MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9655
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 3553 100
2 Original Caesar Cipher I 2404 100
3 Number Sequence — Part 2 I 1702 100
4 Caesar Encryption I 1188 100
5 Beaver Code I 950 100
6 Letter to the Templars — Part 1 I 828 100
7 Number Sequence — Part 3 I 797 100
8 Letter to the Templars — Part 2 I 657 100
9 Number Sequence — Part 4 I 650 100
10 A hidden word I 637 100
11 Letter to the Templars — Part 3 II 545 1092
12 Monoalphabetic Substitution I 470 100
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 462 100
14 Factorization Cipher — Part 1 I 414 100
15 Cracking SHA1-Hashed Passwords II 410 1087
16 Grille Cipher I 385 100
17 A modified homophonic cipher with reduced alphabets — Part 1 I 346 100
18 A modified homophonic cipher with reduced alphabets — Part 2 I 298 100
19 Advent-Challenge — Part 1 I 272 100
20 One-Time Pad with Flaws I 263 100
21 Number Sequence — Part 8 I 260 100
22 Snow White and the seven dwarfs I 243 100
23 Alice's Birthday Party (Part 1) II 240 1086
24 Alice's Birthday Party (Part 2) II 232 1086
25 From Russia with Love I 228 100
26 How do you become a big cryptographer? I 187 100
27 Broadcasting and low exponent — RSA-Attack II 186 1088
28 Modified Caesar Cipher I 186 100
29 Reserve Hand Procedure — Part 1 I 170 100
30 Not-so-Secret Message from Malawi — Part I (RSA) II 161 1086
31 Brute-Force-Attack on Triple-DES with Reduced Key Space II 158 1086
32 Letter from the Alleged Countess Julie von Ortenburg I 155 100
33 Classical Ciphers^3 I 155 100
34 M-138 — Part 1 I 154 100
35 Enigma Messages with Repeated Letters — Part 1 I 147 100
36 Hybrid Encryption I II 137 1086
37 Nils away on travel I 135 100
38 Pigpen with a twist — Part 1 I 133 100
39 RSA: Two different keys — same ciphertext II 132 1088
40 The Book Code: A Challenge for Bookworms I 126 100
41 Factorization Cipher — Part 2 II 124 1089
42 Molehunt (Part 1/3) I 121 100
43 Molehunt (Part 2/3) I 118 100
44 ¿No Hablas Español? No problemo! I 118 100
45 Enigma Part 1 II 116 1086
46 A Secret Message from Castle Mansfeld I 111 100
47 A really long number sequence II 104 1089
48 Trifid Cipher I 104 100
49 ADFGVX — Part 2 I 102 100
50 Number Sequence — Part 6 I 99 100
51 Image Noise I 96 100
52 M-138 — Part 2 II 95 1103
53 Kaskade-S/T — Part 1 I 94 100
54 ADFGVX — Part 1 I 92 100
55 Playfair Encryption I 92 100
56 Enigma Combinatorics I 89 100
57 Playfair with hints about the grid I 88 100
58 Heartbleed — Part 1 I 87 100
59 Double Columnar Transposition I 86 100
60 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 84 100
61 ECDH-Key Exchange for Beginners I 81 100
62 Factorization Cipher — Part 3 II 77 1090
63 Autokey Cipher I 76 100
64 A hidden word — Part 2 I 76 100
65 The Last Note I 75 100
66 Zodiac Cipher I 75 100
67 ORYX Stream Cipher Part I II 75 1086
68 Enigma Part 2 II 74 1086
69 Partial Key Exposure with RSA — Part 1 II 72 1090
70 Hill Cipher with Sudoku Key I 70 100
71 Enigma Messages with Repeated Letters — Part 3 I 67 100
72 Molehunt (Part 3/3) II 67 1086
73 Number Sequence — Part 5 I 66 100
74 Enigma Messages with Repeated Letters — Part 2 I 66 100
75 Number Sequence — Part 10 I 66 100
76 Enigma Messages I 65 100
77 Number Sequence — Part 9 I 64 100
78 Enigma Messages with Repeated Letters — Part 5 I 64 100
79 Smartcard RSA II 63 1086
80 Cascading Encryption — Part 1/3 I 61 100
81 Multilingual Monoalphabetic Substitution I 61 100
82 BCR code (Book-Caesar-RSA) II 61 1092
83 Turing Bombe Enigma I I 59 100
84 Heartbleed — Part 2 I 59 100
85 Enigma Messages with Repeated Letters — Part 4 I 58 100
86 AES key — encoded in the machine readable zone of a European ePassport II 58 1090
87 Number Sequence — Part 7 I 56 100
88 Unusual encryption using a diophantine equation II 53 1089
89 Monoalphabetic substitution with camouflage — Part 1 I 53 100
90 Recycled One-Time Pad I 52 100
91 An Invisible Message I 52 100
92 Cryptanalysis Hacking Puzzles — Part 2 I 50 101
93 Kaskade-S/T — Part 2 II 45 1087
94 The Einstein Enigma II 43 1143
95 Unconcealed RSA messages II 43 1089
96 ORYX Stream Cipher Part II II 43 1086
97 M-138 — Part 3 II 42 1103
98 Monoalphabetic substitution with camouflage — Part 2 II 41 1089
99 News from Castle Mansfeld I 41 100
100 New Year's Greetings — Part 1 I 41 100
101 Keyshanc — Part 1 II 41 1091
102 Monoalphabetic substitution with camouflage — Part 4 I 40 100
103 Strange Message from Thessaloniki I 40 100
104 Monoalphabetic substitution with camouflage — Part 3 II 39 1089
105 RSA Factoring Challenge: RSA-704 II 39 0
106 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 39 1087
107 Weakened Granit — Part 1 I 38 100
108 New Year's Greetings — Part 2 I 38 100
109 Music Code — Part 1 I 37 100
110 Music Code — Part 2 II 37 1088
111 An 'unhearable' message I 36 100
112 Pigpen with a twist — Part 2 II 36 1089
113 Ku Klux Klan X 36 var
114 New Year's Greetings — Part 3 I 36 100
115 Double Column Transposition — Part 4 II 35 1099
116 New Year's Greetings — Part 4 I 35 100
117 CMEA 1 II 34 1086
118 Double Column Transposition — Part 2 II 34 1099
119 Not-so-Secret Message from Malawi — Part II (ECC) II 33 1086
120 Summer Job II 32 1156
121 Pigpen with a twist — Part 3 II 32 1089
122 RSA Factoring Challenge: RSA-210 II 32 0
123 Keyshanc — Part 2 II 32 1091
124 Advent-Challenge — Part 2 II 31 1139
125 Modular Sequences I 31 100
126 Double Column Transposition — Part 3 II 30 1099
127 Kaskade-S/T — Part 3 II 29 1087
128 Advent Challenge — Part 4 II 28 1140
129 ORYX Stream Cipher — Part 3 (revised) II 28 1095
130 Heartbleed — Part 3 II 28 1101
131 Trendy Messenger II 27 1156
132 Advent Challenge — Part 3 II 27 1140
133 CMEA 2 III 24 13152
134 Monoalphabetic Substitution with Camouflage — Part 5 II 24 1090
135 Lattice Part 1 II 24 1087
136 Fastest in the West II 23 1156
137 Spanish Strip Cipher — Part 1 II 23 1099
138 Double Column Transposition — Part 1 II 22 1099
139 RSA with Special d III 21 13145
140 Typex — Part 1 II 21 1094
141 Cryptanalysis Hacking Puzzles — Part 1 I 19 100
142 Spanish Strip Cipher — Part 2 II 18 1099
143 RSA Factoring Challenge: RSA-220 II 18 0
144 Monoalphabetic Substitution with Nostradamus Flavor II 18 1213
145 Typex — Part 2 II 18 1094
146 Handycipher made in love — Part 1 II 17 1213
147 Homophonic Encryption — Part 1 II 17 1279
148 M-138 — Part 4 II 16 1103
149 Concealed Messages — Vigenère's Night Sky X 16 var
150 Weakened Handycipher — Part 1 II 15 1106
151 Homophonic Encryption — Part 2 II 15 1286
152 Purple 1 II 15 1086
153 AES ECB Wrong Encoding II 14 1139
154 RSA Factoring Challenge: RSA-230 II 14 0
155 New Year's Greetings — Part 5 II 14 1113
156 Weakened Handycipher — Part 3 II 14 1106
157 Homophonic Encryption — Part 3 II 14 1286
158 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 14 1116
159 Weakened Handycipher — Part 2 II 13 1106
160 Sigaba Part 1 II 12 1086
161 Handycipher made in love — Part 2 II 12 1315
162 Flawed Usage of a OTP Cipher by the BND II 12 1108
163 Breaking a Filter Generator II 12 1171
164 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 11 1087
165 Cascading Encryption — Part 3/3 II 11 1094
166 Cascading Encryption — Part 2/3 II 11 1094
167 ORYX Stream Cipher — Part 4a II 11 1099
168 Kaskade-S/T — Part 5 II 10 1088
169 Homophonic Encryption — Part 4 II 9 1286
170 Akelarre Part 1 II 9 1086
171 Double Column Transposition — Part 5 II 6 1100
172 Kaskade-S/T — Part 6 (RansomKaskade Part 1) II 6 1129
173 Hilly — Part 1 II 6 1122
174 Handycipher — Part 2 II 6 1104
175 Handycipher — Part 3 III 6 13452
176 Weakened Handycipher — Part 5 II 5 1115
177 Weakened Handycipher — Part 4 II 5 1115
178 Handycipher — Part 5 III 5 13627
179 Handycipher — Part 6 III 5 13627
180 Handycipher — Part 1 II 5 1104
181 Weakened Handycipher — Part 6 II 5 1115
182 Notes of an Italian Soldier X 4 var
183 Handycipher — Part 4 III 4 13627
184 Spirale — Part 3 II 3 1108
185 Spirale — Part 1 II 3 1108
186 "The Road" — Part 1 II 3 1187
187 Extended Handycipher — Part 1 II 3 1105
188 The Vatican Challenge — Part 1 X 3 var
189 Extended Handycipher — Part 2 II 3 1105
190 Extended Handycipher — Part 3 II 3 1105
191 The Vatikan Challenge — Part 2 X 3 var
192 Extended Handycipher — Part 4 III 3 13627
193 Handycipher — Part 9 III 3 13732
194 Sigaba Part 2 III 3 13145
195 Holographic Encryption — Part 1 II 3 1125
196 Extended Handycipher — Part 5 III 3 13627
197 Handycipher — Part 8 III 3 13732
198 Spirale — Part 2 II 3 1108
199 Weakened ElsieFour — Part 3 II 2 1134
200 Holographic Encryption — Part 2 II 2 1125
201 Extended Handycipher — Part 6 III 2 13627
202 Catherine of Aragon's Letter to King Ferdinand, her Father (1509) X 2 var
203 ElsieFour — Part 1 III 2 13911
204 Handycipher — Part 7 III 2 13732
205 Double Column Transposition X 2 var
206 Unknown Author X 2 var
207 ORYX Stream Cipher — Part 4b III 2 13367
208 Weakened ElsieFour — Part 1 II 1 1151
209 Substitution Cipher with Non-Prefix Codes III 1 13178
210 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 1 1116
211 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1091
212 Beale Ciphers X 1 var
213 Hilly — Part 2 II 1 1135
214 Handycipher — Part 10 II 1 1824
215 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13157
216 RSA Factoring Challenge: RSA-330 III 0 13214
217 Weakened ElsieFour — Part 2 II 0 1151
218 Double Column Transposition Reloaded — Part 1 III 0 13338
219 RSA Factoring Challenge: RSA-350 III 0 13214
220 RSA Factoring Challenge: RSA-370 III 0 13214
221 RSA Factoring Challenge: RSA-380 III 0 13214
222 Double Column Transposition Reloaded — Part 3 III 0 13338
223 RSA Factoring Challenge: RSA-360 III 0 13214
224 RSA Factoring Challenge: RSA-340 III 0 13214
225 RSA Factoring Challenge: RSA-320 III 0 13214
226 Double Column Transposition Reloaded — Part 2 III 0 13338
227 RSA Factoring Challenge: RSA-1024 III 0 13214
228 RSA Factoring Challenge: RSA-260 III 0 13214
229 RSA Factoring Challenge: RSA-270 III 0 13214
230 RSA Factoring Challenge: RSA-896 III 0 13214
231 Twelve-Year-Old Murder Case X 0 var
232 ORYX Stream Cipher — Part 4d III 0 13303
233 The Vatikan Challenge — Part 3 X 0 var
234 Kaskade-S/T — Part 4 II 0 1088
235 RSA Factoring Challenge: RSA-280 III 0 13214
236 RSA Factoring Challenge: RSA-290 III 0 13214
237 Kryptos X 0 var
238 RSA Factoring Challenge: RSA-309 III 0 13214
239 RSA Factoring Challenge: RSA-300 III 0 13214
240 Digital Signatures: DSA with Medium Fields III 0 13190
241 "The Road" — Part 3 II 0 1187
242 "The Road" — Part 2 II 0 1187
243 RSA Factoring Challenge: RSA-310 III 0 13214
244 D'Agapeyeff X 0 var
245 RSA Factoring Challenge: RSA-390 III 0 13214
246 RSA Factoring Challenge: RSA-400 III 0 13214
247 RSA Factoring Challenge: RSA-410 III 0 13214
248 RSA Factoring Challenge: RSA-450 III 0 13214
249 RSA Factoring Challenge: RSA-460 III 0 13214
250 RSA Factoring Challenge: RSA-1536 III 0 13214
251 World Record Challenge: Break 65 Bits of AES III 0 13145
252 RSA Factoring Challenge: RSA-420 III 0 13214
253 Double-Column Transposition/Granit — Part 1 II 0 1106
254 Double-Column Transposition/Granit — Part 2 II 0 1106
255 Spirale — Part 4 III 0 13506
256 RSA Factoring Challenge: RSA-440 III 0 13214
257 Weakened Granit — Part 2 II 0 1108
258 RSA Factoring Challenge: RSA-430 III 0 13214
259 Weakened Granit — Part 3 II 0 1108
260 RSA Factoring Challenge: RSA-470 III 0 13214
261 RSA Factoring Challenge: RSA-480 III 0 13214
262 RSA Factoring Challenge: RSA-240 III 0 13214
263 RSA Factoring Challenge: RSA-2048 III 0 13214
264 ORYX Stream Cipher — Part 4c III 0 13367
265 RSA Factoring Challenge: RSA-232 III 0 13214
266 Double-Column Transposition/Granit — Part 3 II 0 1106
267 Spanish Strip Cipher — Part 3 X 0 var
268 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1116
269 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1116
270 RSA Factoring Challenge: RSA-490 III 0 13214
271 Dorabella X 0 var
272 RSA Factoring Challenge: RSA-250 III 0 13214
273 RSA Factoring Challenge: RSA-500 III 0 13214
274 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1116
275 RSA Factoring Challenge: RSA-617 III 0 13214
276 The third ENIGMA M4 message X 0 var
 
 
powered by the CrypTool project  CrypTool

 

   +++    [05:54 - 27.06.2019] darththucydides solved the Level I challenge 'ECDH-Key Exchange for Beginners'    +++    [12:28 - 26.06.2019] D3d4lu5 solved the Level II challenge 'Handycipher — Part 10'    +++    [02:45 - 26.06.2019] RogueRamblers solved the Level I challenge 'ADFGVX — Part 2'    +++    [23:09 - 25.06.2019] V3rmind solved the Level I challenge 'A hidden word'    +++    [22:56 - 25.06.2019] V3rmind solved the Level I challenge 'Number Sequence — Part 8'    +++