ECDHE

60 Punkte  0x0

Diffie-Hellman key exchange on elliptic curves

Autor

Tosh,  

Stufe  Schwierigkeitsgrad

Validierung

121 Herausforderer 1%

Bewertung  Bewertung

27 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
VioletBaudelaire   ECDHE 1. Oktober 2017 zu  14:52
Tim...   ECDHE 19. September 2017 zu  09:00
pickle   ECDHE 15. September 2017 zu  13:56
klook   ECDHE 12. September 2017 zu  23:18
Jrmbt   ECDHE 7. September 2017 zu  01:16
bluepoint   ECDHE 31. August 2017 zu  20:21
ArnC   ECDHE 31. August 2017 zu  15:58
matthew   ECDHE 31. August 2017 zu  05:34
bmtd   ECDHE 22. August 2017 zu  11:46
Lesterpig   ECDHE 17. August 2017 zu  14:21

 48 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 41057 5 Xartrick 1
pas_valide Encoding - UU 21% 32477 5 g0uZ 0
pas_valide Hash - Message Digest 5 21% 33229 5 g0uZ 1
pas_valide Hash - SHA-2 11% 16685 5 koma 1
pas_valide Shift cipher 7% 10010 10 m31z0nyx 0
pas_valide Pixel Madness 5% 7993 15 Ryscrow 0
pas_valide ELF64 - PID encryption 3% 4507 15 Lu33Y 1
pas_valide File - PKZIP 4% 5911 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 7598 15 Arod 0
pas_valide Known plaintext - XOR 3% 4706 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1769 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5115 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 5134 20 Arod 0
pas_valide System - Android lock pattern 3% 3299 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3119 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 373 25 Tie21 0
pas_valide AES - ECB 1% 1308 25 cez40 0
pas_valide LFSR - Known plaintext 1% 279 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2153 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 607 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1515 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1761 25 koma 0
pas_valide Initialisation Vector 1% 967 25 manticore, notfound404 0
pas_valide GEDEFU 1% 309 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 145 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 735 30 sambecks 0
pas_valide RSA - Common modulus 1% 699 30 franb 0
pas_valide Service - Hash length extension attack 1% 450 30 koma 0
pas_valide AES - 4 Rounds 1% 110 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 70 35 Jrmbt 0
pas_valide RSA - Padding 1% 138 35 Tosh 0
pas_valide AES128 - CTR 1% 400 40 Tosh 0
pas_valide Discrete logarithm problem 1% 538 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 101 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 42 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 624 40 franb 0
pas_valide AES - Fault attack #1 1% 54 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 110 50 peyman 0
pas_valide ECDHE 1% 121 60 Tosh 0
pas_valide RSA - Lee cooper 1% 26 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 655 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 265 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 90 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 37 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 61 75 Revenger 0
pas_valide AES - Fault attack #2 1% 38 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 9 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 13 100 Tosh 0