AES - 4 Rounds

35 Punkte  

Classical attack on AES-128 reduced to 4 rounds

Autor

Cryptanalyse,  

Stufe  Schwierigkeitsgrad

Validierung

59 Herausforderer 1%

Bewertung  Bewertung

13 votes
Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

Musterlösung  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
yeeeeps   AES - 4 tours fr 4. Februar 2019 zu  14:41
pwny   AES - 4 tours fr 4. Februar 2019 zu  03:20
Redouane   AES - 4 tours fr 2. Februar 2019 zu  11:02
Tears   AES - 4 tours fr 28. Januar 2019 zu  17:27
quirkdorky   AES - 4 Rounds en 23. Januar 2019 zu  13:56
Tie21   AES - 4 tours fr 23. Januar 2019 zu  11:12
Spykik   AES - 4 tours fr 17. Januar 2019 zu  17:43
nothere   AES - 4 Rounds en 15. Januar 2019 zu  20:03
RadekG   AES - 4 Rounds en 7. Januar 2019 zu  00:21
matthew   AES - 4 Rounds en 6. Januar 2019 zu  12:18

In dieser Rubrik veröffentlichte Übungen 43 Übungen

Ergebnis Name der Übung Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 27% 31638 5 Xartrick 0
pas_valide Encoding - UU 21% 25178 5 g0uZ 0
pas_valide Hash - Message Digest 5 22% 25879 5 g0uZ 1
pas_valide Hash - SHA-2 11% 12928 5 koma 1
pas_valide Shift cipher 7% 7646 10 m31z0nyx 0
pas_valide Pixel Madness 6% 6207 15 Ryscrow 0
pas_valide ELF64 - PID encryption 4% 3677 15 Lu33Y 1
pas_valide File - PKZIP 4% 4586 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 6% 6059 15 Arod 0
pas_valide Known plaintext - XOR 4% 3814 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1425 20 Tosh 0
pas_valide File - Insecure storage 1 4% 4411 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 4123 20 Arod 0
pas_valide System - Android lock pattern 3% 2600 20 Silentd 0
pas_valide Transposition - Rail Fence 3% 2461 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 152 25 Tie21 0
pas_valide AES - ECB 1% 1039 25 cez40 0
pas_valide LFSR - Known plaintext 1% 152 25 Brissouille 0
pas_valide RSA - Factorisation 2% 1682 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 407 25 Zweisamkeit 0
pas_valide Service - Timing attack 2% 1294 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1430 25 koma 0
pas_valide Initialisation Vector 1% 750 25 manticore, notfound 0
pas_valide GEDEFU 1% 238 30 makhno 0
pas_valide RSA - Corrupted key V1 1% 92 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 592 30 sambecks 0
pas_valide RSA - Common modulus 1% 508 30 franb 0
pas_valide Service - Hash length extension attack 1% 346 30 koma 0
pas_valide AES - 4 Rounds 1% 59 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 109 35 Tosh 0
pas_valide AES128 - CTR 1% 343 40 Tosh 0
pas_valide Discrete logarithm problem 1% 439 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key V2 1% 69 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 502 40 franb 0
pas_valide AES - Fault attack #1 1% 29 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 90 50 peyman 0
pas_valide ECDHE 1% 92 60 Tosh 0
pas_valide Service - CBC Padding 1% 538 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 237 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 53 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 23 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 47 75 Revenger 0
pas_valide AES - Fault attack #2 1% 22 80 Cryptanalyse 0