Root Me
Übersicht
Wer hat die Übung gelöst Kryptoanalyse / AES-PMAC
App - Skript
Anwendung - System
Knacken
Kryptoanalyse
Forensische
Programmierung
Realist
Netzwerk
Steganografie
Web - Kunde
Web - Server
AES - 4 Rounds
AES - Fault attack #1
AES - Fault attack #2
AES - CBC - Bit-Flipping Attack
AES - ECB
AES - Weaker variant
AES-PMAC
AES128 - CTR
Hill Cipher
Shift cipher
Circular Bit Shift
CISCO - Salted Password
Known plaintext - XOR
Code - Pseudo Random Number Generator
Pixel Madness
ECDHE
ECDSA - Implementation error
ECDSA - Introduction
ELF64 - PID encryption
Encoding - ASCII
Encoding - Codebook
Encoding - UU
FEAL - Differential Cryptanalysis
File - PKZIP
File - Insecure storage 1
GEDEFU
Hash - DCC
Hash - DCC2
Hash - LM
Hash - Message Digest 5
Hash - NT
Hash - SHA-2
Hash - SHA-3
LFSR - Known plaintext
Enigma Machine
OTP - Implementation error
PHP - mt_rand
Discrete logarithm problem
RSA - Corrupted key 1
RSA - Corrupted key 2
RSA - Corrupted key 3
RSA - Factorisation
RSA - Continued fractions
RSA - H-rabin
RSA - Lee cooper
RSA - Common modulus
RSA - Multiple recipients
RSA - Decipher Oracle
RSA - Padding
RSA - Signature
Service - CBC Padding
Service - Hash length extension attack
Service - Timing attack
Side Channel - AES : CPA
Side Channel - AES : first round
Monoalphabetic substitution - Caesar
Monoalphabetic substitution - Polybe
Polyalphabetic substitution - One Time Pad
Polyalphabetic substitution - Vigenère
System - Android lock pattern
Transposition - Rail Fence
Twisted secret
Initialisation Vector
White-Box Cryptography
Laden ...
33 Anzahl der Mitglieder die diese Übung gelöst haben
Tosh
themaks
rogdham
FoxCie
DVernon
Alkanor
kikko
ENOENT
Jrmbt
Mister7F
jusb3
braindead
corpsfini
ocalex86
Wojtek
hexabeast
Podalirius
gwel
Cryptanalyse
Kurt
macz
Iroh
face0xff
nikost
AziXus
Kasen
Vozec
someone12469
Jorzan
NiakTheWizard
csg
C-Box
TitouEly