MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

8051
Follow us: Facebook Twitter
 
With the launch of MysteryTwister C3 you can challenge your own knowledge by solving the given cryptographic challenges.


Welcome to MTC3 — The Cipher Contest

mtc3

You like riddles? You always loved to solve the crosswords in your newspaper? Or maybe you are just curious and want to find out about some of the ways to hide a secret (and possibily even to uncover it)? This is your place! Here at MysteryTwister C3 you can solve crypto challenges, starting from the simple Caesar cipher all the way to modern AES we have challenges for everyone. Our challenges range from level I to III, and an additional level X for "mystery" challenges (they may have been unsolved for a long time, mostly we don't know their solution or have no idea whether there is a solution at all). If you are a beginner its probably best if you start trying those challenges that have been solved mostly (see table below). Additional information regarding MTC3 can be found on our about page.


ext_mod

You might want to try some of these

The following table provides you with the list of all challenges currently available. If you are logged in, those are excluded which you already solved or where you are a (co-)author.
The challenges are sorted by default by the ones which have been solved mostly by all users. Alternatively you can also sort the table by content of column [to do this just click on the head of one of the columns "Challenge name", "Level", "# times solved" or "Current points to get"].
"Current points to get" shows how many points you get when you submit the solution today. By clicking on the challenge name within the list you will be taken directly to the corresponding challenge and can start solving it.
Score hunters try those challenges that yield the highest available points. Accordingly, those will be harder! Test your skills! Besides using the table below there is also a detailed list of all challenges



Check, which levels to show Level I Level II Level III Level X
If you are logged-in this list will only show those challenges you haven't solved yet.

# challenge name Level # times solved Current points to get
1 Number Sequence I 2923 100
2 Original Caesar Cipher I 1910 100
3 Number Sequence — Part 2 I 1339 100
4 Caesar Encryption I 982 100
5 Beaver Code I 736 100
6 Letter to the Templars — Part 1 I 662 100
7 Number Sequence — Part 3 I 609 100
8 Letter to the Templars — Part 2 I 531 100
9 Number Sequence — Part 4 I 488 100
10 A hidden word I 474 100
11 Monoalphabetic Substitution I 426 100
12 Letter to the Templars — Part 3 II 414 1102
13 Affine Codes / Modulo Arithmetic with N / Extended Euclid I 379 100
14 Factorization Cipher — Part 1 I 337 100
15 Grille Cipher I 316 100
16 Homophonic Encryption Part 1 I 300 100
17 Cracking SHA1-Hashed Passwords II 290 1095
18 Homophonic Encryption Part 2 I 259 100
19 One-Time Pad with Flaws I 230 100
20 Snow White and the seven dwarfs I 218 100
21 Alice's Birthday Party (Part 1) II 190 1093
22 Alice's Birthday Party (Part 2) II 181 1093
23 From Russia with Love I 178 100
24 Modified Caesar Cipher I 153 100
25 Reserve Hand Procedure — Part 1 I 153 100
26 How do you become a big cryptographer? I 152 100
27 Broadcasting and low exponent — RSA-Attack II 141 1096
28 Letter from the Alleged Countess Julie von Ortenburg I 140 100
29 Number Sequence — Part 8 I 136 100
30 Classical Ciphers^3 I 136 100
31 Not-so-Secret Message from Malawi — Part I (RSA) II 132 1093
32 Enigma Messages with Repeated Letters — Part 1 I 130 100
33 M-138 — Part 1 I 121 100
34 Brute-Force-Attack on Triple-DES with Reduced Key Space II 120 1093
35 Nils away on travel I 116 100
36 Pigpen with a twist — Part 1 I 115 100
37 Hybrid Encryption I II 113 1093
38 The Book Code: A Challenge for Bookworms I 111 100
39 RSA: Two different keys — same ciphertext II 108 1096
40 Molehunt (Part 1/3) I 106 100
41 Enigma Part 1 II 106 1093
42 A Secret Message from Castle Mansfeld I 104 100
43 Factorization Cipher — Part 2 II 103 1097
44 Molehunt (Part 2/3) I 102 100
45 ¿No Hablas Español? No problemo! I 95 100
46 Trifid Cipher I 92 100
47 A really long number sequence II 90 1096
48 ADFGVX — Part 2 I 87 100
49 Kaskade-S/T — Part 1 I 86 100
50 Enigma Combinatorics I 80 100
51 ADFGVX — Part 1 I 77 100
52 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 1 I 77 100
53 Heartbleed — Part 1 I 76 100
54 Double Columnar Transposition I 76 100
55 Playfair Encryption I 74 100
56 Playfair with hints about the grid I 72 100
57 M-138 — Part 2 II 71 1122
58 ECDH-Key Exchange for Beginners I 71 100
59 ORYX Stream Cipher Part I II 69 1093
60 Enigma Part 2 II 69 1093
61 Number Sequence — Part 6 I 67 100
62 Zodiac Cipher I 67 100
63 Factorization Cipher — Part 3 II 66 1098
64 Molehunt (Part 3/3) II 61 1093
65 A hidden word — Part 2 I 60 100
66 Enigma Messages with Repeated Letters — Part 2 I 60 100
67 Enigma Messages with Repeated Letters — Part 3 I 60 100
68 Hill Cipher with Sudoku Key I 59 100
69 The Last Note I 59 100
70 Partial Key Exposure with RSA — Part 1 II 57 1098
71 Enigma Messages with Repeated Letters — Part 5 I 56 100
72 Smartcard RSA II 56 1093
73 Number Sequence — Part 5 I 55 100
74 Enigma Messages I 54 100
75 BCR code (Book-Caesar-RSA) II 54 1102
76 Turing Bombe Enigma I I 53 100
77 Cascading Encryption — Part 1/3 I 53 100
78 Enigma Messages with Repeated Letters — Part 4 I 52 100
79 Image Noise I 52 100
80 Multilingual Monoalphabetic Substitution I 51 100
81 Heartbleed — Part 2 I 50 100
82 AES key — encoded in the machine readable zone of a European ePassport II 46 1098
83 An Invisible Message I 45 100
84 Recycled One-Time Pad I 45 100
85 Kaskade-S/T — Part 2 II 42 1094
86 Unusual encryption using a diophantine equation II 42 1096
87 Monoalphabetic substitution with camouflage — Part 1 I 41 100
88 ORYX Stream Cipher Part II II 37 1093
89 Keyshanc — Part 1 II 37 1100
90 Lunchtime Attack on the Fully Homomorphic Encryption Scheme II 36 1094
91 Strange Message from Thessaloniki I 36 100
92 Monoalphabetic substitution with camouflage — Part 4 I 35 100
93 News from Castle Mansfeld I 35 100
94 Music Code — Part 2 II 34 1095
95 Music Code — Part 1 I 34 100
96 Unconcealed RSA messages II 34 1097
97 Number Sequence — Part 7 I 34 100
98 Monoalphabetic substitution with camouflage — Part 2 II 33 1098
99 Ku Klux Klan X 32 var
100 An 'unhearable' message I 32 100
101 Monoalphabetic substitution with camouflage — Part 3 II 31 1098
102 CMEA 1 II 31 1093
103 Pigpen with a twist — Part 2 II 31 1096
104 Weakened Granit — Part 1 I 31 100
105 Double Column Transposition — Part 2 II 30 1114
106 M-138 — Part 3 II 30 1122
107 New Year's Greetings — Part 1 I 30 100
108 Keyshanc — Part 2 II 29 1100
109 Double Column Transposition — Part 4 II 29 1115
110 RSA Factoring Challenge: RSA-704 II 28 0
111 Not-so-Secret Message from Malawi — Part II (ECC) II 27 1093
112 Pigpen with a twist — Part 3 II 27 1096
113 New Year's Greetings — Part 2 I 26 100
114 Double Column Transposition — Part 3 II 26 1114
115 New Year's Greetings — Part 3 I 25 100
116 Heartbleed — Part 3 II 25 1118
117 New Year's Greetings — Part 4 I 24 100
118 Kaskade-S/T — Part 3 II 24 1094
119 ORYX Stream Cipher — Part 3 (revised) II 23 1107
120 RSA Factoring Challenge: RSA-210 II 21 0
121 CMEA 2 III 20 13270
122 Monoalphabetic Substitution with Camouflage — Part 5 II 19 1099
123 Double Column Transposition — Part 1 II 19 1114
124 Typex — Part 1 II 19 1105
125 Spanish Strip Cipher — Part 1 II 18 1113
126 Lattice Part 1 II 18 1094
127 RSA with Special d III 16 13260
128 Spanish Strip Cipher — Part 2 II 16 1113
129 Typex — Part 2 II 16 1105
130 Concealed Messages — Vigenère's Night Sky X 15 var
131 Purple 1 II 13 1093
132 New Year's Greetings — Part 5 II 11 1150
133 ASAC — A Strong(er) ADFGVX Cipher — Part 1 II 11 1163
134 Cascading Encryption — Part 2/3 II 10 1105
135 Sigaba Part 1 II 10 1093
136 Cascading Encryption — Part 3/3 II 10 1105
137 Flawed Usage of a OTP Cipher by the BND II 9 1134
138 Weakened Handycipher — Part 3 II 9 1128
139 M-138 — Part 4 II 9 1122
140 Weakened Handycipher — Part 1 II 9 1128
141 Kaskade-S/T — Part 5 II 9 1095
142 ORYX Stream Cipher — Part 4a II 8 1114
143 Weakened Handycipher — Part 2 II 8 1128
144 Akelarre Part 1 II 7 1093
145 Post-Quantum Cryptography: Unbalanced Oil and Vinegar System — Part 2 II 7 1095
146 Double Column Transposition — Part 5 II 5 1116
147 RSA Factoring Challenge: RSA-220 II 5 0
148 Handycipher — Part 3 III 4 13774
149 Notes of an Italian Soldier X 4 var
150 Handycipher — Part 2 II 4 1125
151 Weakened Handycipher — Part 6 II 3 1161
152 Handycipher — Part 5 III 3 14276
153 Handycipher — Part 1 II 3 1125
154 Handycipher — Part 6 III 3 14276
155 Extended Handycipher — Part 4 III 2 14276
156 Weakened Handycipher — Part 5 II 2 1161
157 Spirale — Part 3 II 2 1134
158 Unknown Author X 2 var
159 Handycipher — Part 4 III 2 14276
160 Extended Handycipher — Part 5 III 2 14276
161 Weakened Handycipher — Part 4 II 2 1161
162 Spirale — Part 2 II 2 1134
163 Spirale — Part 1 II 2 1134
164 Holographic Encryption — Part 1 II 2 1283
165 Double Column Transposition X 2 var
166 Sigaba Part 2 III 2 13260
167 Holographic Encryption — Part 2 II 2 1283
168 Substitution Cipher with Non-Prefix Codes III 1 13307
169 ORYX Stream Cipher — Part 4b III 1 13606
170 Handycipher — Part 7 III 1 14917
171 Handycipher — Part 8 III 1 14917
172 Hilly — Part 1 II 1 1216
173 Extended Handycipher — Part 1 II 1 1126
174 Extended Handycipher — Part 3 II 1 1126
175 Monoalphabetic Substitution with Camouflage — Part 6 II 1 1101
176 Beale Ciphers X 1 var
177 Extended Handycipher — Part 2 II 1 1126
178 Handycipher — Part 9 III 0 14917
179 ASAC — A Strong(er) ADFGVX Cipher — Part 5 II 0 1163
180 Extended Handycipher — Part 6 III 0 14276
181 Double-Column Transposition/Granit — Part 3 II 0 1131
182 Double-Column Transposition/Granit — Part 2 II 0 1131
183 Double-Column Transposition/Granit — Part 1 II 0 1131
184 Spirale — Part 4 II 0 1134
185 Weakened Granit — Part 2 II 0 1136
186 ASAC — A Strong(er) ADFGVX Cipher — Part 3 II 0 1163
187 ASAC — A Strong(er) ADFGVX Cipher — Part 2 II 0 1163
188 Weakened Granit — Part 3 II 0 1136
189 ASAC — A Strong(er) ADFGVX Cipher — Part 4 II 0 1163
190 RSA Factoring Challenge: RSA-500 III 0 13358
191 RSA Factoring Challenge: RSA-896 III 0 13358
192 RSA Factoring Challenge: RSA-280 III 0 13358
193 RSA Factoring Challenge: RSA-270 III 0 13358
194 RSA Factoring Challenge: RSA-260 III 0 13358
195 RSA Factoring Challenge: RSA-250 III 0 13358
196 RSA Factoring Challenge: RSA-290 III 0 13358
197 RSA Factoring Challenge: RSA-300 III 0 13358
198 RSA Factoring Challenge: RSA-320 III 0 13358
199 RSA Factoring Challenge: RSA-310 III 0 13358
200 RSA Factoring Challenge: RSA-1024 III 0 13358
201 RSA Factoring Challenge: RSA-309 III 0 13358
202 RSA Factoring Challenge: RSA-240 III 0 13358
203 RSA Factoring Challenge: RSA-232 III 0 13358
204 World Record Challenge: Break 65 Bits of AES III 0 13260
205 Kryptos X 0 var
206 Dorabella X 0 var
207 D'Agapeyeff X 0 var
208 Recovering the Private Key in the Fully Homomorphic Encryption Scheme III 0 13277
209 Twelve-Year-Old Murder Case X 0 var
210 RSA Factoring Challenge: RSA-230 II 0 1098
211 The third ENIGMA M4 message X 0 var
212 Digital Signatures: DSA with Medium Fields III 0 13323
213 Kaskade-S/T — Part 4 II 0 1095
214 RSA Factoring Challenge: RSA-330 III 0 13358
215 RSA Factoring Challenge: RSA-340 III 0 13358
216 RSA Factoring Challenge: RSA-490 III 0 13358
217 RSA Factoring Challenge: RSA-617 III 0 13358
218 RSA Factoring Challenge: RSA-480 III 0 13358
219 RSA Factoring Challenge: RSA-470 III 0 13358
220 RSA Factoring Challenge: RSA-1536 III 0 13358
221 RSA Factoring Challenge: RSA-2048 III 0 13358
222 ORYX Stream Cipher — Part 4d III 0 13497
223 Spanish Strip Cipher — Part 3 X 0 var
224 Double Column Transposition Reloaded — Part 3 III 0 13556
225 Double Column Transposition Reloaded — Part 2 III 0 13556
226 Double Column Transposition Reloaded — Part 1 III 0 13556
227 RSA Factoring Challenge: RSA-460 III 0 13358
228 RSA Factoring Challenge: RSA-450 III 0 13358
229 RSA Factoring Challenge: RSA-380 III 0 13358
230 RSA Factoring Challenge: RSA-370 III 0 13358
231 RSA Factoring Challenge: RSA-360 III 0 13358
232 RSA Factoring Challenge: RSA-350 III 0 13358
233 RSA Factoring Challenge: RSA-390 III 0 13358
234 RSA Factoring Challenge: RSA-400 III 0 13358
235 RSA Factoring Challenge: RSA-440 III 0 13358
236 RSA Factoring Challenge: RSA-430 III 0 13358
237 RSA Factoring Challenge: RSA-420 III 0 13358
238 RSA Factoring Challenge: RSA-410 III 0 13358
239 ORYX Stream Cipher — Part 4c III 0 13606
 
 
powered by the CrypTool project  CrypTool

 

   +++    [08:50 - 29.05.2017] Magellan solved the Level I challenge 'Homophonic Encryption Part 1'    +++    [08:02 - 29.05.2017] Magellan solved the Level I challenge 'Homophonic Encryption Part 2'    +++    [01:02 - 29.05.2017] george4096 solved the Level II challenge 'Weakened Handycipher — Part 6'    +++    [00:37 - 29.05.2017] george4096 solved the Level III challenge 'Extended Handycipher — Part 5'    +++    [00:30 - 29.05.2017] george4096 solved the Level III challenge 'Extended Handycipher — Part 4'    +++