MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9676
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3568 100
2 Original Caesar Cipher I 2418 100
3 Number Sequence — Part 2 I 1709 100
4 Caesar Encryption I 1194 100
5 Beaver Code I 958 100
6 Letter to the Templars — Part 1 I 838 100
7 Number Sequence — Part 3 I 804 100
8 Letter to the Templars — Part 2 I 666 100
9 Number Sequence — Part 4 I 657 100
10 A hidden word I 643 100
11 Letter to the Templars — Part 3 II 553 1092
12 Monoalphabetic Substitution I 474 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 466 100
14 Cracking SHA1-Hashed Passwords II 418 1087
15 Factorization Cipher — Part 1 I 417 100
16 Grille Cipher I 392 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 278 100
20 One-Time Pad with Flaws I 265 100
21 Number Sequence — Part 8 I 263 100
22 Snow White and the seven dwarfs I 246 100
23 Alice's Birthday Party (Part 1) II 244 1086
24 Alice's Birthday Party (Part 2) II 235 1086
25 From Russia with Love I 230 100
26 How do you become a big cryptographer? I 189 100
27 Broadcasting and low exponent — RSA-Attack II 188 1088
28 Modified Caesar Cipher I 188 100
29 Reserve Hand Procedure — Part 1 I 171 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 163 1086
31 M-138 — Part 1 I 160 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 160 1086
33 Classical Ciphers^3 I 155 100
34 Letter from the Alleged Countess Julie von Ortenburg I 155 100
35 Enigma Messages with Repeated Letters — Part 1 I 149 100
36 Hybrid Encryption I II 139 1086
37 Nils away on travel I 138 100
38 Pigpen with a twist — Part 1 I 135 100
39 RSA: Two different keys — same ciphertext II 134 1088
40 The Book Code: A Challenge for Bookworms I 126 100
41 Factorization Cipher — Part 2 II 125 1089
42 Molehunt (Part 1/3) I 122 100
43 ¿No Hablas Español? No problemo! I 121 100
44 Molehunt (Part 2/3) I 119 100
45 Enigma Part 1 II 116 1086
46 A Secret Message from Castle Mansfeld I 112 100
47 A really long number sequence II 105 1088
48 Trifid Cipher I 105 100
49 ADFGVX — Part 2 I 103 100
50 Number Sequence — Part 6 I 101 100
51 Image Noise I 99 100
52 M-138 — Part 2 II 98 1103
53 Kaskade-S/T — Part 1 I 95 100
54 ADFGVX — Part 1 I 94 100
55 Playfair Encryption I 92 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 88 100
58 Double Columnar Transposition I 87 100
59 Heartbleed — Part 1 I 87 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 84 100
61 ECDH-Key Exchange for Beginners I 81 100
62 Factorization Cipher — Part 3 II 80 1089
63 Autokey Cipher I 80 100
64 A hidden word — Part 2 I 79 100
65 The Last Note I 75 100
66 ORYX Stream Cipher Part I II 75 1086
67 Zodiac Cipher I 75 100
68 Enigma Part 2 II 75 1086
69 Partial Key Exposure with RSA — Part 1 II 72 1090
70 Hill Cipher with Sudoku Key I 70 100
71 Number Sequence — Part 10 I 69 100
72 Number Sequence — Part 5 I 69 100
73 Molehunt (Part 3/3) II 68 1086
74 Enigma Messages with Repeated Letters — Part 3 I 67 100
75 Enigma Messages with Repeated Letters — Part 2 I 66 100
76 Number Sequence — Part 9 I 65 100
77 Enigma Messages I 65 100
78 Enigma Messages with Repeated Letters — Part 5 I 64 100
79 Smartcard RSA II 64 1086
80 Cascading Encryption — Part 1/3 I 62 100
81 BCR code (Book-Caesar-RSA) II 62 1092
82 Multilingual Monoalphabetic Substitution I 61 100
83 Heartbleed — Part 2 I 59 100
84 Turing Bombe Enigma I I 59 100
85 Enigma Messages with Repeated Letters — Part 4 I 58 100
86 AES key — encoded in the machine readable zone of a European ePassport II 58 1090
87 Cryptanalysis Hacking Puzzles — Part 2 I 57 101
88 Number Sequence — Part 7 I 56 100
89 Recycled One-Time Pad I 54 100
90 Monoalphabetic substitution with camouflage — Part 1 I 53 100
91 Unusual encryption using a diophantine equation II 53 1088
92 An Invisible Message I 52 100
93 Kaskade-S/T — Part 2 II 46 1087
94 M-138 — Part 3 II 45 1103
95 The Einstein Enigma II 45 1142
96 Unconcealed RSA messages II 44 1089
97 ORYX Stream Cipher Part II II 43 1086
98 New Year's Greetings — Part 1 I 43 100
99 Monoalphabetic substitution with camouflage — Part 2 II 42 1089
100 News from Castle Mansfeld I 41 100
101 Keyshanc — Part 1 II 41 1091
102 RSA Factoring Challenge: RSA-704 II 40 0
103 Strange Message from Thessaloniki I 40 100
104 Monoalphabetic substitution with camouflage — Part 4 I 40 100
105 Monoalphabetic substitution with camouflage — Part 3 II 39 1089
106 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1087
107 New Year's Greetings — Part 2 I 39 100
108 Weakened Granit — Part 1 I 38 100
109 An 'unhearable' message I 37 100
110 Music Code — Part 1 I 37 100
111 Music Code — Part 2 II 37 1087
112 New Year's Greetings — Part 3 I 36 100
113 Pigpen with a twist — Part 2 II 36 1088
114 Ku Klux Klan X 36 var
115 New Year's Greetings — Part 4 I 35 100
116 Double Column Transposition — Part 4 II 35 1099
117 CMEA 1 II 34 1086
118 Double Column Transposition — Part 2 II 34 1099
119 Summer Job II 34 1153
120 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
121 RSA Factoring Challenge: RSA-210 II 33 0
122 Pigpen with a twist — Part 3 II 32 1088
123 Modular Sequences I 32 100
124 Keyshanc — Part 2 II 32 1091
125 Advent-Challenge — Part 2 II 31 1138
126 Double Column Transposition — Part 3 II 30 1099
127 Kaskade-S/T — Part 3 II 29 1087
128 ORYX Stream Cipher — Part 3 (revised) II 28 1095
129 Heartbleed — Part 3 II 28 1101
130 Advent Challenge — Part 4 II 28 1138
131 Trendy Messenger II 27 1153
132 Advent Challenge — Part 3 II 27 1138
133 Lattice Part 1 II 24 1087
134 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1090
135 CMEA 2 III 24 13149
136 Spanish Strip Cipher — Part 1 II 23 1098
137 Fastest in the West II 23 1153
138 Double Column Transposition — Part 1 II 22 1099
139 Typex — Part 1 II 21 1094
140 RSA with Special d III 21 13142
141 Cryptanalysis Hacking Puzzles — Part 1 I 20 100
142 RSA Factoring Challenge: RSA-220 II 19 0
143 Spanish Strip Cipher — Part 2 II 18 1098
144 Typex — Part 2 II 18 1094
145 Monoalphabetic Substitution with Nostradamus Flavor II 18 1204
146 Homophonic Encryption — Part 1 II 18 1254
147 Handycipher made in love — Part 1 II 17 1204
148 M-138 — Part 4 II 16 1103
149 Concealed Messages — Vigenère's Night Sky X 16 var
150 Purple 1 II 15 1086
151 Homophonic Encryption — Part 2 II 15 1259
152 Weakened Handycipher — Part 1 II 15 1105
153 RSA Factoring Challenge: RSA-230 II 15 0
154 AES ECB Wrong Encoding II 14 1138
155 Homophonic Encryption — Part 3 II 14 1259
156 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1115
157 New Year's Greetings — Part 5 II 14 1112
158 Weakened Handycipher — Part 3 II 14 1105
159 Weakened Handycipher — Part 2 II 13 1105
160 Breaking a Filter Generator II 12 1168
161 Sigaba Part 1 II 12 1086
162 Flawed Usage of a OTP Cipher by the BND II 12 1107
163 Handycipher made in love — Part 2 II 12 1276
164 ORYX Stream Cipher — Part 4a II 11 1099
165 Cascading Encryption — Part 3/3 II 11 1094
166 Cascading Encryption — Part 2/3 II 11 1094
167 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
168 Kaskade-S/T — Part 5 II 10 1087
169 Akelarre Part 1 II 9 1086
170 Homophonic Encryption — Part 4 II 9 1259
171 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1128
172 Handycipher — Part 2 II 6 1104
173 Handycipher — Part 3 III 6 13446
174 Hilly — Part 1 II 6 1122
175 Double Column Transposition — Part 5 II 6 1100
176 Handycipher — Part 5 III 5 13618
177 Handycipher — Part 6 III 5 13618
178 Weakened Handycipher — Part 4 II 5 1115
179 Weakened Handycipher — Part 6 II 5 1115
180 Handycipher — Part 1 II 5 1104
181 Weakened Handycipher — Part 5 II 5 1115
182 Notes of an Italian Soldier X 4 var
183 Handycipher — Part 4 III 4 13618
184 Handycipher — Part 9 III 3 13721
185 Holographic Encryption — Part 1 II 3 1125
186 Extended Handycipher — Part 2 II 3 1104
187 Handycipher — Part 8 III 3 13721
188 Spirale — Part 2 II 3 1107
189 Extended Handycipher — Part 4 III 3 13618
190 Extended Handycipher — Part 5 III 3 13618
191 Spirale — Part 3 II 3 1107
192 Extended Handycipher — Part 1 II 3 1104
193 Spirale — Part 1 II 3 1107
194 Extended Handycipher — Part 3 II 3 1104
195 The Vatican Challenge — Part 2 X 3 var
196 Sigaba Part 2 III 3 13142
197 "The Road" — Part 1 II 3 1182
198 The Vatican Challenge — Part 1 X 3 var
199 Unknown Author X 2 var
200 Extended Handycipher — Part 6 III 2 13618
201 ORYX Stream Cipher — Part 4b III 2 13362
202 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
203 Handycipher — Part 7 III 2 13721
204 Double Column Transposition X 2 var
205 Weakened ElsieFour — Part 3 II 2 1133
206 ElsieFour — Part 1 III 2 13894
207 Holographic Encryption — Part 2 II 2 1125
208 The T52 Sturgeon Challenge — Part 1 II 1 1725
209 Handycipher — Part 10 II 1 1378
210 Weakened ElsieFour — Part 1 II 1 1149
211 Hilly — Part 2 II 1 1134
212 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1115
213 Substitution Cipher with Non-Prefix Codes III 1 13175
214 Beale Ciphers X 1 var
215 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1091
216 RSA Factoring Challenge: RSA-310 III 0 13210
217 RSA Factoring Challenge: RSA-320 III 0 13210
218 RSA Factoring Challenge: RSA-1024 III 0 13210
219 RSA Factoring Challenge: RSA-300 III 0 13210
220 RSA Factoring Challenge: RSA-330 III 0 13210
221 D'Agapeyeff X 0 var
222 RSA Factoring Challenge: RSA-309 III 0 13210
223 Double Column Transposition Reloaded — Part 1 III 0 13334
224 RSA Factoring Challenge: RSA-340 III 0 13210
225 RSA Factoring Challenge: RSA-350 III 0 13210
226 Digital Signatures: DSA with Medium Fields III 0 13187
227 Dorabella X 0 var
228 Kaskade-S/T — Part 4 II 0 1087
229 Weakened ElsieFour — Part 2 II 0 1149
230 Twelve-Year-Old Murder Case X 0 var
231 ORYX Stream Cipher — Part 4d III 0 13299
232 RSA Factoring Challenge: RSA-232 III 0 13210
233 RSA Factoring Challenge: RSA-240 III 0 13210
234 The Vatikan Challenge — Part 3 X 0 var
235 The Vatican Challenge — Part 4 X 0 var
236 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13154
237 The Vatican Challenge — Part 5 X 0 var
238 RSA Factoring Challenge: RSA-250 III 0 13210
239 RSA Factoring Challenge: RSA-260 III 0 13210
240 "The Road" — Part 3 II 0 1182
241 "The Road" — Part 2 II 0 1182
242 RSA Factoring Challenge: RSA-290 III 0 13210
243 RSA Factoring Challenge: RSA-280 III 0 13210
244 RSA Factoring Challenge: RSA-270 III 0 13210
245 RSA Factoring Challenge: RSA-896 III 0 13210
246 RSA Factoring Challenge: RSA-360 III 0 13210
247 RSA Factoring Challenge: RSA-380 III 0 13210
248 RSA Factoring Challenge: RSA-480 III 0 13211
249 Weakened Granit — Part 2 II 0 1108
250 Double Column Transposition Reloaded — Part 3 III 0 13334
251 Spirale — Part 4 III 0 13500
252 Spanish Strip Cipher — Part 3 X 0 var
253 RSA Factoring Challenge: RSA-490 III 0 13211
254 ORYX Stream Cipher — Part 4c III 0 13362
255 Double Column Transposition Reloaded — Part 2 III 0 13334
256 Weakened Granit — Part 3 II 0 1108
257 RSA Factoring Challenge: RSA-460 III 0 13211
258 RSA Factoring Challenge: RSA-1536 III 0 13211
259 RSA Factoring Challenge: RSA-450 III 0 13211
260 RSA Factoring Challenge: RSA-440 III 0 13210
261 RSA Factoring Challenge: RSA-420 III 0 13210
262 RSA Factoring Challenge: RSA-430 III 0 13210
263 RSA Factoring Challenge: RSA-410 III 0 13210
264 World Record Challenge: Break 65 Bits of AES III 0 13142
265 RSA Factoring Challenge: RSA-390 III 0 13210
266 RSA Factoring Challenge: RSA-617 III 0 13211
267 RSA Factoring Challenge: RSA-2048 III 0 13211
268 The third ENIGMA M4 message X 0 var
269 RSA Factoring Challenge: RSA-470 III 0 13211
270 Kryptos X 0 var
271 RSA Factoring Challenge: RSA-500 III 0 13211
272 RSA Factoring Challenge: RSA-400 III 0 13210
273 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1115
274 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1115
275 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1115
276 Double-Column Transposition/Granit — Part 3 II 0 1106
277 Double-Column Transposition/Granit — Part 1 II 0 1106
278 Double-Column Transposition/Granit — Part 2 II 0 1106
279 RSA Factoring Challenge: RSA-370 III 0 13210
 
 
powered by the CrypTool project  CrypTool

 

   +++    [12:17 - 16.07.2019] gerdw solved the Level I challenge 'M-138 — Part 1'    +++    [11:18 - 16.07.2019] ludimus solved the Level II challenge 'M-138 — Part 2'    +++    [10:31 - 16.07.2019] yult solved the Level II challenge 'RSA: Two different keys — same ciphertext'    +++    [09:29 - 16.07.2019] ludimus solved the Level I challenge 'M-138 — Part 1'    +++    [09:02 - 16.07.2019] gerdw solved the Level II challenge 'RSA: Two different keys — same ciphertext'    +++