 2 II 19 1172
147 Homophonic Encryption — Part 3 II 18 1172
148 Handycipher made in love — Part 1 II 18 1160
149 Typex — Part 2 II 18 1092
150 RSA Factoring Challenge: RSA-230 II 17 0
151 M-138 — Part 4 II 16 1100
152 Concealed Messages — Vigenère's Night Sky X 16 var
153 Breaking a Filter Generator II 16 1144
154 Homophonic Encryption — Part 4 II 16 1172
155 Purple 1 II 15 1085
156 Weakened Handycipher — Part 1 II 15 1102
157 AES ECB Wrong Encoding II 15 1127
158 A Cloaked Substitution Cipher — Part 1 II 14 1200
159 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1110
160 Weakened Handycipher — Part 3 II 14 1102
161 New Year's Greetings — Part 5 II 14 1107
162 Flawed Usage of a OTP Cipher by the BND II 13 1103
163 Weakened Handycipher — Part 2 II 13 1102
164 A Cloaked Substitution Cipher — Part 2 II 13 1202
165 Handycipher made in love — Part 2 II 13 1175
166 Sigaba Part 1 II 12 1084
167 Cascading Encryption — Part 2/3 II 11 1092
168 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
169 ORYX Stream Cipher — Part 4a II 11 1096
170 Cascading Encryption — Part 3/3 II 11 1092
171 Kaskade-S/T — Part 5 II 10 1086
172 Akelarre Part 1 II 9 1085
173 Polyphonic Substitution Cipher — Part 1 II 9 1259
174 The T52 Sturgeon Challenge — Part 1 II 8 1188
175 Cipher ID — Part 1 II 8 1256
176 Hilly — Part 1 II 8 1115
177 The T52 Sturgeon Challenge — Part 2 II 7 1190
178 Handycipher — Part 2 II 7 1101
179 Double Column Transposition — Part 5 II 7 1097
180 The T52 Sturgeon Challenge — Part 3 II 6 1190
181 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1120
182 Handycipher — Part 3 III 6 13393
183 Weakened Handycipher — Part 6 II 5 1110
184 Holographic Encryption — Part 1 II 5 1117
185 Weakened Handycipher — Part 5 II 5 1110
186 Handycipher — Part 5 III 5 13539
187 Handycipher — Part 6 III 5 13539
188 Weakened Handycipher — Part 4 II 5 1110
189 Polyphonic Substitution Cipher — Part 2 II 5 1423
190 "The Road" — Part 1 II 5 1151
191 Handycipher — Part 1 II 5 1101
192 The T52 Sturgeon Challenge — Part 4 II 5 1190
193 Spirale — Part 2 II 4 1103
194 Handycipher — Part 4 III 4 13539
195 Spirale — Part 1 II 4 1103
196 RSA Factoring Challenge: RSA-240 III 4 0
197 Notes of an Italian Soldier X 4 var
198 Spirale — Part 3 II 3 1103
199 The T52 Sturgeon Challenge — Part 11 II 3 1196
200 Handycipher — Part 9 III 3 13623
201 The T52 Sturgeon Challenge — Part 12 II 3 1196
202 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1312
203 Extended Handycipher — Part 5 III 3 13539
204 Extended Handycipher — Part 4 III 3 13539
205 The T52 Sturgeon Challenge — Part 8 II 3 1196
206 Holographic Encryption — Part 2 II 3 1117
207 Extended Handycipher — Part 3 II 3 1101
208 Extended Handycipher — Part 2 II 3 1101
209 Extended Handycipher — Part 1 II 3 1101
210 The Vatican Challenge — Part 1 X 3 var
211 Sigaba Part 2 III 3 13118
212 The Vatican Challenge — Part 2 X 3 var
213 Handycipher — Part 8 III 3 13623
214 Weakened ElsieFour — Part 1 II 2 1134
215 The T52 Sturgeon Challenge — Part 10 II 2 1196
216 ORYX Stream Cipher — Part 4b III 2 13319
217 The T52 Sturgeon Challenge — Part 9 II 2 1196
218 Extended Handycipher — Part 6 III 2 13539
219 The T52 Sturgeon Challenge — Part 7 II 2 1196
220 ElsieFour — Part 1 III 2 13755
221 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
222 Unknown Author X 2 var
223 Handycipher — Part 7 III 2 13623
224 Weakened ElsieFour — Part 3 II 2 1124
225 The T52 Sturgeon Challenge — Part 6 II 2 1196
226 Double Column Transposition X 2 var
227 The T52 Sturgeon Challenge — Part 5 II 2 1196
228 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1110
229 Hilly — Part 2 II 1 1124
230 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1089
231 Substitution Cipher with Non-Prefix Codes III 1 13149
232 Handycipher — Part 10 II 1 1183
233 The Vatican Challenge — Part 4 X 1 var
234 Beale Ciphers X 1 var
235 The Heavy T52 Sturgeon Challenge — Part 2 III 0 15015
236 The Heavy T52 Sturgeon Challenge — Part 3 III 0 15140
237 The Heavy T52 Sturgeon Challenge — Part 1 III 0 14958
238 Differential Cryptanalysis — Part 2 II 0 2000
239 The Vatican Challenge — Part 5 X 0 var
240 "The Road" — Part 2 II 0 1151
241 The Vatican Challenge — Part 3 X 0 var
242 Weakened ElsieFour — Part 2 II 0 1134
243 "The Road" — Part 3 II 0 1151
244 Double Column Transposition Reloaded — Part 2 III 0 13294
245 RSA Factoring Challenge: RSA-330 III 0 13181
246 RSA Factoring Challenge: RSA-340 III 0 13181
247 RSA Factoring Challenge: RSA-320 III 0 13181
248 RSA Factoring Challenge: RSA-310 III 0 13181
249 RSA Factoring Challenge: RSA-309 III 0 13181
250 RSA Factoring Challenge: RSA-1024 III 0 13181
251 RSA Factoring Challenge: RSA-350 III 0 13181
252 RSA Factoring Challenge: RSA-360 III 0 13181
253 RSA Factoring Challenge: RSA-400 III 0 13181
254 RSA Factoring Challenge: RSA-410 III 0 13181
255 RSA Factoring Challenge: RSA-390 III 0 13181
256 RSA Factoring Challenge: RSA-380 III 0 13181
257 RSA Factoring Challenge: RSA-370 III 0 13181
258 RSA Factoring Challenge: RSA-300 III 0 13181
259 RSA Factoring Challenge: RSA-290 III 0 13181
260 Digital Signatures: DSA with Medium Fields III 0 13159
261 World Record Challenge: Break 65 Bits of AES III 0 13118
262 Kaskade-S/T — Part 4 II 0 1086
263 Twelve-Year-Old Murder Case X 0 var
264 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13129
265 The third ENIGMA M4 message X 0 var
266 RSA Factoring Challenge: RSA-232 III 0 13181
267 RSA Factoring Challenge: RSA-896 III 0 13181
268 RSA Factoring Challenge: RSA-280 III 0 13181
269 RSA Factoring Challenge: RSA-270 III 0 13181
270 RSA Factoring Challenge: RSA-260 III 0 13181
271 RSA Factoring Challenge: RSA-250 III 0 13181
272 RSA Factoring Challenge: RSA-420 III 0 13181
273 RSA Factoring Challenge: RSA-430 III 0 13181
274 ORYX Stream Cipher — Part 4c III 0 13319
275 Double-Column Transposition/Granit — Part 1 II 0 1102
276 Spanish Strip Cipher — Part 3 X 0 var
277 Double Column Transposition Reloaded — Part 3 III 0 13294
278 Double Column Transposition Reloaded — Part 1 III 0 13294
279 Double-Column Transposition/Granit — Part 2 II 0 1102
280 Double-Column Transposition/Granit — Part 3 II 0 1102
281 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1110
282 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1110
283 Weakened Granit — Part 3 II 0 1104
284 Weakened Granit — Part 2 II 0 1104
285 Spirale — Part 4 III 0 13439
286 D'Agapeyeff X 0 var
287 ORYX Stream Cipher — Part 4d III 0 13262
288 RSA Factoring Challenge: RSA-1536 III 0 13181
289 RSA Factoring Challenge: RSA-470 III 0 13181
290 RSA Factoring Challenge: RSA-460 III 0 13181
291 RSA Factoring Challenge: RSA-450 III 0 13181
292 RSA Factoring Challenge: RSA-440 III 0 13181
293 RSA Factoring Challenge: RSA-480 III 0 13181
294 RSA Factoring Challenge: RSA-490 III 0 13181
295 Kryptos X 0 var
296 Dorabella X 0 var
297 RSA Factoring Challenge: RSA-2048 III 0 13181
298 RSA Factoring Challenge: RSA-617 III 0 13181
299 RSA Factoring Challenge: RSA-500 III 0 13181
300 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1110
 
 
powered by the CrypTool project  CrypTool

 

   +++    [16:06 - 28.01.2020] Xx solved the Level I challenge 'Caesar Encryption'    +++    [12:25 - 28.01.2020] Yokozuna solved the Level II challenge 'Spirale — Part 2'    +++    [12:24 - 28.01.2020] Yokozuna solved the Level II challenge 'Spirale — Part 1'    +++    [10:56 - 28.01.2020] Xx solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [22:27 - 27.01.2020] nhptgm solved the Level I challenge 'Original Caesar Cipher'    +++