MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9763
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3609 100
2 Original Caesar Cipher I 2448 100
3 Number Sequence — Part 2 I 1728 100
4 Caesar Encryption I 1206 100
5 Beaver Code I 969 100
6 Letter to the Templars — Part 1 I 845 100
7 Number Sequence — Part 3 I 808 100
8 Letter to the Templars — Part 2 I 672 100
9 Number Sequence — Part 4 I 663 100
10 A hidden word I 656 100
11 Letter to the Templars — Part 3 II 559 1092
12 Monoalphabetic Substitution I 477 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 470 100
14 Cracking SHA1-Hashed Passwords II 421 1087
15 Factorization Cipher — Part 1 I 420 100
16 Grille Cipher I 394 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 349 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 301 100
19 Advent-Challenge — Part 1 I 286 100
20 Number Sequence — Part 8 I 270 100
21 One-Time Pad with Flaws I 266 100
22 Snow White and the seven dwarfs I 249 100
23 Alice's Birthday Party (Part 1) II 247 1086
24 Alice's Birthday Party (Part 2) II 239 1086
25 From Russia with Love I 231 100
26 Modified Caesar Cipher I 190 100
27 Broadcasting and low exponent — RSA-Attack II 190 1088
28 How do you become a big cryptographer? I 190 100
29 Reserve Hand Procedure — Part 1 I 172 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1086
31 M-138 — Part 1 I 162 100
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1086
33 Classical Ciphers^3 I 156 100
34 Letter from the Alleged Countess Julie von Ortenburg I 155 100
35 Enigma Messages with Repeated Letters — Part 1 I 152 100
36 Hybrid Encryption I II 140 1086
37 Nils away on travel I 138 100
38 RSA: Two different keys — same ciphertext II 136 1088
39 Pigpen with a twist — Part 1 I 136 100
40 The Book Code: A Challenge for Bookworms I 127 100
41 Factorization Cipher — Part 2 II 125 1089
42 Molehunt (Part 1/3) I 125 100
43 Molehunt (Part 2/3) I 122 100
44 ¿No Hablas Español? No problemo! I 122 100
45 Enigma Part 1 II 116 1086
46 A Secret Message from Castle Mansfeld I 112 100
47 Trifid Cipher I 106 100
48 A really long number sequence II 105 1088
49 ADFGVX — Part 2 I 103 100
50 Number Sequence — Part 6 I 101 100
51 M-138 — Part 2 II 101 1102
52 Image Noise I 100 100
53 Kaskade-S/T — Part 1 I 95 100
54 ADFGVX — Part 1 I 94 100
55 Playfair Encryption I 93 100
56 Double Columnar Transposition I 89 100
57 Enigma Combinatorics I 89 100
58 Playfair with hints about the grid I 89 100
59 Heartbleed — Part 1 I 87 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 85 100
61 Autokey Cipher I 84 100
62 ECDH-Key Exchange for Beginners I 81 100
63 Factorization Cipher — Part 3 II 80 1089
64 A hidden word — Part 2 I 79 100
65 ORYX Stream Cipher Part I II 76 1086
66 Enigma Part 2 II 75 1086
67 The Last Note I 75 100
68 Zodiac Cipher I 75 100
69 Partial Key Exposure with RSA — Part 1 II 72 1089
70 Hill Cipher with Sudoku Key I 71 100
71 Number Sequence — Part 5 I 70 100
72 Number Sequence — Part 10 I 70 100
73 Molehunt (Part 3/3) II 69 1086
74 Number Sequence — Part 9 I 67 100
75 Enigma Messages with Repeated Letters — Part 3 I 67 100
76 Enigma Messages with Repeated Letters — Part 2 I 66 100
77 Enigma Messages I 66 100
78 Smartcard RSA II 64 1086
79 BCR code (Book-Caesar-RSA) II 64 1091
80 Cryptanalysis Hacking Puzzles — Part 2 I 64 100
81 Enigma Messages with Repeated Letters — Part 5 I 64 100
82 Multilingual Monoalphabetic Substitution I 63 100
83 Cascading Encryption — Part 1/3 I 62 100
84 AES key — encoded in the machine readable zone of a European ePassport II 59 1089
85 Heartbleed — Part 2 I 59 100
86 Number Sequence — Part 7 I 59 100
87 Turing Bombe Enigma I I 59 100
88 Enigma Messages with Repeated Letters — Part 4 I 58 100
89 Unusual encryption using a diophantine equation II 55 1088
90 Monoalphabetic substitution with camouflage — Part 1 I 54 100
91 Recycled One-Time Pad I 54 100
92 An Invisible Message I 52 100
93 M-138 — Part 3 II 47 1102
94 Kaskade-S/T — Part 2 II 46 1087
95 The Einstein Enigma II 45 1139
96 Unconcealed RSA messages II 44 1089
97 ORYX Stream Cipher Part II II 44 1086
98 New Year's Greetings — Part 1 I 43 100
99 Monoalphabetic substitution with camouflage — Part 2 II 43 1089
100 Keyshanc — Part 1 II 41 1090
101 News from Castle Mansfeld I 41 100
102 Monoalphabetic substitution with camouflage — Part 4 I 41 100
103 RSA Factoring Challenge: RSA-704 II 40 0
104 Strange Message from Thessaloniki I 40 100
105 New Year's Greetings — Part 2 I 40 100
106 Monoalphabetic substitution with camouflage — Part 3 II 40 1089
107 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1086
108 Weakened Granit — Part 1 I 38 100
109 Music Code — Part 2 II 37 1087
110 Music Code — Part 1 I 37 100
111 An 'unhearable' message I 37 100
112 New Year's Greetings — Part 3 I 37 100
113 Pigpen with a twist — Part 2 II 36 1088
114 Ku Klux Klan X 36 var
115 New Year's Greetings — Part 4 I 36 100
116 Double Column Transposition — Part 4 II 36 1099
117 Modular Sequences I 35 100
118 CMEA 1 II 35 1086
119 Double Column Transposition — Part 2 II 34 1098
120 Summer Job II 34 1149
121 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
122 RSA Factoring Challenge: RSA-210 II 33 0
123 Keyshanc — Part 2 II 32 1090
124 Advent-Challenge — Part 2 II 32 1135
125 Pigpen with a twist — Part 3 II 32 1088
126 Double Column Transposition — Part 3 II 30 1098
127 Kaskade-S/T — Part 3 II 29 1087
128 ORYX Stream Cipher — Part 3 (revised) II 29 1094
129 Advent Challenge — Part 4 II 29 1136
130 Trendy Messenger II 28 1149
131 Advent Challenge — Part 3 II 28 1136
132 Heartbleed — Part 3 II 28 1100
133 Fastest in the West II 26 1149
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1090
135 Lattice Part 1 II 24 1087
136 CMEA 2 III 24 13144
137 Spanish Strip Cipher — Part 1 II 23 1098
138 Double Column Transposition — Part 1 II 22 1098
139 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
140 Homophonic Encryption — Part 1 II 21 1223
141 RSA with Special d III 21 13137
142 Typex — Part 1 II 21 1093
143 RSA Factoring Challenge: RSA-220 II 19 0
144 Spanish Strip Cipher — Part 2 II 19 1098
145 Typex — Part 2 II 18 1094
146 Handycipher made in love — Part 1 II 18 1191
147 Homophonic Encryption — Part 2 II 18 1226
148 Monoalphabetic Substitution with Nostradamus Flavor II 18 1191
149 Homophonic Encryption — Part 3 II 17 1226
150 Concealed Messages — Vigenère's Night Sky X 16 var
151 M-138 — Part 4 II 16 1102
152 RSA Factoring Challenge: RSA-230 II 16 0
153 Purple 1 II 15 1086
154 Weakened Handycipher — Part 1 II 15 1104
155 Weakened Handycipher — Part 3 II 14 1104
156 AES ECB Wrong Encoding II 14 1135
157 New Year's Greetings — Part 5 II 14 1111
158 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1114
159 Handycipher made in love — Part 2 II 13 1235
160 Breaking a Filter Generator II 13 1162
161 Weakened Handycipher — Part 2 II 13 1104
162 Homophonic Encryption — Part 4 II 12 1226
163 Sigaba Part 1 II 12 1086
164 Flawed Usage of a OTP Cipher by the BND II 12 1106
165 ORYX Stream Cipher — Part 4a II 11 1098
166 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
167 Cascading Encryption — Part 3/3 II 11 1093
168 Cascading Encryption — Part 2/3 II 11 1093
169 Kaskade-S/T — Part 5 II 10 1087
170 Akelarre Part 1 II 9 1086
171 Handycipher — Part 2 II 7 1103
172 Handycipher — Part 3 III 6 13435
173 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1127
174 A Cloaked Substitution Cipher — Part 1 II 6 1725
175 Double Column Transposition — Part 5 II 6 1099
176 Hilly — Part 1 II 6 1120
177 Handycipher — Part 5 III 5 13601
178 Weakened Handycipher — Part 6 II 5 1114
179 Handycipher — Part 1 II 5 1103
180 Handycipher — Part 6 III 5 13601
181 Weakened Handycipher — Part 4 II 5 1114
182 Weakened Handycipher — Part 5 II 5 1114
183 Notes of an Italian Soldier X 4 var
184 Holographic Encryption — Part 1 II 4 1123
185 Handycipher — Part 4 III 4 13601
186 Extended Handycipher — Part 2 II 3 1104
187 Extended Handycipher — Part 1 II 3 1104
188 Extended Handycipher — Part 5 III 3 13601
189 Sigaba Part 2 III 3 13137
190 Extended Handycipher — Part 4 III 3 13601
191 The T52 Sturgeon Challenge — Part 1 II 3 1302
192 Extended Handycipher — Part 3 II 3 1104
193 Spirale — Part 1 II 3 1106
194 Handycipher — Part 9 III 3 13700
195 Spirale — Part 3 II 3 1106
196 The Vatican Challenge — Part 1 X 3 var
197 Spirale — Part 2 II 3 1106
198 Handycipher — Part 8 III 3 13700
199 "The Road" — Part 1 II 3 1174
200 The Vatican Challenge — Part 2 X 3 var
201 Double Column Transposition X 2 var
202 Handycipher — Part 7 III 2 13700
203 Extended Handycipher — Part 6 III 2 13601
204 Holographic Encryption — Part 2 II 2 1123
205 The T52 Sturgeon Challenge — Part 8 II 2 1433
206 The T52 Sturgeon Challenge — Part 4 II 2 1327
207 The T52 Sturgeon Challenge — Part 3 II 2 1327
208 The T52 Sturgeon Challenge — Part 11 II 2 1433
209 The T52 Sturgeon Challenge — Part 12 II 2 1433
210 The T52 Sturgeon Challenge — Part 7 II 2 1433
211 The T52 Sturgeon Challenge — Part 6 II 2 1433
212 The T52 Sturgeon Challenge — Part 5 II 2 1433
213 Weakened ElsieFour — Part 3 II 2 1131
214 The T52 Sturgeon Challenge — Part 2 II 2 1327
215 ORYX Stream Cipher — Part 4b III 2 13353
216 Unknown Author X 2 var
217 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
218 ElsieFour — Part 1 III 2 13864
219 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1114
220 Hilly — Part 2 II 1 1132
221 Substitution Cipher with Non-Prefix Codes III 1 13170
222 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1091
223 The T52 Sturgeon Challenge — Part 10 II 1 1433
224 Beale Ciphers X 1 var
225 Handycipher — Part 10 II 1 1270
226 The T52 Sturgeon Challenge — Part 9 II 1 1433
227 Weakened ElsieFour — Part 1 II 1 1145
228 The Vatican Challenge — Part 4 X 1 var
229 Kryptos X 0 var
230 RSA Factoring Challenge: RSA-896 III 0 13205
231 D'Agapeyeff X 0 var
232 "The Road" — Part 2 II 0 1174
233 "The Road" — Part 3 II 0 1174
234 The Vatican Challenge — Part 3 X 0 var
235 The Vatican Challenge — Part 5 X 0 var
236 RSA Factoring Challenge: RSA-232 III 0 13205
237 RSA Factoring Challenge: RSA-240 III 0 13205
238 RSA Factoring Challenge: RSA-260 III 0 13205
239 RSA Factoring Challenge: RSA-250 III 0 13205
240 Dorabella X 0 var
241 Weakened ElsieFour — Part 2 II 0 1145
242 RSA Factoring Challenge: RSA-270 III 0 13205
243 Weakened Granit — Part 3 II 0 1107
244 RSA Factoring Challenge: RSA-440 III 0 13205
245 Double Column Transposition Reloaded — Part 1 III 0 13326
246 RSA Factoring Challenge: RSA-450 III 0 13205
247 RSA Factoring Challenge: RSA-460 III 0 13205
248 RSA Factoring Challenge: RSA-1536 III 0 13205
249 Double Column Transposition Reloaded — Part 2 III 0 13326
250 Double Column Transposition Reloaded — Part 3 III 0 13326
251 ORYX Stream Cipher — Part 4c III 0 13353
252 Spanish Strip Cipher — Part 3 X 0 var
253 RSA Factoring Challenge: RSA-420 III 0 13205
254 RSA Factoring Challenge: RSA-430 III 0 13205
255 ORYX Stream Cipher — Part 4d III 0 13292
256 RSA Factoring Challenge: RSA-470 III 0 13205
257 The third ENIGMA M4 message X 0 var
258 Twelve-Year-Old Murder Case X 0 var
259 Kaskade-S/T — Part 4 II 0 1087
260 Digital Signatures: DSA with Medium Fields III 0 13181
261 RSA Factoring Challenge: RSA-2048 III 0 13205
262 RSA Factoring Challenge: RSA-617 III 0 13205
263 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13149
264 RSA Factoring Challenge: RSA-480 III 0 13205
265 RSA Factoring Challenge: RSA-490 III 0 13205
266 RSA Factoring Challenge: RSA-500 III 0 13205
267 RSA Factoring Challenge: RSA-410 III 0 13205
268 RSA Factoring Challenge: RSA-400 III 0 13205
269 RSA Factoring Challenge: RSA-1024 III 0 13205
270 RSA Factoring Challenge: RSA-310 III 0 13205
271 Weakened Granit — Part 2 II 0 1107
272 RSA Factoring Challenge: RSA-320 III 0 13205
273 RSA Factoring Challenge: RSA-309 III 0 13205
274 RSA Factoring Challenge: RSA-300 III 0 13205
275 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1114
276 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1114
277 RSA Factoring Challenge: RSA-280 III 0 13205
278 RSA Factoring Challenge: RSA-290 III 0 13205
279 Spirale — Part 4 III 0 13487
280 Double-Column Transposition/Granit — Part 3 II 0 1105
281 RSA Factoring Challenge: RSA-370 III 0 13205
282 World Record Challenge: Break 65 Bits of AES III 0 13137
283 RSA Factoring Challenge: RSA-380 III 0 13205
284 RSA Factoring Challenge: RSA-390 III 0 13205
285 RSA Factoring Challenge: RSA-360 III 0 13205
286 RSA Factoring Challenge: RSA-350 III 0 13205
287 Double-Column Transposition/Granit — Part 2 II 0 1105
288 Double-Column Transposition/Granit — Part 1 II 0 1105
289 RSA Factoring Challenge: RSA-330 III 0 13205
290 RSA Factoring Challenge: RSA-340 III 0 13205
291 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1114
 
 
powered by the CrypTool project  CrypTool

 

   +++    [00:59 - 24.08.2019] Bart13 solved the Level II challenge 'A Cloaked Substitution Cipher — Part 1'    +++    [22:06 - 23.08.2019] Stephje1978 solved the Level II challenge 'Hybrid Encryption I'    +++    [18:51 - 23.08.2019] Stephje1978 solved the Level II challenge 'Not-so-Secret Message from Malawi — Part I (RSA)'    +++    [18:24 - 23.08.2019] edulycan solved the Level I challenge 'Number Sequence — Part 8'    +++    [18:07 - 23.08.2019] edulycan solved the Level I challenge 'A hidden word'    +++