MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11064
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4111 100
2 Original Caesar Cipher I 2842 100
3 Number Sequence — Part 2 I 2003 100
4 Caesar Encryption I 1351 100
5 Beaver Code I 1122 100
6 Letter to the Templars — Part 1 I 978 100
7 Number Sequence — Part 3 I 941 100
8 Letter to the Templars — Part 2 I 787 100
9 Number Sequence — Part 4 I 779 100
10 A hidden word I 775 100
11 Letter to the Templars — Part 3 II 672 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 553 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 511 1082
15 Factorization Cipher — Part 1 I 473 100
16 Grille Cipher I 457 100
17 Advent-Challenge — Part 1 I 392 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 347 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 298 100
22 Alice's Birthday Party (Part 1) II 281 1081
23 Snow White and the seven dwarfs I 278 100
24 Alice's Birthday Party (Part 2) II 276 1081
25 From Russia with Love I 264 100
26 Broadcasting and low exponent — RSA Attack II 221 1083
27 Modified Caesar Cipher I 218 100
28 How do you become a big cryptographer? I 214 100
29 M-138 — Part 1 I 195 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 190 1081
31 Reserve Hand Procedure — Part 1 I 186 100
32 Not-so-Secret Message from Malawi — Part I (RSA) II 184 1081
33 Classical Ciphers^3 I 169 100
34 Letter from the Alleged Countess Julie von Ortenburg I 168 100
35 Hybrid Encryption I II 165 1081
36 Enigma Messages with Repeated Letters — Part 1 I 161 100
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 151 1083
39 Pigpen with a twist — Part 1 I 147 100
40 Cryptanalysis Hacking Puzzles — Part 2 I 145 100
41 Molehunt (Part 1/3) I 145 100
42 ¿No Hablas Español? No problemo! I 141 100
43 The Book Code: A Challenge for Bookworms I 141 100
44 Factorization Cipher — Part 2 II 140 1084
45 Number Sequence — Part 6 I 140 100
46 Molehunt (Part 2/3) I 137 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 127 1081
49 M-138 — Part 2 II 122 1093
50 A Secret Message from Castle Mansfeld I 120 100
51 Image Noise I 119 100
52 Trifid Cipher I 116 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 112 1083
55 Playfair Encryption I 107 100
56 ADFGVX — Part 1 I 107 100
57 Playfair with hints about the grid I 105 100
58 Double Columnar Transposition I 103 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 9 I 101 100
61 Number Sequence — Part 10 I 100 100
62 Enigma Combinatorics I 96 100
63 A hidden word — Part 2 I 96 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 94 100
65 Zodiac Cipher I 91 100
66 Heartbleed — Part 1 I 90 100
67 ECDH-Key Exchange for Beginners I 89 100
68 Factorization Cipher — Part 3 II 89 1084
69 Number Sequence — Part 5 I 88 100
70 Enigma Part 2 II 86 1081
71 Hill Cipher with Sudoku Key I 84 100
72 Number Sequence — Part 7 I 83 100
73 Partial Key Exposure with RSA — Part 1 II 81 1084
74 The Last Note I 81 100
75 Molehunt (Part 3/3) II 80 1081
76 ORYX Stream Cipher Part I II 79 1081
77 Enigma Messages with Repeated Letters — Part 3 I 75 100
78 Enigma Messages with Repeated Letters — Part 2 I 75 100
79 AES key — encoded in the machine readable zone of a European ePassport II 72 1084
80 Enigma Messages with Repeated Letters — Part 5 I 72 100
81 Smartcard RSA II 71 1081
82 Enigma Messages I 71 100
83 Multilingual Monoalphabetic Substitution I 69 100
84 Cascading Encryption — Part 1/3 I 67 100
85 Enigma Messages with Repeated Letters — Part 4 I 67 100
86 BCR code (Book-Caesar-RSA) II 67 1086
87 Turing Bombe Enigma I I 66 100
88 Unusual encryption using a diophantine equation II 62 1083
89 Recycled One-Time Pad I 62 100
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 Modular Sequences I 57 100
93 M-138 — Part 3 II 57 1093
94 An Invisible Message I 56 100
95 The Einstein Enigma II 55 1111
96 News from Castle Mansfeld I 51 100
97 RSA Factoring Challenge: RSA-704 II 51 0
98 Kaskade-S/T — Part 2 II 50 1082
99 Unconcealed RSA messages II 49 1084
100 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
101 ORYX Stream Cipher Part II II 47 1081
102 Monoalphabetic substitution with camouflage — Part 4 I 46 100
103 New Year's Greetings — Part 1 I 46 100
104 Find the right route — Part 1 I 46 100
105 Strange Message from Thessaloniki I 45 100
106 Keyshanc — Part 1 II 45 1085
107 Advent-Challenge — Part 2 II 45 1110
108 RSA Factoring Challenge: RSA-210 II 45 0
109 Summer Job II 45 1115
110 Double Column Transposition — Part 4 II 44 1091
111 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 44 1082
112 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
113 New Year's Greetings — Part 2 I 43 100
114 Weakened Granit — Part 1 I 43 100
115 CMEA 1 II 42 1082
116 New Year's Greetings — Part 3 I 41 100
117 Double Column Transposition — Part 2 II 41 1091
118 An 'unhearable' message I 40 100
119 Music Code — Part 2 II 40 1083
120 Music Code — Part 1 I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Pigpen with a twist — Part 2 II 38 1083
123 Advent Challenge — Part 3 II 38 1110
124 Ku Klux Klan X 37 var
125 Double Column Transposition — Part 3 II 37 1091
126 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1081
127 Lightweight Introduction to Lattices — Part 1 I 36 100
128 Pigpen with a twist — Part 3 II 36 1083
129 Advent Challenge — Part 4 II 36 1110
130 Homophonic Encryption — Part 1 II 35 1127
131 Keyshanc — Part 2 II 35 1085
132 Heartbleed — Part 3 II 33 1092
133 Trendy Messenger II 31 1115
134 Kaskade-S/T — Part 3 II 31 1082
135 Polyhomophonic Substitution — Part 1 I 31 100
136 RSA Factoring Challenge: RSA-220 II 30 0
137 Wheatstone Cryptograph — Part 1 I 30 102
138 Spanish Strip Cipher — Part 1 II 30 1090
139 ORYX Stream Cipher — Part 3 (revised) II 30 1088
140 Homophonic Encryption — Part 2 II 30 1127
141 Fastest in the West II 30 1115
142 Homophonic Encryption — Part 3 II 29 1127
143 Double Column Transposition — Part 1 II 29 1090
144 Lattice Part 1 II 28 1082
145 Monoalphabetic Substitution with Nostradamus Flavor II 28 1123
146 Homophonic Encryption — Part 4 II 28 1127
147 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1084
148 RSA Factoring Challenge: RSA-230 II 27 0
149 CMEA 2 III 27 13066
150 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
151 Spanish Strip Cipher — Part 2 II 26 1090
152 Lightweight Introduction to Lattices — Part 2 I 26 100
153 M-138 — Part 4 II 25 1093
154 Typex — Part 1 II 25 1087
155 Lightweight Introduction to Lattices — Part 3 II 24 1160
156 RSA with Special d III 23 13061
157 Handycipher made in love — Part 1 II 22 1123
158 Typex — Part 2 II 22 1087
159 Polyphonic Substitution Cipher — Part 1 II 20 1138
160 Find the right route — Part 2 I 20 101
161 AES ECB Wrong Encoding II 20 1110
162 Polyhomophonic Substitution — Part 2 II 19 1148
163 Breaking a Filter Generator II 19 1118
164 The LoRa Cipher: Logic Randomness — Part 1 II 19 1144
165 Purple 1 II 18 1081
166 Handycipher made in love — Part 2 II 17 1127
167 Polyphonic Substitution Cipher — Part 2 II 17 1142
168 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1100
169 Concealed Messages — Vigenère's Night Sky X 16 var
170 RSA Factoring Challenge: RSA-240 III 16 0
171 Sigaba Part 1 II 16 1081
172 Find the right route — Part 3 I 16 101
173 Cipher ID — Part 1 II 15 1138
174 The T52 Sturgeon Challenge — Part 1 II 15 1130
175 A Cloaked Substitution Cipher — Part 1 II 15 1132
176 New Year's Greetings — Part 5 II 15 1099
177 Weakened Handycipher — Part 1 II 15 1095
178 Flawed Usage of a OTP Cipher by the BND II 15 1096
179 RSA Factoring Challenge: RSA-250 III 14 0
180 A Cloaked Substitution Cipher — Part 2 II 14 1132
181 Polyhomophonic Substitution — Part 3 II 14 1149
182 Weakened Handycipher — Part 3 II 14 1095
183 The T52 Sturgeon Challenge — Part 2 II 14 1130
184 Cascading Encryption — Part 2/3 II 14 1087
185 Weakened Handycipher — Part 2 II 13 1095
186 RSA Factoring Challenge: RSA-232 III 13 0
187 Cascading Encryption — Part 3/3 II 12 1087
188 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
189 The T52 Sturgeon Challenge — Part 3 II 11 1130
190 ORYX Stream Cipher — Part 4a II 11 1091
191 Kaskade-S/T — Part 5 II 10 1083
192 Akelarre Part 1 II 10 1082
193 The SZ42 Challenge — Part 2 II 9 1163
194 Hilly — Part 1 II 9 1104
195 The T52 Sturgeon Challenge — Part 4 II 9 1130
196 The SZ42 Challenge — Part 1 II 9 1161
197 The SIGABA Challenge — Part 2 II 8 1146
198 The SIGABA Challenge — Part 1 II 8 1145
199 Double Column Transposition — Part 5 II 8 1091
200 The T52 Sturgeon Challenge — Part 8 II 7 1131
201 The SZ42 Challenge — Part 3 II 7 1164
202 Handycipher — Part 2 II 7 1094
203 The SZ42 Challenge — Part 4 II 7 1167
204 The T52 Sturgeon Challenge — Part 12 II 7 1131
205 The T52 Sturgeon Challenge — Part 11 II 7 1131
206 Holographic Encryption — Part 1 II 6 1105
207 Handycipher — Part 3 III 6 13281
208 The SIGABA Challenge — Part 3 III 6 14075
209 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1107
210 The SZ42 Challenge — Part 5 II 6 1167
211 Weakened Handycipher — Part 4 II 5 1100
212 The T52 Sturgeon Challenge — Part 9 II 5 1131
213 The T52 Sturgeon Challenge — Part 10 II 5 1131
214 Weakened Handycipher — Part 5 II 5 1100
215 "The Road" — Part 1 II 5 1121
216 The SIGABA Challenge — Part 4 III 5 14082
217 Handycipher — Part 5 III 5 13385
218 The T52 Sturgeon Challenge — Part 7 II 5 1131
219 Weakened Handycipher — Part 6 II 5 1100
220 Handycipher — Part 6 III 5 13385
221 The SZ42 Challenge — Part 8 II 5 1178
222 The SZ42 Challenge — Part 6 II 5 1172
223 Spirale — Part 2 II 5 1096
224 Sigaba Part 2 III 5 13061
225 Spirale — Part 1 II 5 1096
226 Handycipher — Part 1 II 5 1094
227 Spirale — Part 3 II 4 1096
228 Handycipher — Part 4 III 4 13385
229 Weakened ElsieFour — Part 1 II 4 1114
230 The SZ42 Challenge — Part 7 II 4 1178
231 Wheatstone Cryptograph — Part 2 II 4 1321
232 The T52 Sturgeon Challenge — Part 5 II 4 1131
233 The T52 Sturgeon Challenge — Part 6 II 4 1131
234 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14119
235 Notes of an Italian Soldier X 4 var
236 The SZ42 Challenge — Part 9 II 4 1191
237 Extended Handycipher — Part 3 II 3 1094
238 The SZ42 Challenge — Part 11 II 3 1206
239 Extended Handycipher — Part 2 II 3 1094
240 Differential Cryptanalysis — Part 2 II 3 1143
241 The SZ42 Challenge — Part 10 II 3 1206
242 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1140
243 Extended Handycipher — Part 1 II 3 1094
244 The Vatican Challenge — Part 2 X 3 var
245 The Vatican Challenge — Part 1 X 3 var
246 Extended Handycipher — Part 4 III 3 13385
247 Handycipher — Part 9 III 3 13440
248 Extended Handycipher — Part 5 III 3 13385
249 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14130
250 Holographic Encryption — Part 2 II 3 1105
251 Handycipher — Part 8 III 3 13440
252 ElsieFour — Part 1 III 3 13521
253 Weakened ElsieFour — Part 3 II 3 1108
254 SIGABA CSP-889 — Part 3 III 2 16351
255 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
256 ORYX Stream Cipher — Part 4b III 2 13224
257 The SIGABA Challenge — Part 5 III 2 14094
258 Extended Handycipher — Part 6 III 2 13385
259 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13932
260 Handycipher — Part 7 III 2 13440
261 SIGABA CSP-889 — Part 2 II 2 1362
262 SIGABA CSP-889 — Part 1 II 2 1362
263 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14128
264 Double Column Transposition X 2 var
265 Unknown Author X 2 var
266 Substitution Cipher with Non-Prefix Codes III 1 13087
267 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1085
268 The Vatican Challenge — Part 4 X 1 var
269 Handycipher — Part 10 II 1 1129
270 The SIGABA Challenge — Part 6 III 1 14106
271 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14129
272 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14140
273 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13909
274 Hilly — Part 2 II 1 1109
275 Beale Ciphers X 1 var
276 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1100
277 RSA Factoring Challenge: RSA-270 III 0 13114
278 RSA Factoring Challenge: RSA-260 III 0 13114
279 RSA Factoring Challenge: RSA-896 III 0 13114
280 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13070
281 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14132
282 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13917
283 RSA Factoring Challenge: RSA-360 III 0 13114
284 Double-Column Transposition/Granit — Part 3 II 0 1095
285 Spirale — Part 4 III 0 13315
286 Double-Column Transposition/Granit — Part 2 II 0 1095
287 Double-Column Transposition/Granit — Part 1 II 0 1095
288 RSA Factoring Challenge: RSA-470 III 0 13114
289 RSA Factoring Challenge: RSA-1536 III 0 13114
290 RSA Factoring Challenge: RSA-460 III 0 13114
291 RSA Factoring Challenge: RSA-440 III 0 13114
292 RSA Factoring Challenge: RSA-430 III 0 13114
293 RSA Factoring Challenge: RSA-450 III 0 13114
294 Weakened Granit — Part 3 II 0 1096
295 Weakened Granit — Part 2 II 0 1096
296 RSA Factoring Challenge: RSA-480 III 0 13114
297 RSA Factoring Challenge: RSA-490 III 0 13114
298 Kaskade-S/T — Part 4 II 0 1083
299 Spanish Strip Cipher — Part 3 X 0 var
300 Double Column Transposition Reloaded — Part 3 III 0 13205
301 Double Column Transposition Reloaded — Part 2 III 0 13205
302 Double Column Transposition Reloaded — Part 1 III 0 13205
303 ORYX Stream Cipher — Part 4c III 0 13224
304 Digital Signatures: DSA with Medium Fields III 0 13096
305 RSA Factoring Challenge: RSA-500 III 0 13114
306 World Record Challenge: Break 65 Bits of AES III 0 13061
307 RSA Factoring Challenge: RSA-617 III 0 13114
308 RSA Factoring Challenge: RSA-2048 III 0 13114
309 The third ENIGMA M4 message X 0 var
310 RSA Factoring Challenge: RSA-420 III 0 13114
311 RSA Factoring Challenge: RSA-410 III 0 13114
312 "The Road" — Part 2 II 0 1121
313 "The Road" — Part 3 II 0 1121
314 RSA Factoring Challenge: RSA-310 III 0 13114
315 Dorabella X 0 var
316 RSA Factoring Challenge: RSA-320 III 0 13114
317 D'Agapeyeff X 0 var
318 RSA Factoring Challenge: RSA-1024 III 0 13114
319 RSA Factoring Challenge: RSA-280 III 0 13114
320 The Vatican Challenge — Part 3 X 0 var
321 RSA Factoring Challenge: RSA-290 III 0 13114
322 RSA Factoring Challenge: RSA-300 III 0 13114
323 RSA Factoring Challenge: RSA-309 III 0 13114
324 RSA Factoring Challenge: RSA-330 III 0 13114
325 RSA Factoring Challenge: RSA-340 III 0 13114
326 RSA Factoring Challenge: RSA-400 III 0 13114
327 Kryptos X 0 var
328 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1100
329 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1100
330 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1100
331 RSA Factoring Challenge: RSA-390 III 0 13114
332 ORYX Stream Cipher — Part 4d III 0 13180
333 Weakened ElsieFour — Part 2 II 0 1114
334 RSA Factoring Challenge: RSA-350 III 0 13114
335 Twelve-Year-Old Murder Case X 0 var
336 RSA Factoring Challenge: RSA-370 III 0 13114
337 RSA Factoring Challenge: RSA-380 III 0 13114
338 The Vatican Challenge — Part 5 X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [11:11 - 24.06.2021] bestwishes solved the Level I challenge 'Number Sequence — Part 6'    +++    [11:01 - 24.06.2021] E01814058 solved the Level II challenge 'Alice's Birthday Party (Part 1)'    +++    [10:57 - 24.06.2021] E01814058 solved the Level II challenge 'Heartbleed — Part 3'    +++    [10:56 - 24.06.2021] bestwishes solved the Level I challenge 'Find the right route — Part 1'    +++    [10:54 - 24.06.2021] smf12 solved the Level I challenge 'Find the right route — Part 1'    +++