MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9594
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3530 100
2 Original Caesar Cipher I 2387 100
3 Number Sequence — Part 2 I 1686 100
4 Caesar Encryption I 1174 100
5 Beaver Code I 936 100
6 Letter to the Templars — Part 1 I 816 100
7 Number Sequence — Part 3 I 788 100
8 Letter to the Templars — Part 2 I 648 100
9 Number Sequence — Part 4 I 641 100
10 A hidden word I 626 100
11 Letter to the Templars — Part 3 II 536 1093
12 Monoalphabetic Substitution I 466 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 453 100
14 Factorization Cipher — Part 1 I 407 100
15 Cracking SHA1-Hashed Passwords II 402 1088
16 Grille Cipher I 380 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 342 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 294 100
19 Advent-Challenge — Part 1 I 266 100
20 One-Time Pad with Flaws I 258 100
21 Number Sequence — Part 8 I 253 100
22 Snow White and the seven dwarfs I 242 100
23 Alice's Birthday Party (Part 1) II 237 1086
24 Alice's Birthday Party (Part 2) II 227 1086
25 From Russia with Love I 224 100
26 How do you become a big cryptographer? I 184 100
27 Broadcasting and low exponent — RSA-Attack II 183 1088
28 Modified Caesar Cipher I 182 100
29 Reserve Hand Procedure — Part 1 I 168 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 158 1086
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 155 1086
32 Letter from the Alleged Countess Julie von Ortenburg I 154 100
33 M-138 — Part 1 I 153 100
34 Classical Ciphers^3 I 152 100
35 Enigma Messages with Repeated Letters — Part 1 I 146 100
36 Hybrid Encryption I II 136 1086
37 Nils away on travel I 133 100
38 Pigpen with a twist — Part 1 I 131 100
39 RSA: Two different keys — same ciphertext II 130 1089
40 The Book Code: A Challenge for Bookworms I 124 100
41 Factorization Cipher — Part 2 II 122 1090
42 Molehunt (Part 1/3) I 119 100
43 ¿No Hablas Español? No problemo! I 116 100
44 Enigma Part 1 II 116 1086
45 Molehunt (Part 2/3) I 116 100
46 A Secret Message from Castle Mansfeld I 111 100
47 A really long number sequence II 103 1089
48 Trifid Cipher I 102 100
49 ADFGVX — Part 2 I 99 100
50 Number Sequence — Part 6 I 98 100
51 Image Noise I 95 100
52 Kaskade-S/T — Part 1 I 94 100
53 M-138 — Part 2 II 94 1104
54 Playfair Encryption I 91 100
55 ADFGVX — Part 1 I 90 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 87 100
58 Heartbleed — Part 1 I 86 100
59 Double Columnar Transposition I 86 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 83 100
61 ECDH-Key Exchange for Beginners I 79 100
62 Factorization Cipher — Part 3 II 77 1090
63 ORYX Stream Cipher Part I II 75 1086
64 A hidden word — Part 2 I 75 100
65 Zodiac Cipher I 74 100
66 The Last Note I 74 100
67 Enigma Part 2 II 74 1086
68 Autokey Cipher I 71 100
69 Partial Key Exposure with RSA — Part 1 II 70 1090
70 Hill Cipher with Sudoku Key I 70 100
71 Enigma Messages with Repeated Letters — Part 3 I 67 100
72 Molehunt (Part 3/3) II 67 1086
73 Enigma Messages with Repeated Letters — Part 2 I 66 100
74 Number Sequence — Part 5 I 65 100
75 Enigma Messages I 65 100
76 Enigma Messages with Repeated Letters — Part 5 I 64 100
77 Number Sequence — Part 10 I 64 100
78 Number Sequence — Part 9 I 63 100
79 Multilingual Monoalphabetic Substitution I 61 100
80 BCR code (Book-Caesar-RSA) II 61 1092
81 Smartcard RSA II 61 1086
82 Cascading Encryption — Part 1/3 I 60 100
83 Turing Bombe Enigma I I 59 100
84 Enigma Messages with Repeated Letters — Part 4 I 58 100
85 Heartbleed — Part 2 I 58 100
86 AES key — encoded in the machine readable zone of a European ePassport II 57 1090
87 Number Sequence — Part 7 I 55 100
88 Recycled One-Time Pad I 52 100
89 Monoalphabetic substitution with camouflage — Part 1 I 52 100
90 Unusual encryption using a diophantine equation II 52 1089
91 An Invisible Message I 51 100
92 Kaskade-S/T — Part 2 II 45 1087
93 ORYX Stream Cipher Part II II 43 1086
94 Cryptanalysis Hacking Puzzles — Part 2 I 42 101
95 The Einstein Enigma II 42 1146
96 Unconcealed RSA messages II 42 1089
97 M-138 — Part 3 II 42 1104
98 New Year's Greetings — Part 1 I 41 100
99 News from Castle Mansfeld I 41 100
100 Keyshanc — Part 1 II 41 1091
101 Strange Message from Thessaloniki I 40 100
102 Monoalphabetic substitution with camouflage — Part 4 I 40 100
103 Monoalphabetic substitution with camouflage — Part 2 II 40 1090
104 Monoalphabetic substitution with camouflage — Part 3 II 39 1090
105 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1087
106 New Year's Greetings — Part 2 I 38 100
107 Weakened Granit — Part 1 I 38 100
108 Music Code — Part 2 II 37 1088
109 Music Code — Part 1 I 37 100
110 Pigpen with a twist — Part 2 II 36 1089
111 New Year's Greetings — Part 3 I 36 100
112 Ku Klux Klan X 36 var
113 An 'unhearable' message I 36 100
114 RSA Factoring Challenge: RSA-704 II 36 0
115 Double Column Transposition — Part 4 II 35 1100
116 New Year's Greetings — Part 4 I 35 100
117 Double Column Transposition — Part 2 II 34 1100
118 CMEA 1 II 34 1087
119 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
120 Pigpen with a twist — Part 3 II 32 1089
121 Keyshanc — Part 2 II 32 1091
122 Summer Job II 32 1160
123 Advent-Challenge — Part 2 II 31 1142
124 Modular Sequences I 30 100
125 Double Column Transposition — Part 3 II 30 1100
126 RSA Factoring Challenge: RSA-210 II 29 0
127 Kaskade-S/T — Part 3 II 29 1087
128 Advent Challenge — Part 4 II 28 1142
129 ORYX Stream Cipher — Part 3 (revised) II 28 1095
130 Heartbleed — Part 3 II 28 1102
131 Trendy Messenger II 27 1160
132 Advent Challenge — Part 3 II 27 1142
133 Lattice Part 1 II 24 1087
134 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1091
135 CMEA 2 III 23 13156
136 Fastest in the West II 23 1160
137 Double Column Transposition — Part 1 II 22 1099
138 Spanish Strip Cipher — Part 1 II 21 1099
139 Typex — Part 1 II 21 1094
140 RSA with Special d III 20 13149
141 Spanish Strip Cipher — Part 2 II 18 1099
142 Typex — Part 2 II 18 1095
143 Homophonic Encryption — Part 1 II 17 1373
144 Cryptanalysis Hacking Puzzles — Part 1 I 17 100
145 Concealed Messages — Vigenère's Night Sky X 16 var
146 M-138 — Part 4 II 16 1104
147 Monoalphabetic Substitution with Nostradamus Flavor II 16 1232
148 RSA Factoring Challenge: RSA-220 II 15 0
149 Homophonic Encryption — Part 2 II 15 1398
150 Handycipher made in love — Part 1 II 15 1232
151 Purple 1 II 15 1086
152 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1117
153 AES ECB Wrong Encoding II 14 1142
154 New Year's Greetings — Part 5 II 14 1113
155 Weakened Handycipher — Part 1 II 14 1106
156 Weakened Handycipher — Part 3 II 13 1106
157 Flawed Usage of a OTP Cipher by the BND II 12 1108
158 Weakened Handycipher — Part 2 II 12 1106
159 Homophonic Encryption — Part 3 II 12 1398
160 Breaking a Filter Generator II 12 1177
161 Sigaba Part 1 II 12 1086
162 Cascading Encryption — Part 3/3 II 11 1094
163 RSA Factoring Challenge: RSA-230 II 11 0
164 Cascading Encryption — Part 2/3 II 11 1094
165 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1088
166 ORYX Stream Cipher — Part 4a II 11 1099
167 Handycipher made in love — Part 2 II 10 1613
168 Kaskade-S/T — Part 5 II 10 1088
169 Akelarre Part 1 II 9 1087
170 Homophonic Encryption — Part 4 II 8 1398
171 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1131
172 Handycipher — Part 2 II 6 1105
173 Handycipher — Part 3 III 6 13462
174 Double Column Transposition — Part 5 II 6 1100
175 Hilly — Part 1 II 6 1124
176 Weakened Handycipher — Part 5 II 5 1116
177 Handycipher — Part 5 III 5 13642
178 Handycipher — Part 6 III 5 13642
179 Weakened Handycipher — Part 6 II 5 1116
180 Handycipher — Part 1 II 5 1105
181 Weakened Handycipher — Part 4 II 5 1116
182 Handycipher — Part 4 III 4 13642
183 Notes of an Italian Soldier X 4 var
184 Extended Handycipher — Part 3 II 3 1105
185 Extended Handycipher — Part 5 III 3 13642
186 Sigaba Part 2 III 3 13149
187 Spirale — Part 2 II 3 1108
188 Handycipher — Part 9 III 3 13751
189 Holographic Encryption — Part 1 II 3 1127
190 Handycipher — Part 8 III 3 13751
191 Spirale — Part 3 II 3 1108
192 Spirale — Part 1 II 3 1108
193 Extended Handycipher — Part 2 II 3 1105
194 Extended Handycipher — Part 4 III 3 13642
195 Extended Handycipher — Part 1 II 3 1105
196 "The Road" — Part 1 II 3 1197
197 The Vatican Challenge — Part 1 X 3 var
198 The Vatikan Challenge — Part 2 X 3 var
199 Double Column Transposition X 2 var
200 Holographic Encryption — Part 2 II 2 1127
201 ORYX Stream Cipher — Part 4b III 2 13374
202 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
203 Weakened ElsieFour — Part 3 II 2 1136
204 Handycipher — Part 7 III 2 13751
205 Extended Handycipher — Part 6 III 2 13642
206 ElsieFour — Part 1 III 2 13939
207 Unknown Author X 2 var
208 Substitution Cipher with Non-Prefix Codes III 1 13183
209 Weakened ElsieFour — Part 1 II 1 1154
210 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1092
211 Hilly — Part 2 II 1 1137
212 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1117
213 Beale Ciphers X 1 var
214 RSA Factoring Challenge: RSA-500 III 0 13219
215 RSA Factoring Challenge: RSA-490 III 0 13219
216 RSA Factoring Challenge: RSA-232 III 0 13219
217 RSA Factoring Challenge: RSA-2048 III 0 13219
218 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1117
219 The third ENIGMA M4 message X 0 var
220 "The Road" — Part 3 II 0 1197
221 RSA Factoring Challenge: RSA-617 III 0 13219
222 RSA Factoring Challenge: RSA-1536 III 0 13219
223 Weakened ElsieFour — Part 2 II 0 1154
224 RSA Factoring Challenge: RSA-470 III 0 13219
225 RSA Factoring Challenge: RSA-250 III 0 13219
226 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1117
227 Digital Signatures: DSA with Medium Fields III 0 13194
228 RSA Factoring Challenge: RSA-480 III 0 13219
229 RSA Factoring Challenge: RSA-240 III 0 13219
230 Kryptos X 0 var
231 "The Road" — Part 2 II 0 1197
232 RSA Factoring Challenge: RSA-280 III 0 13219
233 RSA Factoring Challenge: RSA-360 III 0 13219
234 ORYX Stream Cipher — Part 4c III 0 13374
235 RSA Factoring Challenge: RSA-430 III 0 13219
236 Spanish Strip Cipher — Part 3 X 0 var
237 RSA Factoring Challenge: RSA-350 III 0 13219
238 RSA Factoring Challenge: RSA-340 III 0 13219
239 World Record Challenge: Break 65 Bits of AES III 0 13149
240 RSA Factoring Challenge: RSA-320 III 0 13219
241 RSA Factoring Challenge: RSA-330 III 0 13219
242 Twelve-Year-Old Murder Case X 0 var
243 RSA Factoring Challenge: RSA-370 III 0 13219
244 ORYX Stream Cipher — Part 4d III 0 13310
245 RSA Factoring Challenge: RSA-400 III 0 13219
246 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13161
247 RSA Factoring Challenge: RSA-410 III 0 13219
248 RSA Factoring Challenge: RSA-390 III 0 13219
249 Double Column Transposition Reloaded — Part 1 III 0 13345
250 RSA Factoring Challenge: RSA-380 III 0 13219
251 Double Column Transposition Reloaded — Part 3 III 0 13345
252 Double Column Transposition Reloaded — Part 2 III 0 13345
253 RSA Factoring Challenge: RSA-310 III 0 13219
254 RSA Factoring Challenge: RSA-1024 III 0 13219
255 RSA Factoring Challenge: RSA-420 III 0 13219
256 RSA Factoring Challenge: RSA-450 III 0 13219
257 RSA Factoring Challenge: RSA-290 III 0 13219
258 Weakened Granit — Part 3 II 0 1109
259 RSA Factoring Challenge: RSA-896 III 0 13219
260 RSA Factoring Challenge: RSA-270 III 0 13219
261 Dorabella X 0 var
262 RSA Factoring Challenge: RSA-460 III 0 13219
263 RSA Factoring Challenge: RSA-260 III 0 13219
264 Weakened Granit — Part 2 II 0 1109
265 RSA Factoring Challenge: RSA-300 III 0 13219
266 RSA Factoring Challenge: RSA-309 III 0 13219
267 D'Agapeyeff X 0 var
268 Kaskade-S/T — Part 4 II 0 1088
269 RSA Factoring Challenge: RSA-440 III 0 13219
270 Double-Column Transposition/Granit — Part 1 II 0 1107
271 Spirale — Part 4 III 0 13517
272 Double-Column Transposition/Granit — Part 3 II 0 1107
273 Double-Column Transposition/Granit — Part 2 II 0 1107
274 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1117
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:46 - 25.05.2019] Fountain solved the Level I challenge 'Caesar Encryption'    +++    [23:01 - 25.05.2019] Fountain solved the Level I challenge 'Advent-Challenge — Part 1'    +++    [22:40 - 25.05.2019] Fountain solved the Level I challenge 'Autokey Cipher'    +++    [13:55 - 25.05.2019] Fountain solved the Level I challenge 'Original Caesar Cipher'    +++    [11:29 - 24.05.2019] dokyriak solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++