MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8750
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3174 100
2 Original Caesar Cipher I 2103 100
3 Number Sequence — Part 2 I 1473 100
4 Caesar Encryption I 1061 100
5 Beaver Code I 814 100
6 Letter to the Templars — Part 1 I 733 100
7 Number Sequence — Part 3 I 670 100
8 Letter to the Templars — Part 2 I 587 100
9 Number Sequence — Part 4 I 540 100
10 A hidden word I 531 100
11 Letter to the Templars — Part 3 II 474 1097
12 Monoalphabetic Substitution I 454 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 413 100
14 Factorization Cipher — Part 1 I 373 100
15 Grille Cipher I 343 100
16 Cracking SHA1-Hashed Passwords II 334 1090
17 Homophonic Encryption Part 1 I 318 100
18 Homophonic Encryption Part 2 I 272 100
19 One-Time Pad with Flaws I 245 100
20 Snow White and the seven dwarfs I 230 100
21 Alice's Birthday Party (Part 1) II 212 1089
22 Alice's Birthday Party (Part 2) II 202 1089
23 From Russia with Love I 201 100
24 Number Sequence — Part 8 I 188 100
25 How do you become a big cryptographer? I 169 100
26 Modified Caesar Cipher I 167 100
27 Broadcasting and low exponent — RSA-Attack II 166 1092
28 Reserve Hand Procedure — Part 1 I 161 100
29 Letter from the Alleged Countess Julie von Ortenburg I 150 100
30 Advent-Challenge — Part 1 I 150 101
31 Not-so-Secret Message from Malawi — Part I (RSA) II 147 1089
32 Classical Ciphers^3 I 143 100
33 M-138 — Part 1 I 140 100
34 Enigma Messages with Repeated Letters — Part 1 I 136 100
35 Brute-Force-Attack on Triple-DES with Reduced Key Space II 132 1089
36 Hybrid Encryption I II 124 1089
37 Nils away on travel I 123 100
38 Pigpen with a twist — Part 1 I 121 100
39 RSA: Two different keys — same ciphertext II 120 1092
40 The Book Code: A Challenge for Bookworms I 119 100
41 Molehunt (Part 1/3) I 112 100
42 Enigma Part 1 II 111 1089
43 Factorization Cipher — Part 2 II 111 1093
44 Molehunt (Part 2/3) I 108 100
45 A Secret Message from Castle Mansfeld I 107 100
46 ¿No Hablas Español? No problemo! I 105 100
47 Trifid Cipher I 99 100
48 ADFGVX — Part 2 I 95 100
49 A really long number sequence II 95 1092
50 Kaskade-S/T — Part 1 I 90 100
51 ADFGVX — Part 1 I 87 100
52 Enigma Combinatorics I 85 100
53 Playfair Encryption I 84 100
54 Heartbleed — Part 1 I 83 100
55 M-138 — Part 2 II 83 1110
56 Double Columnar Transposition I 82 100
57 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 81 100
58 Number Sequence — Part 6 I 80 100
59 Playfair with hints about the grid I 79 100
60 Image Noise I 76 100
61 ECDH-Key Exchange for Beginners I 76 100
62 ORYX Stream Cipher Part I II 72 1089
63 The Last Note I 71 100
64 Zodiac Cipher I 70 100
65 Factorization Cipher — Part 3 II 70 1093
66 Enigma Part 2 II 70 1089
67 A hidden word — Part 2 I 68 100
68 Enigma Messages with Repeated Letters — Part 3 I 63 100
69 Molehunt (Part 3/3) II 63 1089
70 Hill Cipher with Sudoku Key I 62 100
71 Enigma Messages with Repeated Letters — Part 2 I 62 100
72 Partial Key Exposure with RSA — Part 1 II 62 1094
73 BCR code (Book-Caesar-RSA) II 60 1096
74 Smartcard RSA II 59 1089
75 Enigma Messages I 59 100
76 Enigma Messages with Repeated Letters — Part 5 I 58 100
77 Cascading Encryption — Part 1/3 I 57 100
78 Number Sequence — Part 5 I 57 100
79 Multilingual Monoalphabetic Substitution I 57 100
80 Turing Bombe Enigma I I 55 100
81 Enigma Messages with Repeated Letters — Part 4 I 54 100
82 AES key — encoded in the machine readable zone of a European ePassport II 53 1093
83 Heartbleed — Part 2 I 53 100
84 Recycled One-Time Pad I 49 100
85 An Invisible Message I 48 100
86 Monoalphabetic substitution with camouflage — Part 1 I 47 100
87 Unusual encryption using a diophantine equation II 47 1092
88 Kaskade-S/T — Part 2 II 44 1090
89 Number Sequence — Part 7 I 42 100
90 Keyshanc — Part 1 II 40 1095
91 ORYX Stream Cipher Part II II 40 1089
92 Number Sequence — Part 9 I 39 100
93 New Year's Greetings — Part 1 I 39 100
94 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 38 1090
95 Strange Message from Thessaloniki I 38 100
96 Unconcealed RSA messages II 37 1093
97 Monoalphabetic substitution with camouflage — Part 4 I 37 100
98 News from Castle Mansfeld I 37 100
99 Monoalphabetic substitution with camouflage — Part 2 II 36 1093
100 Music Code — Part 2 II 36 1091
101 Music Code — Part 1 I 36 100
102 Weakened Granit — Part 1 I 35 100
103 New Year's Greetings — Part 2 I 35 100
104 M-138 — Part 3 II 35 1110
105 Ku Klux Klan X 34 var
106 Pigpen with a twist — Part 2 II 34 1092
107 Monoalphabetic substitution with camouflage — Part 3 II 34 1093
108 New Year's Greetings — Part 3 I 34 100
109 An 'unhearable' message I 34 100
110 New Year's Greetings — Part 4 I 33 100
111 RSA Factoring Challenge: RSA-704 II 33 0
112 Double Column Transposition — Part 4 II 33 1106
113 Double Column Transposition — Part 2 II 33 1105
114 CMEA 1 II 33 1089
115 Keyshanc — Part 2 II 32 1095
116 Pigpen with a twist — Part 3 II 30 1092
117 Not-so-Secret Message from Malawi — Part II (ECC) II 30 1089
118 Number Sequence — Part 10 I 30 102
119 Double Column Transposition — Part 3 II 29 1105
120 The Einstein Enigma II 29 1211
121 Kaskade-S/T — Part 3 II 28 1090
122 Heartbleed — Part 3 II 28 1108
123 ORYX Stream Cipher — Part 3 (revised) II 26 1100
124 RSA Factoring Challenge: RSA-210 II 25 0
125 Advent-Challenge — Part 2 II 25 1191
126 Monoalphabetic Substitution with Camouflage — Part 5 II 22 1094
127 Lattice Part 1 II 22 1090
128 CMEA 2 III 21 13205
129 Double Column Transposition — Part 1 II 20 1105
130 Typex — Part 1 II 20 1098
131 RSA with Special d III 19 13197
132 Spanish Strip Cipher — Part 1 II 19 1105
133 Advent Challenge — Part 4 II 19 1193
134 Advent Challenge — Part 3 II 18 1193
135 Typex — Part 2 II 17 1099
136 Spanish Strip Cipher — Part 2 II 17 1105
137 Concealed Messages — Vigenère's Night Sky X 15 var
138 Purple 1 II 14 1089
139 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1130
140 M-138 — Part 4 II 12 1110
141 New Year's Greetings — Part 5 II 12 1125
142 Flawed Usage of a OTP Cipher by the BND II 11 1117
143 RSA Factoring Challenge: RSA-220 II 11 0
144 Sigaba Part 1 II 11 1089
145 AES ECB Wrong Encoding II 11 1191
146 Cascading Encryption — Part 3/3 II 10 1099
147 ORYX Stream Cipher — Part 4a II 10 1105
148 Cascading Encryption — Part 2/3 II 10 1099
149 Weakened Handycipher — Part 1 II 10 1114
150 Weakened Handycipher — Part 3 II 10 1114
151 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 9 1091
152 Summer Job II 9 1502
153 Kaskade-S/T — Part 5 II 9 1091
154 Fastest in the West II 9 1502
155 Weakened Handycipher — Part 2 II 9 1114
156 Trendy Messenger II 8 1502
157 Akelarre Part 1 II 7 1089
158 Double Column Transposition — Part 5 II 5 1106
159 Handycipher — Part 2 II 5 1112
160 Handycipher — Part 3 III 5 13579
161 Weakened Handycipher — Part 5 II 4 1129
162 Handycipher — Part 5 III 4 13839
163 Handycipher — Part 6 III 4 13839
164 Notes of an Italian Soldier X 4 var
165 Weakened Handycipher — Part 6 II 4 1129
166 Handycipher — Part 1 II 4 1112
167 Weakened Handycipher — Part 4 II 4 1129
168 Spirale — Part 2 II 3 1117
169 Spirale — Part 1 II 3 1117
170 Spirale — Part 3 II 3 1117
171 Holographic Encryption — Part 1 II 3 1149
172 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 3 1159
173 Handycipher — Part 4 III 3 13839
174 The Vatikan Challenge — Part 2 X 3 var
175 Sigaba Part 2 III 3 13197
176 Extended Handycipher — Part 3 II 2 1113
177 Handycipher — Part 8 III 2 14023
178 Extended Handycipher — Part 4 III 2 13839
179 Extended Handycipher — Part 5 III 2 13839
180 Extended Handycipher — Part 2 II 2 1113
181 Handycipher — Part 9 III 2 14023
182 Extended Handycipher — Part 1 II 2 1113
183 Unknown Author X 2 var
184 Double Column Transposition X 2 var
185 Weakened ElsieFour — Part 3 II 2 1173
186 ORYX Stream Cipher — Part 4b III 2 13466
187 Holographic Encryption — Part 2 II 2 1149
188 The Vatican Challenge — Part 1 X 2 var
189 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1130
190 Extended Handycipher — Part 6 III 1 13839
191 Substitution Cipher with Non-Prefix Codes III 1 13235
192 Hilly — Part 1 II 1 1143
193 ElsieFour — Part 1 III 1 14429
194 Handycipher — Part 7 III 1 14023
195 Beale Ciphers X 1 var
196 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1095
197 RSA Factoring Challenge: RSA-896 III 0 13277
198 Digital Signatures: DSA with Medium Fields III 0 13249
199 RSA Factoring Challenge: RSA-270 III 0 13277
200 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1130
201 RSA Factoring Challenge: RSA-230 II 0 1094
202 RSA Factoring Challenge: RSA-232 III 0 13277
203 Weakened ElsieFour — Part 1 II 0 1279
204 Weakened ElsieFour — Part 2 II 0 1279
205 World Record Challenge: Break 65 Bits of AES III 0 13197
206 The third ENIGMA M4 message X 0 var
207 RSA Factoring Challenge: RSA-240 III 0 13277
208 RSA Factoring Challenge: RSA-250 III 0 13277
209 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1130
210 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1130
211 RSA Factoring Challenge: RSA-280 III 0 13277
212 Hilly — Part 2 II 0 1176
213 Kryptos X 0 var
214 RSA Factoring Challenge: RSA-260 III 0 13277
215 RSA Factoring Challenge: RSA-2048 III 0 13277
216 Spirale — Part 4 II 0 1117
217 RSA Factoring Challenge: RSA-400 III 0 13277
218 Spanish Strip Cipher — Part 3 X 0 var
219 RSA Factoring Challenge: RSA-410 III 0 13277
220 RSA Factoring Challenge: RSA-420 III 0 13277
221 RSA Factoring Challenge: RSA-480 III 0 13277
222 ORYX Stream Cipher — Part 4c III 0 13466
223 RSA Factoring Challenge: RSA-370 III 0 13277
224 RSA Factoring Challenge: RSA-380 III 0 13277
225 RSA Factoring Challenge: RSA-390 III 0 13277
226 RSA Factoring Challenge: RSA-430 III 0 13277
227 RSA Factoring Challenge: RSA-440 III 0 13277
228 ORYX Stream Cipher — Part 4d III 0 13386
229 Kaskade-S/T — Part 4 II 0 1091
230 RSA Factoring Challenge: RSA-460 III 0 13277
231 RSA Factoring Challenge: RSA-470 III 0 13277
232 Twelve-Year-Old Murder Case X 0 var
233 Double Column Transposition Reloaded — Part 1 III 0 13430
234 RSA Factoring Challenge: RSA-450 III 0 13277
235 Double Column Transposition Reloaded — Part 3 III 0 13430
236 Double Column Transposition Reloaded — Part 2 III 0 13430
237 RSA Factoring Challenge: RSA-360 III 0 13277
238 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13211
239 RSA Factoring Challenge: RSA-1536 III 0 13277
240 Double-Column Transposition/Granit — Part 3 II 0 1116
241 Double-Column Transposition/Granit — Part 2 II 0 1116
242 Double-Column Transposition/Granit — Part 1 II 0 1116
243 D'Agapeyeff X 0 var
244 RSA Factoring Challenge: RSA-309 III 0 13277
245 RSA Factoring Challenge: RSA-300 III 0 13277
246 Weakened Granit — Part 3 II 0 1118
247 Weakened Granit — Part 2 II 0 1118
248 RSA Factoring Challenge: RSA-617 III 0 13277
249 RSA Factoring Challenge: RSA-500 III 0 13277
250 Dorabella X 0 var
251 RSA Factoring Challenge: RSA-340 III 0 13277
252 RSA Factoring Challenge: RSA-350 III 0 13277
253 RSA Factoring Challenge: RSA-330 III 0 13277
254 RSA Factoring Challenge: RSA-320 III 0 13277
255 RSA Factoring Challenge: RSA-490 III 0 13277
256 RSA Factoring Challenge: RSA-1024 III 0 13277
257 RSA Factoring Challenge: RSA-310 III 0 13277
258 RSA Factoring Challenge: RSA-290 III 0 13277
 
 
powered by the CrypTool project  CrypTool

 

   +++    [02:43 - 21.06.2018] rnd solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [01:11 - 21.06.2018] rnd solved the Level I challenge 'Affine Codes / Modulo Arithmetic with N / Extended Euclid'    +++    [00:16 - 21.06.2018] NekoCode solved the Level I challenge 'Number Sequence — Part 2'    +++    [00:10 - 21.06.2018] NekoCode solved the Level I challenge 'Number Sequence'    +++    [23:27 - 20.06.2018] Max_04 solved the Level I challenge 'Advent-Challenge — Part 1'    +++