ECDHE

60 Punkte  0x0

Diffie-Hellman key exchange on elliptic curves

Autor

Tosh,  

Stufe  Schwierigkeitsgrad

Validierung

153 Herausforderer 1%

Bewertung  Bewertung

32 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Landais   ECDHE 9. Februar 2021 zu  14:27
k4ndar3c   ECDHE 2. Februar 2021 zu  21:38
Yousef   ECDHE 31. Januar 2021 zu  12:43
lliknart31   ECDHE 28. Januar 2021 zu  10:04
BasicGrowth   ECDHE 1. Januar 2021 zu  10:06
face0xff   ECDHE 15. Dezember 2020 zu  18:28
arthemis   ECDHE 21. November 2020 zu  16:48
Kokoon   ECDHE 8. November 2020 zu  18:03
Le Stang   ECDHE 2. November 2020 zu  20:57
nikost   ECDHE 20. Oktober 2020 zu  18:03

 50 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 54049 5 Xartrick 2
pas_valide Encoding - UU 21% 42359 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 42685 5 g0uZ 1
pas_valide Hash - SHA-2 11% 21983 5 koma 1
pas_valide Shift cipher 7% 13415 10 m31z0nyx 1
pas_valide Pixel Madness 6% 10524 15 Ryscrow 2
pas_valide ELF64 - PID encryption 3% 5595 15 Lu33Y 1
pas_valide File - PKZIP 4% 7899 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 9971 15 Arod 0
pas_valide Known plaintext - XOR 3% 5962 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 2320 20 Tosh 0
pas_valide File - Insecure storage 1 3% 6222 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 6605 20 Arod 0
pas_valide System - Android lock pattern 3% 4359 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 4033 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 753 25 Tie21 0
pas_valide AES - ECB 1% 1677 25 cez40 0
pas_valide LFSR - Known plaintext 1% 510 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2821 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 963 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1861 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 2348 25 koma 0
pas_valide Twisted secret 1% 134 25 NonStandardModel 0
pas_valide Initialisation Vector 1% 1278 25 manticore, notfound404 0
pas_valide GEDEFU 1% 416 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 240 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 951 30 sambecks 0
pas_valide RSA - Common modulus 1% 1024 30 franb 0
pas_valide Service - Hash length extension attack 1% 644 30 koma 0
pas_valide AES - 4 Rounds 1% 169 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 141 35 Jrmbt 0
pas_valide RSA - Padding 1% 184 35 Tosh 0
pas_valide RSA - Signature 1% 74 35 s4r 0
pas_valide AES128 - CTR 1% 478 40 Tosh 0
pas_valide Discrete logarithm problem 1% 702 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 160 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 80 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 851 40 franb 0
pas_valide AES - Fault attack #1 1% 91 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 157 50 peyman 0
pas_valide ECDHE 1% 153 60 Tosh 0
pas_valide RSA - Lee cooper 1% 74 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 833 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 306 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 117 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 76 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 86 75 Revenger 0
pas_valide AES - Fault attack #2 1% 67 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 12 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 22 100 Tosh 0