MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10017
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3691 100
2 Original Caesar Cipher I 2513 100
3 Number Sequence — Part 2 I 1775 100
4 Caesar Encryption I 1226 100
5 Beaver Code I 993 100
6 Letter to the Templars — Part 1 I 863 100
7 Number Sequence — Part 3 I 825 100
8 Letter to the Templars — Part 2 I 689 100
9 Number Sequence — Part 4 I 680 100
10 A hidden word I 676 100
11 Letter to the Templars — Part 3 II 577 1091
12 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 482 100
13 Monoalphabetic Substitution I 475 100
14 Cracking SHA1-Hashed Passwords II 431 1086
15 Factorization Cipher — Part 1 I 429 100
16 Grille Cipher I 402 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 354 100
18 Advent-Challenge — Part 1 I 308 100
19 A modified homophonic cipher with reduced alphabets — Part 2 I 304 100
20 Number Sequence — Part 8 I 280 100
21 One-Time Pad with Flaws I 270 100
22 Snow White and the seven dwarfs I 253 100
23 Alice's Birthday Party (Part 1) II 252 1085
24 Alice's Birthday Party (Part 2) II 243 1085
25 From Russia with Love I 235 100
26 How do you become a big cryptographer? I 194 100
27 Broadcasting and low exponent — RSA-Attack II 193 1087
28 Modified Caesar Cipher I 192 100
29 Reserve Hand Procedure — Part 1 I 174 100
30 M-138 — Part 1 I 169 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 166 1085
32 Brute-Force-Attack on Triple-DES with Reduced Key Space II 161 1085
33 Letter from the Alleged Countess Julie von Ortenburg I 157 100
34 Classical Ciphers^3 I 157 100
35 Enigma Messages with Repeated Letters — Part 1 I 155 100
36 Nils away on travel I 143 100
37 Hybrid Encryption I II 141 1085
38 Pigpen with a twist — Part 1 I 139 100
39 RSA: Two different keys — same ciphertext II 139 1087
40 The Book Code: A Challenge for Bookworms I 130 100
41 ¿No Hablas Español? No problemo! I 127 100
42 Factorization Cipher — Part 2 II 126 1088
43 Molehunt (Part 1/3) I 125 100
44 Molehunt (Part 2/3) I 123 100
45 Enigma Part 1 II 117 1085
46 A Secret Message from Castle Mansfeld I 113 100
47 Trifid Cipher I 108 100
48 A really long number sequence II 108 1087
49 Number Sequence — Part 6 I 106 100
50 M-138 — Part 2 II 104 1100
51 ADFGVX — Part 2 I 104 100
52 Image Noise I 101 100
53 Kaskade-S/T — Part 1 I 98 100
54 Autokey Cipher I 98 100
55 ADFGVX — Part 1 I 95 100
56 Playfair Encryption I 95 100
57 Enigma Combinatorics I 92 100
58 Playfair with hints about the grid I 91 100
59 Double Columnar Transposition I 90 100
60 Heartbleed — Part 1 I 89 100
61 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 86 100
62 ECDH-Key Exchange for Beginners I 84 100
63 Cryptanalysis Hacking Puzzles — Part 2 I 82 100
64 A hidden word — Part 2 I 82 100
65 Factorization Cipher — Part 3 II 80 1088
66 ORYX Stream Cipher Part I II 77 1085
67 Enigma Part 2 II 77 1085
68 Number Sequence — Part 10 I 76 100
69 Zodiac Cipher I 76 100
70 The Last Note I 76 100
71 Number Sequence — Part 5 I 74 100
72 Number Sequence — Part 9 I 74 100
73 Partial Key Exposure with RSA — Part 1 II 72 1089
74 Hill Cipher with Sudoku Key I 71 100
75 Enigma Messages with Repeated Letters — Part 3 I 70 100
76 Molehunt (Part 3/3) II 70 1085
77 Enigma Messages with Repeated Letters — Part 2 I 69 100
78 Enigma Messages I 68 100
79 Enigma Messages with Repeated Letters — Part 5 I 67 100
80 Multilingual Monoalphabetic Substitution I 65 100
81 Smartcard RSA II 64 1085
82 BCR code (Book-Caesar-RSA) II 64 1090
83 Number Sequence — Part 7 I 63 100
84 Cascading Encryption — Part 1/3 I 63 100
85 Enigma Messages with Repeated Letters — Part 4 I 61 100
86 Turing Bombe Enigma I I 61 100
87 Heartbleed — Part 2 I 60 100
88 AES key — encoded in the machine readable zone of a European ePassport II 60 1088
89 Unusual encryption using a diophantine equation II 57 1087
90 Recycled One-Time Pad I 57 100
91 An Invisible Message I 54 100
92 Monoalphabetic substitution with camouflage — Part 1 I 54 100
93 Kaskade-S/T — Part 2 II 48 1086
94 M-138 — Part 3 II 47 1100
95 The Einstein Enigma II 47 1132
96 ORYX Stream Cipher Part II II 45 1085
97 New Year's Greetings — Part 1 I 44 100
98 Monoalphabetic substitution with camouflage — Part 2 II 44 1088
99 Unconcealed RSA messages II 44 1088
100 News from Castle Mansfeld I 43 100
101 Monoalphabetic substitution with camouflage — Part 4 I 42 100
102 Keyshanc — Part 1 II 42 1089
103 RSA Factoring Challenge: RSA-704 II 41 0
104 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 41 1085
105 New Year's Greetings — Part 2 I 41 100
106 Strange Message from Thessaloniki I 41 100
107 Monoalphabetic substitution with camouflage — Part 3 II 40 1088
108 Modular Sequences I 39 100
109 Weakened Granit — Part 1 I 39 100
110 An 'unhearable' message I 38 100
111 Music Code — Part 1 I 38 100
112 New Year's Greetings — Part 3 I 38 100
113 Music Code — Part 2 II 38 1086
114 Pigpen with a twist — Part 2 II 37 1087
115 Ku Klux Klan X 36 var
116 New Year's Greetings — Part 4 I 36 100
117 CMEA 1 II 36 1085
118 Double Column Transposition — Part 4 II 36 1097
119 Double Column Transposition — Part 2 II 35 1097
120 Summer Job II 35 1140
121 RSA Factoring Challenge: RSA-210 II 35 0
122 Not-so-Secret Message from Malawi — Part II (ECC) II 34 1085
123 Pigpen with a twist — Part 3 II 33 1087
124 Keyshanc — Part 2 II 33 1089
125 Advent-Challenge — Part 2 II 32 1129
126 Double Column Transposition — Part 3 II 31 1097
127 ORYX Stream Cipher — Part 3 (revised) II 30 1093
128 Heartbleed — Part 3 II 30 1099
129 Advent Challenge — Part 4 II 29 1130
130 Kaskade-S/T — Part 3 II 29 1086
131 Trendy Messenger II 28 1140
132 Advent Challenge — Part 3 II 28 1130
133 Fastest in the West II 26 1140
134 Monoalphabetic Substitution with Camouflage — Part 5 II 25 1089
135 CMEA 2 III 24 13130
136 Spanish Strip Cipher — Part 1 II 24 1096
137 Lattice Part 1 II 24 1086
138 Double Column Transposition — Part 1 II 23 1097
139 Homophonic Encryption — Part 1 II 22 1183
140 Cryptanalysis Hacking Puzzles — Part 1 I 21 100
141 Typex — Part 1 II 21 1092
142 RSA with Special d III 21 13124
143 RSA Factoring Challenge: RSA-220 II 20 0
144 Spanish Strip Cipher — Part 2 II 20 1096
145 Homophonic Encryption — Part 2 II 19 1184
146 Monoalphabetic Substitution with Nostradamus Flavor II 19 1167
147 Typex — Part 2 II 18 1092
148 Handycipher made in love — Part 1 II 18 1167
149 Homophonic Encryption — Part 3 II 18 1184
150 RSA Factoring Challenge: RSA-230 II 17 0
151 M-138 — Part 4 II 16 1100
152 Breaking a Filter Generator II 16 1149
153 Concealed Messages — Vigenère's Night Sky X 16 var
154 Weakened Handycipher — Part 1 II 15 1103
155 Purple 1 II 15 1085
156 Homophonic Encryption — Part 4 II 15 1184
157 AES ECB Wrong Encoding II 15 1129
158 Weakened Handycipher — Part 3 II 14 1103
159 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1111
160 A Cloaked Substitution Cipher — Part 1 II 14 1224
161 New Year's Greetings — Part 5 II 14 1109
162 Flawed Usage of a OTP Cipher by the BND II 13 1104
163 Handycipher made in love — Part 2 II 13 1187
164 A Cloaked Substitution Cipher — Part 2 II 13 1227
165 Weakened Handycipher — Part 2 II 13 1103
166 Sigaba Part 1 II 12 1085
167 Cascading Encryption — Part 2/3 II 11 1092
168 ORYX Stream Cipher — Part 4a II 11 1097
169 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1086
170 Cascading Encryption — Part 3/3 II 11 1092
171 Kaskade-S/T — Part 5 II 10 1086
172 Akelarre Part 1 II 9 1085
173 Hilly — Part 1 II 8 1117
174 Cipher ID — Part 1 II 8 1385
175 Polyphonic Substitution Cipher — Part 1 II 7 1398
176 Handycipher — Part 2 II 7 1101
177 Double Column Transposition — Part 5 II 7 1098
178 The T52 Sturgeon Challenge — Part 1 II 6 1205
179 Handycipher — Part 3 III 6 13406
180 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1122
181 Handycipher — Part 5 III 5 13558
182 Handycipher — Part 6 III 5 13558
183 Handycipher — Part 1 II 5 1101
184 Weakened Handycipher — Part 4 II 5 1111
185 "The Road" — Part 1 II 5 1157
186 Weakened Handycipher — Part 5 II 5 1111
187 Holographic Encryption — Part 1 II 5 1119
188 The T52 Sturgeon Challenge — Part 2 II 5 1209
189 Weakened Handycipher — Part 6 II 5 1111
190 Notes of an Italian Soldier X 4 var
191 Handycipher — Part 4 III 4 13558
192 The T52 Sturgeon Challenge — Part 3 II 4 1209
193 Holographic Encryption — Part 2 II 3 1119
194 The Vatican Challenge — Part 1 X 3 var
195 Spirale — Part 1 II 3 1104
196 The Vatican Challenge — Part 2 X 3 var
197 Spirale — Part 3 II 3 1104
198 Handycipher — Part 9 III 3 13646
199 Extended Handycipher — Part 5 III 3 13558
200 Sigaba Part 2 III 3 13124
201 Handycipher — Part 8 III 3 13646
202 Extended Handycipher — Part 4 III 3 13558
203 Spirale — Part 2 II 3 1104
204 Extended Handycipher — Part 2 II 3 1102
205 Extended Handycipher — Part 1 II 3 1102
206 Extended Handycipher — Part 3 II 3 1102
207 The T52 Sturgeon Challenge — Part 4 II 3 1209
208 ORYX Stream Cipher — Part 4b III 2 13329
209 The T52 Sturgeon Challenge — Part 12 II 2 1218
210 The T52 Sturgeon Challenge — Part 5 II 2 1218
211 The T52 Sturgeon Challenge — Part 11 II 2 1218
212 Handycipher — Part 7 III 2 13646
213 Extended Handycipher — Part 6 III 2 13558
214 Unknown Author X 2 var
215 The T52 Sturgeon Challenge — Part 8 II 2 1218
216 The T52 Sturgeon Challenge — Part 6 II 2 1218
217 RSA Factoring Challenge: RSA-240 III 2 0
218 The T52 Sturgeon Challenge — Part 7 II 2 1218
219 Weakened ElsieFour — Part 1 II 2 1137
220 ElsieFour — Part 1 III 2 13787
221 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
222 Weakened ElsieFour — Part 3 II 2 1126
223 Double Column Transposition X 2 var
224 Beale Ciphers X 1 var
225 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1111
226 The T52 Sturgeon Challenge — Part 10 II 1 1218
227 Hilly — Part 2 II 1 1127
228 The T52 Sturgeon Challenge — Part 9 II 1 1218
229 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1090
230 Substitution Cipher with Non-Prefix Codes III 1 13155
231 The Vatican Challenge — Part 4 X 1 var
232 Handycipher — Part 10 II 1 1198
233 "The Road" — Part 2 II 0 1157
234 RSA Factoring Challenge: RSA-470 III 0 13188
235 The Heavy T52 Sturgeon Challenge — Part 3 III 0 15779
236 The Heavy T52 Sturgeon Challenge — Part 2 III 0 15496
237 "The Road" — Part 3 II 0 1157
238 RSA Factoring Challenge: RSA-2048 III 0 13188
239 Kryptos X 0 var
240 World Record Challenge: Break 65 Bits of AES III 0 13124
241 The Heavy T52 Sturgeon Challenge — Part 1 III 0 15382
242 RSA Factoring Challenge: RSA-490 III 0 13188
243 Weakened ElsieFour — Part 2 II 0 1137
244 The Vatican Challenge — Part 5 X 0 var
245 RSA Factoring Challenge: RSA-480 III 0 13188
246 The Vatican Challenge — Part 3 X 0 var
247 RSA Factoring Challenge: RSA-617 III 0 13188
248 Dorabella X 0 var
249 D'Agapeyeff X 0 var
250 RSA Factoring Challenge: RSA-500 III 0 13188
251 RSA Factoring Challenge: RSA-460 III 0 13188
252 RSA Factoring Challenge: RSA-1024 III 0 13188
253 RSA Factoring Challenge: RSA-310 III 0 13188
254 RSA Factoring Challenge: RSA-320 III 0 13188
255 RSA Factoring Challenge: RSA-330 III 0 13188
256 RSA Factoring Challenge: RSA-309 III 0 13188
257 RSA Factoring Challenge: RSA-300 III 0 13188
258 RSA Factoring Challenge: RSA-270 III 0 13188
259 RSA Factoring Challenge: RSA-896 III 0 13188
260 RSA Factoring Challenge: RSA-280 III 0 13188
261 RSA Factoring Challenge: RSA-290 III 0 13188
262 ORYX Stream Cipher — Part 4c III 0 13329
263 RSA Factoring Challenge: RSA-340 III 0 13188
264 Double Column Transposition Reloaded — Part 3 III 0 13304
265 Double Column Transposition Reloaded — Part 2 III 0 13304
266 Double Column Transposition Reloaded — Part 1 III 0 13304
267 RSA Factoring Challenge: RSA-390 III 0 13188
268 RSA Factoring Challenge: RSA-380 III 0 13188
269 RSA Factoring Challenge: RSA-370 III 0 13188
270 Spanish Strip Cipher — Part 3 X 0 var
271 RSA Factoring Challenge: RSA-410 III 0 13188
272 RSA Factoring Challenge: RSA-350 III 0 13188
273 RSA Factoring Challenge: RSA-360 III 0 13188
274 RSA Factoring Challenge: RSA-420 III 0 13188
275 RSA Factoring Challenge: RSA-260 III 0 13188
276 Kaskade-S/T — Part 4 II 0 1086
277 Digital Signatures: DSA with Medium Fields III 0 13166
278 The third ENIGMA M4 message X 0 var
279 ORYX Stream Cipher — Part 4d III 0 13272
280 RSA Factoring Challenge: RSA-400 III 0 13188
281 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1111
282 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13135
283 Twelve-Year-Old Murder Case X 0 var
284 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1111
285 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1111
286 Weakened Granit — Part 3 II 0 1105
287 Weakened Granit — Part 2 II 0 1105
288 Double-Column Transposition/Granit — Part 1 II 0 1103
289 RSA Factoring Challenge: RSA-440 III 0 13188
290 RSA Factoring Challenge: RSA-430 III 0 13188
291 RSA Factoring Challenge: RSA-250 III 0 13188
292 Double-Column Transposition/Granit — Part 2 II 0 1103
293 Double-Column Transposition/Granit — Part 3 II 0 1103
294 RSA Factoring Challenge: RSA-450 III 0 13188
295 RSA Factoring Challenge: RSA-232 III 0 13188
296 Spirale — Part 4 III 0 13454
297 RSA Factoring Challenge: RSA-1536 III 0 13188
 
 
powered by the CrypTool project  CrypTool

 

   +++    [23:21 - 08.12.2019] okurka51 solved the Level I challenge 'Number Sequence — Part 4'    +++    [21:13 - 08.12.2019] Ausdemwald solved the Level I challenge 'Snow White and the seven dwarfs'    +++    [16:27 - 08.12.2019] lim0n solved the Level II challenge 'Pigpen with a twist — Part 2'    +++    [02:12 - 08.12.2019] XP-72 solved the Level I challenge 'Number Sequence — Part 10'    +++    [13:35 - 07.12.2019] Ausdemwald solved the Level I challenge 'Number Sequence — Part 2'    +++