ECDHE

60 Punkte  0x0

Diffie-Hellman key exchange on elliptic curves

Autor

Tosh,  

Stufe  Schwierigkeitsgrad

Validierung

123 Herausforderer 1%

Bewertung  Bewertung

27 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
pedroysb   ECDHE 3. Januar 2020 zu  05:18
mjuuum   ECDHE 25. Dezember 2019 zu  19:02
Huuuuwiiiit   ECDHE 28. November 2019 zu  19:20
AESon   ECDHE 16. November 2019 zu  17:54
hexabeast   ECDHE 11. November 2019 zu  15:33
madbat2   ECDHE 8. November 2019 zu  11:49
Mounhy   ECDHE 6. November 2019 zu  22:59
Th3_JagDt1g3R   ECDHE 28. Oktober 2019 zu  20:59
g2i   ECDHE 25. September 2019 zu  16:11
YADDD   ECDHE 14. September 2019 zu  11:48

 48 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 42261 5 Xartrick 2
pas_valide Encoding - UU 21% 33395 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 34064 5 g0uZ 1
pas_valide Hash - SHA-2 11% 17145 5 koma 1
pas_valide Shift cipher 7% 10278 10 m31z0nyx 0
pas_valide Pixel Madness 5% 8221 15 Ryscrow 1
pas_valide ELF64 - PID encryption 3% 4630 15 Lu33Y 1
pas_valide File - PKZIP 4% 6120 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 7814 15 Arod 0
pas_valide Known plaintext - XOR 3% 4854 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1822 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5235 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 5296 20 Arod 0
pas_valide System - Android lock pattern 3% 3412 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3237 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 409 25 Tie21 0
pas_valide AES - ECB 1% 1359 25 cez40 0
pas_valide LFSR - Known plaintext 1% 312 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2229 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 636 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1545 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1837 25 koma 0
pas_valide Initialisation Vector 1% 1001 25 manticore, notfound404 0
pas_valide GEDEFU 1% 321 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 153 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 758 30 sambecks 0
pas_valide RSA - Common modulus 1% 743 30 franb 0
pas_valide Service - Hash length extension attack 1% 466 30 koma 0
pas_valide AES - 4 Rounds 1% 117 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 77 35 Jrmbt 0
pas_valide RSA - Padding 1% 141 35 Tosh 0
pas_valide AES128 - CTR 1% 406 40 Tosh 0
pas_valide Discrete logarithm problem 1% 556 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 108 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 50 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 658 40 franb 0
pas_valide AES - Fault attack #1 1% 60 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 112 50 peyman 0
pas_valide ECDHE 1% 123 60 Tosh 0
pas_valide RSA - Lee cooper 1% 34 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 685 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 267 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 90 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 37 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 61 75 Revenger 0
pas_valide AES - Fault attack #2 1% 42 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 9 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 14 100 Tosh 0