ECDHE

60 Punkte  

Diffie-Hellman key exchange on elliptic curves

Autor

Tosh,  

Stufe  Schwierigkeitsgrad

Validierung

112 Herausforderer 1%

Bewertung  Bewertung

27 votes
Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

Musterlösung  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
chuck_bartowsky   ECDHE en 19. August 2019 zu  19:18
Sacriyana   ECDHE fr 3. August 2019 zu  00:53
Headorteil   ECDHE fr 31. Juli 2019 zu  10:39
Bdenneu   ECDHE fr 30. Juli 2019 zu  06:48
D4r7h_V4d3r   ECDHE en 29. Juli 2019 zu  11:08
Mister7F   ECDHE fr 27. Juli 2019 zu  00:49
apges01   ECDHE fr 5. Juli 2019 zu  15:08
6monscc   ECDHE fr 4. Juli 2019 zu  21:13
ralle   ECDHE en 1. Juli 2019 zu  22:11
sirk390   ECDHE en 11. Juni 2019 zu  10:45

In dieser Rubrik veröffentlichte Übungen 44 Übungen

Ergebnis Name der Übung Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 36850 5 Xartrick 1
pas_valide Encoding - UU 21% 29229 5 g0uZ 0
pas_valide Hash - Message Digest 5 21% 29942 5 g0uZ 1
pas_valide Hash - SHA-2 11% 14958 5 koma 1
pas_valide Shift cipher 7% 8836 10 m31z0nyx 0
pas_valide Pixel Madness 5% 7152 15 Ryscrow 0
pas_valide ELF64 - PID encryption 3% 4115 15 Lu33Y 1
pas_valide File - PKZIP 4% 5276 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 6877 15 Arod 0
pas_valide Known plaintext - XOR 3% 4322 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1633 20 Tosh 0
pas_valide File - Insecure storage 1 4% 4820 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 4678 20 Arod 0
pas_valide System - Android lock pattern 3% 3005 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 2834 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 302 25 Tie21 0
pas_valide AES - ECB 1% 1191 25 cez40 0
pas_valide LFSR - Known plaintext 1% 234 25 Brissouille 0
pas_valide RSA - Factorisation 2% 1978 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 535 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1437 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1631 25 koma 0
pas_valide Initialisation Vector 1% 883 25 manticore, notfound 0
pas_valide GEDEFU 1% 278 30 makhno 0
pas_valide RSA - Corrupted key V1 1% 118 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 676 30 sambecks 0
pas_valide RSA - Common modulus 1% 623 30 franb 0
pas_valide Service - Hash length extension attack 1% 411 30 koma 0
pas_valide AES - 4 Rounds 1% 89 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 124 35 Tosh 0
pas_valide AES128 - CTR 1% 376 40 Tosh 0
pas_valide Discrete logarithm problem 1% 500 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key V2 1% 91 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 578 40 franb 0
pas_valide AES - Fault attack #1 1% 45 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 102 50 peyman 0
pas_valide ECDHE 1% 112 60 Tosh 0
pas_valide Service - CBC Padding 1% 616 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 255 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 73 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 32 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 57 75 Revenger 0
pas_valide AES - Fault attack #2 1% 32 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 7 100 Cryptanalyse 0