ECDHE

60 Punkte  0x0

Diffie-Hellman key exchange on elliptic curves

Autor

Tosh,  

Stufe  Schwierigkeitsgrad

Validierung

139 Herausforderer 1%

Bewertung  Bewertung

31 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
s4r   ECDHE 26. Mai 2018 zu  15:37
hTm1zZwW   ECDHE 17. Mai 2018 zu  05:16
McMoudi   ECDHE 4. Mai 2018 zu  14:13
Nics   ECDHE 27. April 2018 zu  10:48
berga   ECDHE 20. März 2018 zu  22:21
notfound404   ECDHE 19. März 2018 zu  00:41
wwww   ECDHE 18. März 2018 zu  18:12
JPL   ECDHE 12. März 2018 zu  21:13
chrsow   ECDHE 10. März 2018 zu  11:21
Lou   ECDHE 9. März 2018 zu  11:25

 49 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 48254 5 Xartrick 2
pas_valide Encoding - UU 21% 37932 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 38454 5 g0uZ 1
pas_valide Hash - SHA-2 11% 19598 5 koma 1
pas_valide Shift cipher 7% 11946 10 m31z0nyx 0
pas_valide Pixel Madness 5% 9422 15 Ryscrow 1
pas_valide ELF64 - PID encryption 3% 5154 15 Lu33Y 1
pas_valide File - PKZIP 4% 7088 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 9039 15 Arod 0
pas_valide Known plaintext - XOR 3% 5436 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 2072 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5737 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 6042 20 Arod 0
pas_valide System - Android lock pattern 3% 3906 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3675 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 593 25 Tie21 0
pas_valide AES - ECB 1% 1534 25 cez40 0
pas_valide LFSR - Known plaintext 1% 433 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2547 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 822 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1723 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 2120 25 koma 0
pas_valide Initialisation Vector 1% 1154 25 manticore, notfound404 0
pas_valide GEDEFU 1% 381 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 202 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 861 30 sambecks 0
pas_valide RSA - Common modulus 1% 894 30 franb 0
pas_valide Service - Hash length extension attack 1% 555 30 koma 0
pas_valide AES - 4 Rounds 1% 145 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 117 35 Jrmbt 0
pas_valide RSA - Padding 1% 160 35 Tosh 0
pas_valide RSA - Signature 1% 56 35 s4r 0
pas_valide AES128 - CTR 1% 449 40 Tosh 0
pas_valide Discrete logarithm problem 1% 613 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 136 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 67 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 767 40 franb 0
pas_valide AES - Fault attack #1 1% 79 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 141 50 peyman 0
pas_valide ECDHE 1% 139 60 Tosh 0
pas_valide RSA - Lee cooper 1% 57 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 772 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 284 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 102 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 47 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 79 75 Revenger 0
pas_valide AES - Fault attack #2 1% 53 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 11 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 18 100 Tosh 0