Root Me
Übersicht
Wer hat die Übung gelöst Kryptoanalyse / AES - ECB
App - Skript
Anwendung - System
Knacken
Kryptoanalyse
Forensische
Programmierung
Realist
Netzwerk
Steganografie
Web - Kunde
Web - Server
AES - 4 Rounds
AES - Fault attack #1
AES - Fault attack #2
AES - CBC - Bit-Flipping Attack
AES - ECB
AES - ECB - Copy Paste
AES - Weaker variant
AES-PMAC
AES128 - CTR
Hill Cipher
Shift cipher
Circular Bit Shift
CISCO - Salted Password
Known plaintext - XOR
Code - Pseudo Random Number Generator
Pixel Madness
ECDHE
ECDSA - Implementation error
ECDSA - Introduction
ELF64 - PID encryption
Encoding - ASCII
Encoding - Codebook
Encoding - UU
FEAL - Differential Cryptanalysis
File - PKZIP
File - Insecure storage 1
GEDEFU
Hash - DCC
Hash - DCC2
Hash - LM
Hash - Message Digest 5
Hash - NT
Hash - SHA-2
Hash - SHA-3
LFSR - Known plaintext
Enigma Machine
OTP - Implementation error
PHP - mt_rand
Discrete logarithm problem
RSA - Corrupted key 1
RSA - Corrupted key 2
RSA - Corrupted key 3
RSA - Factorisation
RSA - Continued fractions
RSA - H-rabin
RSA - Lee cooper
RSA - Common modulus
RSA - Multiple recipients
RSA - Decipher Oracle
RSA - Padding
RSA - Signature
Service - CBC Padding
Service - Hash length extension attack
Service - Timing attack
Shamir Secret Sharing - Introduction
Shamir Secret Sharing - Irreducible ?
Shamir Secret Sharing - Reduction
Shamir Secret Sharing - Traitor
Side Channel - AES : CPA
Side Channel - AES : first round
Monoalphabetic substitution - Caesar
Monoalphabetic substitution - Polybe
Polyalphabetic substitution - One Time Pad
Polyalphabetic substitution - Vigenère
System - Android lock pattern
Transposition - Rail Fence
Twisted secret
Initialisation Vector
White-Box Cryptography
Laden ...
2433 Anzahl der Mitglieder die diese Übung gelöst haben
Fatma
redmonster14
Toto
Jackenn
adelo_jason
teemo
Anis_Boss
rrock
Knox
kais fayech
Youben
max3raza
Sadik
paulo
mimosa
plean
tethys
Liftu
0xyta
Brontes
thithib
Areizen
Matthieu
jcamhi42
chmod
Yannou1979
freko28
gwensay
kikko
51nC1tyT3mp0
WinterIIE
kazenojiyu
Yir
codejump
Michel-Michel
porpeeranut
Mr-0b5cu2e
Aikari
hecsv17
offw0rld
zprtzk
dali
Hexalden
Guiforge
Yottari
THEWOLF
Amodio
Didier Arenzana
pedroysb
Aku
...
400
450
500
550
600
650
700
750
800
...