Enigma Machine

50 Punkte  0x0

World War 2

Autor

peyman,  

Stufe  Schwierigkeitsgrad

Validierung

120 Herausforderer 1%

Bewertung  Bewertung

52 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Forgi   Machine Enigma 28. März 2020 zu  18:57
TeePee   Machine Enigma 6. März 2020 zu  20:18
10function   Machine Enigma 14. Februar 2020 zu  15:04
Michael   Machine Enigma 13. Februar 2020 zu  20:52
BasicGrowth   Machine Enigma 11. Februar 2020 zu  17:56
blueshit   Machine Enigma 4. Februar 2020 zu  23:53
Kkameleon   Machine Enigma 4. Februar 2020 zu  23:48
vpkc   Machine Enigma 4. Februar 2020 zu  22:26
GGGCCDDGEC   Machine Enigma 13. Januar 2020 zu  16:59
h0n3yb0y   Enigma Machine 17. Dezember 2019 zu  20:18

 49 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 44959 5 Xartrick 2
pas_valide Encoding - UU 21% 35496 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 36084 5 g0uZ 1
pas_valide Hash - SHA-2 11% 18261 5 koma 1
pas_valide Shift cipher 7% 11093 10 m31z0nyx 0
pas_valide Pixel Madness 5% 8797 15 Ryscrow 1
pas_valide ELF64 - PID encryption 3% 4897 15 Lu33Y 1
pas_valide File - PKZIP 4% 6568 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 8362 15 Arod 0
pas_valide Known plaintext - XOR 3% 5145 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1948 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5484 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 5673 20 Arod 0
pas_valide System - Android lock pattern 3% 3635 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3448 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 494 25 Tie21 0
pas_valide AES - ECB 1% 1453 25 cez40 0
pas_valide LFSR - Known plaintext 1% 370 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2384 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 727 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1620 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1965 25 koma 0
pas_valide Initialisation Vector 1% 1075 25 manticore, notfound404 0
pas_valide GEDEFU 1% 344 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 170 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 810 30 sambecks 0
pas_valide RSA - Common modulus 1% 823 30 franb 0
pas_valide Service - Hash length extension attack 1% 507 30 koma 0
pas_valide AES - 4 Rounds 1% 127 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 99 35 Jrmbt 0
pas_valide RSA - Padding 1% 152 35 Tosh 0
pas_valide RSA - Signature 1% 32 35 stan1slas 0
pas_valide AES128 - CTR 1% 424 40 Tosh 0
pas_valide Discrete logarithm problem 1% 575 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 117 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 58 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 715 40 franb 0
pas_valide AES - Fault attack #1 1% 70 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 120 50 peyman 0
pas_valide ECDHE 1% 129 60 Tosh 0
pas_valide RSA - Lee cooper 1% 44 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 733 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 273 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 92 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 43 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 73 75 Revenger 0
pas_valide AES - Fault attack #2 1% 49 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 11 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 16 100 Tosh 0