GEDEFU

30 Punkte  0x0

June 2, 1918, he decrypts an important message to win the First World War

Autor

makhno,  

Stufe  Schwierigkeitsgrad

Validierung

404 Herausforderer 1%

Bewertung  Bewertung

64 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Najalix   GEDEFU 29. November 2020 zu  21:22
di4blo   GEDEFU 24. November 2020 zu  01:59
arthemis   GEDEFU 14. November 2020 zu  13:41
Laden   GEDEFU 12. November 2020 zu  13:08
JosePisco   GEDEFU 25. Oktober 2020 zu  18:00
diedi   GEDEFU 24. Oktober 2020 zu  18:23
orchas   GEDEFU 22. Oktober 2020 zu  21:56
nikost   GEDEFU 20. Oktober 2020 zu  17:28
Laika   GEDEFU 6. Oktober 2020 zu  17:34
balicocat   GEDEFU 5. Oktober 2020 zu  09:13

 50 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 51760 5 Xartrick 2
pas_valide Encoding - UU 21% 40646 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 41004 5 g0uZ 1
pas_valide Hash - SHA-2 11% 21053 5 koma 1
pas_valide Shift cipher 7% 12862 10 m31z0nyx 1
pas_valide Pixel Madness 6% 10101 15 Ryscrow 2
pas_valide ELF64 - PID encryption 3% 5441 15 Lu33Y 1
pas_valide File - PKZIP 4% 7570 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 9636 15 Arod 0
pas_valide Known plaintext - XOR 3% 5781 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 2221 20 Tosh 0
pas_valide File - Insecure storage 1 4% 6024 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 6407 20 Arod 0
pas_valide System - Android lock pattern 3% 4184 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3865 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 690 25 Tie21 0
pas_valide AES - ECB 1% 1621 25 cez40 0
pas_valide LFSR - Known plaintext 1% 474 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2718 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 906 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1807 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 2269 25 koma 0
pas_valide Twisted secret 1% 102 25 NonStandardModel 0
pas_valide Initialisation Vector 1% 1232 25 manticore, notfound404 0
pas_valide GEDEFU 1% 404 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 223 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 921 30 sambecks 0
pas_valide RSA - Common modulus 1% 974 30 franb 0
pas_valide Service - Hash length extension attack 1% 608 30 koma 0
pas_valide AES - 4 Rounds 1% 161 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 133 35 Jrmbt 0
pas_valide RSA - Padding 1% 177 35 Tosh 0
pas_valide RSA - Signature 1% 67 35 s4r 0
pas_valide AES128 - CTR 1% 466 40 Tosh 0
pas_valide Discrete logarithm problem 1% 667 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 147 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 75 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 825 40 franb 0
pas_valide AES - Fault attack #1 1% 86 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 149 50 peyman 0
pas_valide ECDHE 1% 147 60 Tosh 0
pas_valide RSA - Lee cooper 1% 66 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 808 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 295 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 112 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 57 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 81 75 Revenger 0
pas_valide AES - Fault attack #2 1% 64 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 11 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 20 100 Tosh 0