MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

11120
Follow us: Facebook Twitter
Dear users, we apologize for the long response times of our server. We are currently in the closing stages of developing a completely redesigned site with much better performance, and we are confident to go live this summer. Thanks for your understanding.
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 4127 100
2 Original Caesar Cipher I 2857 100
3 Number Sequence — Part 2 I 2014 100
4 Caesar Encryption I 1358 100
5 Beaver Code I 1129 100
6 Letter to the Templars — Part 1 I 984 100
7 Number Sequence — Part 3 I 942 100
8 Letter to the Templars — Part 2 I 793 100
9 Number Sequence — Part 4 I 781 100
10 A hidden word I 778 100
11 Letter to the Templars — Part 3 II 678 1086
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 555 100
13 Monoalphabetic Substitution I 529 100
14 Cracking SHA1-Hashed Passwords II 513 1082
15 Factorization Cipher — Part 1 I 477 100
16 Grille Cipher I 458 100
17 Advent-Challenge — Part 1 I 393 100
18 A modified homophonic cipher with reduced alphabets — Part 1 I 377 100
19 Number Sequence — Part 8 I 349 100
20 A modified homophonic cipher with reduced alphabets — Part 2 I 324 100
21 One-Time Pad with Flaws I 299 100
22 Alice's Birthday Party (Part 1) II 285 1081
23 Alice's Birthday Party (Part 2) II 279 1081
24 Snow White and the seven dwarfs I 279 100
25 From Russia with Love I 264 100
26 Broadcasting and low exponent — RSA Attack II 222 1083
27 Modified Caesar Cipher I 218 100
28 How do you become a big cryptographer? I 214 100
29 M-138 — Part 1 I 199 100
30 Brute-Force-Attack on Triple-DES with Reduced Key Space II 190 1081
31 Not-so-Secret Message from Malawi — Part I (RSA) II 186 1081
32 Reserve Hand Procedure — Part 1 I 186 100
33 Classical Ciphers^3 I 169 100
34 Letter from the Alleged Countess Julie von Ortenburg I 168 100
35 Hybrid Encryption I II 165 1081
36 Enigma Messages with Repeated Letters — Part 1 I 162 100
37 Nils away on travel I 155 100
38 RSA: Two different keys — same ciphertext II 152 1083
39 Pigpen with a twist — Part 1 I 148 100
40 Molehunt (Part 1/3) I 146 100
41 Cryptanalysis Hacking Puzzles — Part 2 I 146 100
42 Factorization Cipher — Part 2 II 143 1084
43 ¿No Hablas Español? No problemo! I 143 100
44 Number Sequence — Part 6 I 141 100
45 The Book Code: A Challenge for Bookworms I 141 100
46 Molehunt (Part 2/3) I 138 100
47 Autokey Cipher I 134 100
48 Enigma Part 1 II 128 1081
49 M-138 — Part 2 II 125 1093
50 Image Noise I 120 100
51 A Secret Message from Castle Mansfeld I 120 100
52 Trifid Cipher I 116 100
53 ADFGVX — Part 2 I 114 100
54 A really long number sequence II 114 1083
55 ADFGVX — Part 1 I 107 100
56 Playfair Encryption I 107 100
57 Playfair with hints about the grid I 105 100
58 Double Columnar Transposition I 104 100
59 Kaskade-S/T — Part 1 I 102 100
60 Number Sequence — Part 9 I 101 100
61 Number Sequence — Part 10 I 100 100
62 Enigma Combinatorics I 98 100
63 A hidden word — Part 2 I 97 100
64 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 95 100
65 Zodiac Cipher I 92 100
66 Factorization Cipher — Part 3 II 90 1084
67 Heartbleed — Part 1 I 90 100
68 ECDH-Key Exchange for Beginners I 89 100
69 Number Sequence — Part 5 I 88 100
70 Hill Cipher with Sudoku Key I 87 100
71 Enigma Part 2 II 86 1081
72 Number Sequence — Part 7 I 83 100
73 The Last Note I 82 100
74 Partial Key Exposure with RSA — Part 1 II 82 1084
75 Molehunt (Part 3/3) II 80 1081
76 ORYX Stream Cipher Part I II 79 1081
77 Enigma Messages with Repeated Letters — Part 3 I 75 100
78 Enigma Messages with Repeated Letters — Part 2 I 75 100
79 AES key — encoded in the machine readable zone of a European ePassport II 73 1084
80 Enigma Messages with Repeated Letters — Part 5 I 72 100
81 Smartcard RSA II 71 1081
82 Enigma Messages I 71 100
83 Multilingual Monoalphabetic Substitution I 71 100
84 BCR code (Book-Caesar-RSA) II 69 1085
85 Cascading Encryption — Part 1/3 I 67 100
86 Enigma Messages with Repeated Letters — Part 4 I 67 100
87 Turing Bombe Enigma I I 67 100
88 Recycled One-Time Pad I 63 100
89 Unusual encryption using a diophantine equation II 63 1083
90 Monoalphabetic substitution with camouflage — Part 1 I 60 100
91 Heartbleed — Part 2 I 60 100
92 Modular Sequences I 58 100
93 M-138 — Part 3 II 57 1093
94 An Invisible Message I 56 100
95 The Einstein Enigma II 56 1111
96 RSA Factoring Challenge: RSA-704 II 52 0
97 News from Castle Mansfeld I 51 100
98 Kaskade-S/T — Part 2 II 50 1082
99 Unconcealed RSA messages II 49 1083
100 Find the right route — Part 1 I 49 100
101 Monoalphabetic substitution with camouflage — Part 2 II 48 1084
102 New Year's Greetings — Part 1 I 47 100
103 Summer Job II 47 1114
104 ORYX Stream Cipher Part II II 47 1081
105 Strange Message from Thessaloniki I 46 100
106 Monoalphabetic substitution with camouflage — Part 4 I 46 100
107 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 45 1082
108 Advent-Challenge — Part 2 II 45 1109
109 Keyshanc — Part 1 II 45 1085
110 RSA Factoring Challenge: RSA-210 II 45 0
111 Double Column Transposition — Part 4 II 44 1091
112 Monoalphabetic substitution with camouflage — Part 3 II 44 1084
113 New Year's Greetings — Part 2 I 43 100
114 Weakened Granit — Part 1 I 43 100
115 CMEA 1 II 42 1081
116 Music Code — Part 2 II 41 1082
117 Music Code — Part 1 I 41 100
118 Double Column Transposition — Part 2 II 41 1090
119 New Year's Greetings — Part 3 I 41 100
120 An 'unhearable' message I 40 100
121 New Year's Greetings — Part 4 I 39 100
122 Ku Klux Klan X 38 var
123 Advent Challenge — Part 3 II 38 1109
124 Pigpen with a twist — Part 2 II 38 1083
125 Advent Challenge — Part 4 II 37 1109
126 Lightweight Introduction to Lattices — Part 1 I 37 100
127 Double Column Transposition — Part 3 II 37 1090
128 Not-so-Secret Message from Malawi — Part II (ECC) II 37 1081
129 Pigpen with a twist — Part 3 II 36 1083
130 Homophonic Encryption — Part 1 II 36 1125
131 Keyshanc — Part 2 II 35 1085
132 Heartbleed — Part 3 II 33 1091
133 Wheatstone Cryptograph — Part 1 I 33 101
134 Kaskade-S/T — Part 3 II 31 1082
135 Homophonic Encryption — Part 2 II 31 1125
136 Trendy Messenger II 31 1114
137 Fastest in the West II 31 1114
138 Polyhomophonic Substitution — Part 1 I 31 100
139 Homophonic Encryption — Part 3 II 30 1125
140 RSA Factoring Challenge: RSA-220 II 30 0
141 ORYX Stream Cipher — Part 3 (revised) II 30 1088
142 Lattice Part 1 II 30 1082
143 Spanish Strip Cipher — Part 1 II 30 1090
144 Double Column Transposition — Part 1 II 29 1090
145 Homophonic Encryption — Part 4 II 29 1125
146 Monoalphabetic Substitution with Nostradamus Flavor II 28 1122
147 Monoalphabetic Substitution with Camouflage — Part 5 II 28 1084
148 RSA Factoring Challenge: RSA-230 II 27 0
149 CMEA 2 III 27 13062
150 Lightweight Introduction to Lattices — Part 2 I 27 100
151 Cryptanalysis Hacking Puzzles — Part 1 I 26 100
152 Spanish Strip Cipher — Part 2 II 26 1090
153 Typex — Part 1 II 25 1087
154 Lightweight Introduction to Lattices — Part 3 II 25 1155
155 M-138 — Part 4 II 25 1093
156 RSA with Special d III 23 13057
157 Typex — Part 2 II 22 1087
158 Handycipher made in love — Part 1 II 22 1122
159 Find the right route — Part 2 I 21 100
160 Polyphonic Substitution Cipher — Part 1 II 20 1135
161 AES ECB Wrong Encoding II 20 1109
162 Polyhomophonic Substitution — Part 2 II 19 1144
163 The LoRa Cipher: Logic Randomness — Part 1 II 19 1141
164 Breaking a Filter Generator II 19 1117
165 Purple 1 II 18 1081
166 Find the right route — Part 3 I 17 100
167 Polyphonic Substitution Cipher — Part 2 II 17 1139
168 Handycipher made in love — Part 2 II 17 1126
169 Sigaba Part 1 II 16 1081
170 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 16 1100
171 RSA Factoring Challenge: RSA-240 III 16 0
172 Concealed Messages — Vigenère's Night Sky X 16 var
173 A Cloaked Substitution Cipher — Part 1 II 15 1130
174 Cipher ID — Part 1 II 15 1135
175 Weakened Handycipher — Part 1 II 15 1094
176 Flawed Usage of a OTP Cipher by the BND II 15 1095
177 New Year's Greetings — Part 5 II 15 1098
178 RSA Factoring Challenge: RSA-250 III 15 0
179 The T52 Sturgeon Challenge — Part 1 II 15 1128
180 Weakened Handycipher — Part 3 II 14 1094
181 A Cloaked Substitution Cipher — Part 2 II 14 1130
182 RSA Factoring Challenge: RSA-232 III 14 0
183 Polyhomophonic Substitution — Part 3 II 14 1145
184 Cascading Encryption — Part 2/3 II 14 1087
185 The T52 Sturgeon Challenge — Part 2 II 14 1128
186 Weakened Handycipher — Part 2 II 13 1094
187 Cascading Encryption — Part 3/3 II 12 1087
188 The T52 Sturgeon Challenge — Part 3 II 12 1128
189 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 12 1082
190 ORYX Stream Cipher — Part 4a II 11 1090
191 Kaskade-S/T — Part 5 II 10 1082
192 The T52 Sturgeon Challenge — Part 4 II 10 1128
193 Akelarre Part 1 II 10 1081
194 The SZ42 Challenge — Part 2 II 10 1157
195 The SZ42 Challenge — Part 1 II 10 1156
196 The SZ42 Challenge — Part 4 II 9 1161
197 Hilly — Part 1 II 9 1103
198 The T52 Sturgeon Challenge — Part 8 II 8 1129
199 The SIGABA Challenge — Part 2 II 8 1142
200 The SIGABA Challenge — Part 1 II 8 1142
201 The SZ42 Challenge — Part 5 II 8 1161
202 Double Column Transposition — Part 5 II 8 1091
203 The SZ42 Challenge — Part 3 II 8 1159
204 The T52 Sturgeon Challenge — Part 12 II 7 1129
205 The T52 Sturgeon Challenge — Part 11 II 7 1129
206 The SZ42 Challenge — Part 8 II 7 1170
207 The SZ42 Challenge — Part 6 II 7 1166
208 Handycipher — Part 2 II 7 1093
209 The T52 Sturgeon Challenge — Part 9 II 6 1129
210 Holographic Encryption — Part 1 II 6 1104
211 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1106
212 The T52 Sturgeon Challenge — Part 7 II 6 1129
213 Handycipher — Part 3 III 6 13273
214 The SZ42 Challenge — Part 7 II 6 1170
215 The SIGABA Challenge — Part 3 III 6 14029
216 Weakened Handycipher — Part 5 II 5 1099
217 Weakened Handycipher — Part 4 II 5 1099
218 Handycipher — Part 1 II 5 1093
219 The T52 Sturgeon Challenge — Part 10 II 5 1129
220 The SIGABA Challenge — Part 4 III 5 14035
221 The SZ42 Challenge — Part 9 II 5 1180
222 Sigaba Part 2 III 5 13057
223 "The Road" — Part 1 II 5 1119
224 Weakened Handycipher — Part 6 II 5 1099
225 Spirale — Part 2 II 5 1095
226 The T52 Sturgeon Challenge — Part 6 II 5 1129
227 Spirale — Part 1 II 5 1095
228 The T52 Sturgeon Challenge — Part 5 II 5 1129
229 Handycipher — Part 6 III 5 13376
230 Handycipher — Part 5 III 5 13376
231 Weakened ElsieFour — Part 1 II 4 1113
232 Weakened ElsieFour — Part 3 II 4 1108
233 Spirale — Part 3 II 4 1095
234 Notes of an Italian Soldier X 4 var
235 Handycipher — Part 4 III 4 13376
236 Wheatstone Cryptograph — Part 2 II 4 1252
237 ElsieFour — Part 1 III 4 13507
238 The Heavy T52 Sturgeon Challenge — Part 4 III 4 14069
239 The SZ42 Challenge — Part 11 II 3 1192
240 The Heavy T52 Sturgeon Challenge — Part 7 III 3 14079
241 Christmas Challenge 2019: Differential Cryptanalysis — Part 1 II 3 1137
242 Differential Cryptanalysis — Part 2 II 3 1140
243 The Vatican Challenge — Part 2 X 3 var
244 The SZ42 Challenge — Part 10 II 3 1192
245 The Vatican Challenge — Part 1 X 3 var
246 Extended Handycipher — Part 4 III 3 13376
247 Extended Handycipher — Part 1 II 3 1094
248 Handycipher — Part 9 III 3 13429
249 Handycipher — Part 8 III 3 13429
250 Extended Handycipher — Part 2 II 3 1094
251 Holographic Encryption — Part 2 II 3 1104
252 Extended Handycipher — Part 3 II 3 1094
253 Extended Handycipher — Part 5 III 3 13376
254 The Heavy T52 Sturgeon Challenge — Part 5 III 2 14076
255 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
256 The SIGABA Challenge — Part 5 III 2 14046
257 Extended Handycipher — Part 6 III 2 13376
258 The Heavy T52 Sturgeon Challenge — Part 3 III 2 13897
259 Handycipher — Part 7 III 2 13429
260 SIGABA CSP-889 — Part 3 III 2 15456
261 SIGABA CSP-2900 — Part 1 II 2 1660
262 SIGABA CSP-2900 — Part 2 II 2 1660
263 SIGABA CSP-2900 — Part 3 III 2 18390
264 SIGABA CSP-889 — Part 2 II 2 1265
265 SIGABA CSP-889 — Part 1 II 2 1265
266 Unknown Author X 2 var
267 Double Column Transposition X 2 var
268 ORYX Stream Cipher — Part 4b III 2 13218
269 The Vatican Challenge — Part 4 X 1 var
270 Handycipher — Part 10 II 1 1127
271 The Heavy T52 Sturgeon Challenge — Part 9 III 1 14087
272 The Heavy T52 Sturgeon Challenge — Part 6 III 1 14077
273 The SIGABA Challenge — Part 6 III 1 14057
274 The Heavy T52 Sturgeon Challenge — Part 1 III 1 13876
275 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1085
276 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1100
277 Substitution Cipher with Non-Prefix Codes III 1 13082
278 Hilly — Part 2 II 1 1108
279 Beale Ciphers X 1 var
280 RSA Factoring Challenge: RSA-420 III 0 13109
281 RSA Factoring Challenge: RSA-430 III 0 13109
282 ORYX Stream Cipher — Part 4c III 0 13218
283 Weakened ElsieFour — Part 2 II 0 1113
284 Kaskade-S/T — Part 4 II 0 1082
285 RSA Factoring Challenge: RSA-440 III 0 13109
286 The Heavy T52 Sturgeon Challenge — Part 8 III 0 14080
287 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1100
288 RSA Factoring Challenge: RSA-400 III 0 13109
289 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13066
290 RSA Factoring Challenge: RSA-410 III 0 13109
291 Twelve-Year-Old Murder Case X 0 var
292 RSA Factoring Challenge: RSA-450 III 0 13109
293 Kryptos X 0 var
294 RSA Factoring Challenge: RSA-460 III 0 13109
295 RSA Factoring Challenge: RSA-490 III 0 13109
296 D'Agapeyeff X 0 var
297 RSA Factoring Challenge: RSA-500 III 0 13109
298 Digital Signatures: DSA with Medium Fields III 0 13091
299 RSA Factoring Challenge: RSA-2048 III 0 13109
300 The third ENIGMA M4 message X 0 var
301 Double Column Transposition Reloaded — Part 1 III 0 13199
302 Double Column Transposition Reloaded — Part 2 III 0 13199
303 Dorabella X 0 var
304 RSA Factoring Challenge: RSA-390 III 0 13109
305 RSA Factoring Challenge: RSA-1536 III 0 13109
306 RSA Factoring Challenge: RSA-470 III 0 13109
307 Double Column Transposition Reloaded — Part 3 III 0 13199
308 RSA Factoring Challenge: RSA-480 III 0 13109
309 Spanish Strip Cipher — Part 3 X 0 var
310 RSA Factoring Challenge: RSA-380 III 0 13109
311 Weakened Granit — Part 2 II 0 1096
312 Weakened Granit — Part 3 II 0 1096
313 RSA Factoring Challenge: RSA-1024 III 0 13109
314 RSA Factoring Challenge: RSA-310 III 0 13109
315 Double-Column Transposition/Granit — Part 3 II 0 1095
316 Spirale — Part 4 III 0 13307
317 RSA Factoring Challenge: RSA-309 III 0 13109
318 RSA Factoring Challenge: RSA-300 III 0 13109
319 The Vatican Challenge — Part 5 X 0 var
320 The Vatican Challenge — Part 3 X 0 var
321 RSA Factoring Challenge: RSA-270 III 0 13109
322 RSA Factoring Challenge: RSA-896 III 0 13109
323 RSA Factoring Challenge: RSA-290 III 0 13109
324 RSA Factoring Challenge: RSA-280 III 0 13109
325 Double-Column Transposition/Granit — Part 2 II 0 1095
326 Double-Column Transposition/Granit — Part 1 II 0 1095
327 RSA Factoring Challenge: RSA-617 III 0 13109
328 RSA Factoring Challenge: RSA-340 III 0 13109
329 RSA Factoring Challenge: RSA-350 III 0 13109
330 RSA Factoring Challenge: RSA-360 III 0 13109
331 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1100
332 RSA Factoring Challenge: RSA-370 III 0 13109
333 RSA Factoring Challenge: RSA-330 III 0 13109
334 "The Road" — Part 2 II 0 1119
335 The Heavy T52 Sturgeon Challenge — Part 2 III 0 13884
336 RSA Factoring Challenge: RSA-260 III 0 13109
337 World Record Challenge: Break 65 Bits of AES III 0 13057
338 RSA Factoring Challenge: RSA-320 III 0 13109
339 "The Road" — Part 3 II 0 1119
340 ORYX Stream Cipher — Part 4d III 0 13174
341 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1100
 
 
powered by the CrypTool project  CrypTool

 

   +++    [09:42 - 03.08.2021] george4096 solved the Level II challenge 'SIGABA CSP-2900 — Part 1'    +++    [06:31 - 03.08.2021] george4096 solved the Level II challenge 'SIGABA CSP-2900 — Part 2'    +++    [21:27 - 02.08.2021] nugakmog solved the Level I challenge 'Number Sequence — Part 2'    +++    [21:14 - 02.08.2021] nugakmog solved the Level I challenge 'Original Caesar Cipher'    +++    [20:57 - 02.08.2021] nugakmog solved the Level I challenge 'Number Sequence'    +++