MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

9593
Follow us: Facebook Twitter
 
 

Four levels

Four levels of increasing difficulty: From pen & paper to complex mathematical problems.

Limited attempts

You have only a limited number of attempts to solve each challenge. Be certain of your answer before you submit it.

Be fast

Be fast and earn a place on the Hall of Fame. The first four to solve each challenge will be displayed permanently.

Special Level X

The special level X contains cryptographic problems which are currently not known to have been solved.



Cipher challenges on four levels

 

Level I crypto challenges

Level I Challenges - Pen & Paper

Level I challenges are similar to crossword puzzles from newspapers and can be solved with little cryptographic background. You might not even need a computer for solving level I challenges — all you need is a bit of clever thinking and probably a pen and paper. A program like CrypTool applied to a level I challenge can help reveal the answer within minutes or even seconds, if the necessary algorithms are already built in. Hence, if you are new to cryptography, but nonetheless interested in the mysterious topic of cryptanalysis, give the level I challenges a try. You will almost assuredly meet quickly with success.
 
Level II crypto challenges

Level II Challenges - Programming skills required

Level II challenges require some background knowledge in cryptology and usually some computational power. Additionally, you may require tools that are not available in such convenient packages like CrypTool, OpenSSL or Sage. Therefore, you must first thoroughly understand the problem in order to write a computer program, which helps you getting along. It could take hours or even days to solve a level II challenge. Hence, if you consider yourself well-armed with cryptologic knowledge (such as if you are a university student in a cryptographic course), give the level II challenges a try. Success may not come easily, but it will be a worthwhile endeavor.
 
Level III crypto challenges

Level III Challenges - Extensive computing power recommended

Level III challenges require a thorough background in cryptanalysis and usually significant computational power as well. The problems in this level represent current research topics that are believed to be very difficult to solve. Thus, practical solutions may not even exist and ready-to-run tools almost certainly do not. The methodology to solve some of these challenges may already be known, but it may require such a huge amount of computational power that only a large group of people working together in a distributed system could obtain the solution. Challenges in this category mark the thin line between algorithms that are still secure and those that are not. Solving them may take weeks or even several months. Hence, challenges in this level are intended for entire research groups with many experts in cryptanalysis, programming, and distributed systems. Success cannot be guaranteed, but if you are the first to successfully solve one of these challenges, it probably would catch the attention of the scientific community. Of course, it still remains up to you to publish or present any such scientific techniques and results.
 
Level X crypto challenges

Level X Challenges - Unsolved ciphers

Most level X challenges contain problems that have remained unsolved for a long time. The fact that they have been unsolved regardless of numerous attempts suggests these challenges being hard. However, a simple idea can probably reduce the difficulty of it to a simple level I challenge — currently it is just unknown if and how they can be solved. Of course such a challenge cannot be solved with a simple codeword, since even we (the respective author and the MTC3 team) do not know the solution (the plaintext, the original message or the approach). So if you discover a promising solution you should either contact the author or the MTC3 team. Furthermore, you can publish your findings in a scientific journal such as Cryptologia or Journal of Cryptology.

 

Additionally, you may require tools that are not available in a convenient package like CrypTool.


All Challenges (274)

Ordered by date posted, the most recent appear first.

Not-so-Secret Message from Malawi — Part II (ECC)

[schaefer-02] - 33 users already solved this challenge, 2 are working on it.
 
 
 

It is also important to choose the parameters of an elliptic curve cryptosystem wisely. This was not done in this example, which should enable you to decrypt another ciphertext message from Malawi. The plaintext reveals the codeword, although this time it is not as closely related to the photo.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

Rank User (#33) Achieved points (Global score) y-m-d - h:m:s

Cezary Glowacz (cezaryglowacz) 1576 (9995) 2010-10-19 17:20:21
Ulrich Armbrüster (uarmbruester) 1414 (7987) 2010-10-29 20:08:00
Flip (Flip) 1222 (31107) 2011-02-04 00:26:45
Armin Krauss (argh) 1216 (185115) 2011-02-14 16:01:41
#5 Wolfgang Weisser (wowmyst) 1209 (33108) 2011-03-02 01:51:28
#6 J. M. (jomandi) 1179 (113270) 2011-06-07 00:19:02
#7 Viktor (Veselovský) 1169 (151602) 2011-07-27 17:16:22
#8 Daniel Fretwell (fretty) 1169 (30107) 2011-07-28 13:00:03
#9 The Killer (Killer) 1152 (42393) 2011-11-28 01:29:31
#10 Keith Randall (randall77) 1151 (31011) 2011-12-05 19:03:10
#11 Luigi Tomelli (archstanton) 1143 (108345) 2012-03-04 20:45:58
#12 Aliazer (Aliazer) 1140 (12314) 2012-04-19 22:15:47
#13 Michel Van Caneghem (vancan) 1138 (49719) 2012-05-18 09:29:50
#14 Bart den Hartog (Bart13) 1134 (118984) 2012-07-17 13:35:26
#15 Christian (Etschupu) 1134 (31788) 2012-07-19 15:13:25
#16 Thomas Lambert (lambert) 1132 (35237) 2012-08-22 18:48:04
#17 RPH (derichard) 1121 (27044) 2013-04-17 00:00:47
#18 Em Doulgerakis (Greko) 1118 (124033) 2013-07-17 14:15:08
#19 Kurt Gebauer (Yokozuna) 1117 (153663) 2013-08-17 22:40:10
#20 zahir mohsen moradi (ariobarzan) 1116 (99757) 2013-09-13 23:04:52
#21 Alain (Integral) 1113 (207924) 2014-01-09 17:32:40
#22 Forrest Gump (Polyphem) 1112 (38763) 2014-02-18 22:55:00
#23 Francisco Moraes (fmoraes) 1106 (90044) 2014-11-20 19:52:23
#24 Ben Ward (bward) 1101 (2519) 2015-08-01 22:54:14
#25 Martin (martinbucher) 1098 (27363) 2016-03-22 12:29:12
#26 Dominik M. (Sgt. Pepper) 1095 (97919) 2016-10-05 22:14:50
#27 T (Wagner) 1093 (16887) 2017-05-10 07:57:03
#28 Kasia (kasia-tutej) 1092 (53366) 2017-06-15 23:59:04
#29 Mir Dim (mir0soft) 1092 (72404) 2017-07-30 07:42:44
#30 Nicolas (nicosPavlov) 1090 (151166) 2018-02-04 08:07:45
#31 kilink (kilink) 1087 (8053) 2019-01-22 15:43:59
#32 D3d4lu5 (D3d4lu5) 1087 (273573) 2019-02-26 18:04:45
#33 schwuggel1337 (schwuggel1337) 1087 (7716) 2019-03-21 13:55:08
You must be logged in to solve the challenge


Notes of an Italian Soldier

[schroedel-03] - 4 users already solved this challenge.
 
 
 

During World War II, the Italian solider Antonio Marzi worked as a radio operator. He created more than 230 pages full of enciphered notes about his experiences. Unfortunately, he forgot one step of his enciphering method. Still today, his records have never been decrypted.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 0

All successful users of this challenge

Rank User (#4) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 3000 (185115) 2013-02-18 19:59:00
Viktor (Veselovský) 800 (151602) 2013-05-04 22:57:00
J. M. (jomandi) 800 (113270) 2013-05-19 13:45:00
George Lasry (george4096) 800 (299488) 2013-12-12 15:07:29
The solution for this challenge was made public on 2014-01-25, and thus it is not possible to get points for this challenge any more. However, you can still solve and enter a solution for this challenge. If you believe you have the solution, you can still write us an email.
You must be logged in to solve the challenge


Double Column Transposition

[schmeh-03] - 2 users already solved this challenge.
 
 
 

The double columnar transposition is considered one of the best manual encryption systems. Many secret organizations have made use of it or still use it today. As there are only a few publications on this method, it is not clear if and how a well-constructed double transposition cipher can be broken.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 0

All successful users of this challenge

Rank User (#2) Achieved points (Global score) y-m-d - h:m:s

George Lasry (george4096) 11000 (299488) 2013-11-26 17:23:24
Jim Gillogly (Scryer) 10000 (21260) 2013-12-31 13:58:23
The solution for this challenge was made public on 2014-06-13, and thus it is not possible to get points for this challenge any more. However, you can still solve and enter a solution for this challenge. If you believe you have the solution, you can still write us an email.
You must be logged in to solve the challenge


A Secret Message from Castle Mansfeld

[schroedel-04] - 111 users already solved this challenge, 20 are working on it.
 
 
 

In September 1902, a book seller named Paul Winkler received a postcard in cipher. Sent from the nearby Mansfeld castle, it appears that a young lady wants to meet with Paul – secretly.

Find the name of the young lady and submit it as the codeword for this challenge. Use only capital letters.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 15

All successful users of this challenge

Rank User (#111) Achieved points (Global score) y-m-d - h:m:s

Nobody (nobody) 200 (40618) 2010-10-14 13:36:55
Simon Jakob (simon.jakob) 200 (18714) 2010-10-15 01:34:09
./. (matudo) 133 (373) 2010-10-16 17:19:00
Zaproth Beeblebrox (chmhnk) 125 (231) 2010-10-17 15:01:19
#5 Carsten Lenz (kAyCeE80) 120 (460) 2010-10-18 16:05:31
#6 Grinse Katze (Grinsekatze) 120 (964) 2010-10-18 16:12:15
#7 Ralf Stephan (rwst) 120 (25229) 2010-10-18 18:16:56
#8 Gruppe KleinWaltherBurkhardt (hucke) 120 (120) 2010-10-18 18:34:18
#9 Roadrunner (rr) 120 (12702) 2010-10-19 00:25:08
#10 Kathi (blubb) 117 (117) 2010-10-19 14:03:07
#11 edel (blackbull_tm) 117 (117) 2010-10-19 14:03:49
#12 Maximilian T (LMax) 117 (1903) 2010-10-19 14:03:58
#13 Anibal Kürekci (ak187) 117 (1076) 2010-10-19 15:07:14
#14 Steffen Kolarczyk (TypeXII) 113 (227) 2010-10-21 23:14:23
#15 Michail Pokryschkin (micpok) 113 (766) 2010-10-22 10:14:15
#16 Arnold Sendler (Tschighor) 111 (1105) 2010-10-22 23:48:06
#17 Paul (P4ul) 109 (242) 2010-10-24 19:06:33
#18 Bernd Freise (Xanhem) 108 (1154) 2010-10-25 21:03:30
#19 Stefan Neubert (sneubert) 108 (108) 2010-10-26 12:36:01
#20 Armin Krauss (argh) 107 (185115) 2010-10-29 11:32:12
#21 Carsten Baum (crashti) 105 (1135) 2010-11-01 22:13:38
#22 Gary Hawk (Highlander) 105 (631) 2010-11-02 15:27:40
#23 Roland Röder (roro) 105 (307) 2010-11-04 21:57:29
#24 Ulrich Armbrüster (uarmbruester) 104 (7987) 2010-11-09 13:56:41
#25 Hans Schuell (hschuell) 103 (2194) 2010-11-13 15:10:23
#26 Nils Achim Lacke (Babbage) 103 (618) 2010-11-20 22:02:38
#27 Max Mustermann (MustermM) 102 (6661) 2010-11-30 20:06:19
#28 Thomas Gonda (TomG) 102 (36291) 2010-12-08 17:52:23
#29 Hans Rudolf (mutabor) 101 (3015) 2011-01-04 16:28:16
#30 Wombat (Wombat) 101 (5822) 2011-04-25 14:50:29
#31 Egon Hamburger (Seehase) 101 (3445) 2011-04-28 14:04:11
#32 Muendo (muendo) 100 (3501) 2011-05-10 14:40:04
#33 Peter Mustermann (Gummiboot) 100 (60285) 2011-07-17 03:29:49
#34 Seth Kintigh (DarkFibre) 100 (79471) 2011-07-18 06:29:28
#35 Stefan Haas (stef_the_chef) 100 (4329) 2011-07-29 18:27:58
#36 Daniel Fretwell (fretty) 100 (30107) 2011-08-01 12:45:47
#37 David Willem Borgdorff (dwborgdorff) 100 (100) 2011-08-26 18:53:32
#38 Horst Kevin (lordstege) 100 (1419) 2011-08-28 00:08:05
#39 Sash Marcus (stryker2k11) 100 (302) 2011-08-28 18:19:25
#40 Robert S (shadowhorst) 100 (402) 2011-08-28 19:04:06
#41 J. M. (jomandi) 100 (113270) 2011-09-20 23:31:51
#42 Viktor (Veselovský) 100 (151602) 2011-09-22 01:35:44
#43 Bart den Hartog (Bart13) 100 (118984) 2011-11-05 17:52:01
#44 Thomas Mattel (Tom) 100 (2462) 2011-12-23 22:05:05
#45 André Koch-Kramer (FriF1) 100 (602) 2012-01-06 03:55:25
#46 j.h. (haegarq) 100 (15252) 2012-01-16 18:51:16
#47 Tom Tox (tox) 100 (17708) 2012-02-04 18:48:58
#48 Hans Peter (hanspeter) 100 (52256) 2012-03-22 09:35:10
#49 Aliazer (Aliazer) 100 (12314) 2012-04-21 14:06:33
#50 zuben c3 (zuben-c3) 100 (24853) 2012-06-12 11:28:22
#51 Dusan (xxdradus) 100 (40236) 2012-08-02 14:25:03
#52 tuighin (tuighi) 100 (609) 2012-09-03 20:03:03
#53 KW (qwer*) 100 (13963) 2012-09-03 20:34:23
#54 Harry (Schwabenbambi) 100 (2409) 2012-09-18 17:06:48
#55 Holti (Holti) 100 (6035) 2012-09-25 16:34:58
#56 Martina (Nikita) 100 (3863) 2012-11-13 07:51:50
#57 George (Theofanidis) 100 (106715) 2012-11-27 17:29:31
#58 Julia Werdelmann (jw) 100 (10407) 2012-12-19 10:15:08
#59 Snake (snk) 100 (77889) 2013-02-24 16:22:24
#60 Petra (humppapenguin) 100 (3872) 2013-04-17 23:02:31
#61 Bernhard Gruber (bgr) 100 (22889) 2013-04-24 16:25:43
#62 Hans Joachim Girulat (joregi) 100 (33593) 2013-04-29 22:14:44
#63 Luigi Tomelli (archstanton) 100 (108345) 2013-06-30 17:38:13
#64 Almut (problelmo) 100 (45992) 2013-07-23 20:34:35
#65 Sebastian Slupina (Grandwizard) 100 (10866) 2013-08-19 10:06:11
#66 Sebastian Kluge (zappo) 100 (1801) 2013-09-09 11:54:55
#67 Steve (Samacian) 100 (23804) 2013-09-09 12:29:16
#68 zahir mohsen moradi (ariobarzan) 100 (99757) 2013-09-10 11:55:07
#69 Em Doulgerakis (Greko) 100 (124033) 2013-09-26 14:06:34
#70 Kurt Gebauer (Yokozuna) 100 (153663) 2013-10-16 19:31:35
#71 Alain (Integral) 100 (207924) 2013-12-20 19:08:08
#72 Jim Gillogly (Scryer) 100 (21260) 2014-01-02 05:07:14
#73 Pavel (haw) 100 (22728) 2014-01-23 18:43:53
#74 Kim H. S. (tenchijin) 100 (25468) 2014-02-11 09:06:31
#75 Siggi Kraus (Kruxi) 100 (701) 2014-04-24 22:43:30
#76 Karl Schutt (günter) 100 (41550) 2014-04-27 11:51:23
#77 Julia Bernotat (El Greco ) 100 (81129) 2014-07-06 14:43:39
#78 Robert (rm) 100 (56475) 2014-07-31 22:34:38
#79 Andreas Frerichs (Ossili) 100 (33266) 2014-09-28 17:24:19
#80 Francisco Moraes (fmoraes) 100 (90044) 2014-11-22 20:00:26
#81 HolgerK (HolgerK) 100 (25776) 2014-12-06 17:06:11
#82 Tim Fink (Magellan) 100 (4876) 2014-12-15 02:42:48
#83 Bertold (bk) 100 (9673) 2015-01-02 21:21:45
#84 Rainer Zufall (kiekuk) 100 (56786) 2015-02-28 20:02:20
#85 Michael Ammon (Ammonym) 100 (7719) 2015-06-13 12:35:33
#86 Joerg G. (SnifferMaster) 100 (18154) 2015-10-12 09:08:36
#87 Martin (martinbucher) 100 (27363) 2015-11-03 03:34:54
#88 Michael Möller (michaelm) 100 (173129) 2015-11-14 19:37:24
#89 Jan (xray) 100 (904) 2015-12-12 06:59:05
#90 Marc (rcll0891) 100 (24004) 2015-12-27 15:25:08
#91 Szabó Zoltán (szabo.z87) 100 (55604) 2016-01-05 10:10:56
#92 Michael (soilfront) 100 (2617) 2016-01-24 18:05:32
#93 Alain Collignon (vexilla72) 100 (87833) 2016-02-05 17:33:44
#94 Joerg Schaeffler (DrAcula) 100 (2948) 2016-02-08 18:28:40
#95 Marcus (marcus) 100 (201) 2016-05-01 02:38:06
#96 Norbert Biermann (Norbert) 100 (45031) 2016-07-15 22:35:56
#97 Peter (Garnet) 100 (14234) 2016-09-27 13:09:17
#98 Michael (FoM) 100 (34465) 2016-11-27 23:33:13
#99 Marcel (bene1512) 100 (20896) 2017-01-17 00:50:02
#100 S (Zyphe) 100 (10461) 2017-01-18 00:04:18
#101 Mir Dim (mir0soft) 100 (72404) 2017-03-18 23:30:29
#102 Dominik M. (Sgt. Pepper) 100 (97919) 2017-03-29 16:05:14
#103 Danny Higgins (hamster147) 100 (31494) 2017-04-25 14:16:15
#104 Daniel Walder (ibex) 100 (14372) 2017-04-29 01:15:43
#105 D3d4lu5 (D3d4lu5) 100 (273573) 2017-06-20 11:35:58
#106 Steve Vaillancourt (stvai2) 100 (15041) 2018-04-29 03:39:09
#107 Eric (ExAstris) 100 (26990) 2018-05-23 03:24:55
#108 sarah b (silva) 100 (18511) 2018-07-24 14:24:15
#109 Julian (Lemmynator) 100 (16666) 2018-07-29 20:41:51
#110 Random Dude (rnd) 100 (83811) 2018-09-23 19:15:49
#111 Hughes (hughes) 100 (7925) 2019-05-11 19:41:31
You must be logged in to solve the challenge


RSA with Special d

[kitrub-04] - 20 users already solved this challenge, 5 are working on it.
 
 
 

It is well known that RSA with a small private key is insecure. The company, Smart, Inc. has decided to try using special private keys that are large but have a small Hamming weight in order to speed up decryptions and signature generation. The question is whether these keys are safe. Try to reconstruct the private key d from the public parameters.

The codeword for this challenge is the private key d in decimal notation.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

Rank User (#20) Achieved points (Global score) y-m-d - h:m:s

Nobody (nobody) 17412 (40618) 2010-10-22 18:54:58
Christian (Etschupu) 16769 (31788) 2010-10-30 12:12:28
Ilya Ozerov (ilya) 16133 (20556) 2010-11-12 18:59:39
J. M. (jomandi) 14494 (113270) 2011-06-07 17:43:27
#5 Armin Krauss (argh) 14348 (185115) 2011-08-08 08:17:16
#6 Viktor (Veselovský) 14042 (151602) 2012-02-24 21:52:48
#7 Bart den Hartog (Bart13) 13897 (118984) 2012-07-23 09:45:13
#8 Luigi Tomelli (archstanton) 13887 (108345) 2012-08-04 16:30:55
#9 Almut (problelmo) 13681 (45992) 2013-06-22 05:03:48
#10 Kurt Gebauer (Yokozuna) 13661 (153663) 2013-08-01 11:14:10
#11 Em Doulgerakis (Greko) 13613 (124033) 2013-11-13 10:14:29
#12 Francisco Moraes (fmoraes) 13607 (90044) 2013-11-26 19:28:06
#13 Alain (Integral) 13577 (207924) 2014-02-06 16:33:08
#14 George (Theofanidis) 13568 (106715) 2014-02-27 17:15:46
#15 Sean (Kavanaugh) 13386 (29143) 2015-10-09 21:33:57
#16 zahir mohsen moradi (ariobarzan) 13331 (99757) 2016-05-31 18:56:14
#17 George Lasry (george4096) 13248 (299488) 2017-08-05 00:08:48
#18 Kasia (kasia-tutej) 13232 (53366) 2017-11-08 19:49:05
#19 Mir Dim (mir0soft) 13217 (72404) 2018-02-09 18:01:42
#20 Dominik M. (Sgt. Pepper) 13176 (97919) 2018-11-12 01:03:17
You must be logged in to solve the challenge
 
 
powered by the CrypTool project  CrypTool

 

   +++    [11:29 - 24.05.2019] dokyriak solved the Level II challenge 'Cracking SHA1-Hashed Passwords'    +++    [11:16 - 24.05.2019] dokyriak solved the Level I challenge 'Factorization Cipher — Part 1'    +++    [23:00 - 23.05.2019] Theofanidis solved the Level II challenge 'Handycipher made in love — Part 2'    +++    [19:57 - 23.05.2019] joregi solved the Level I challenge 'Autokey Cipher'    +++    [15:18 - 23.05.2019] Biork solved the Level I challenge 'A modified homophonic cipher with reduced alphabets — Part 1'    +++