Hash - SHA-3

75 Punkte  0x0

Reverse the Keccak algorithm

Autor

Revenger,  

Stufe  Schwierigkeitsgrad

Validierung

61 Herausforderer 1%

Bewertung  Bewertung

18 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Wiremask   Hash - SHA-3 3. Dezember 2019 zu  19:15
macz   Hash - SHA-3 19. Oktober 2019 zu  17:56
nonstandardmodel   Hash - SHA-3 9. Oktober 2019 zu  17:45
rogdham   Hash - SHA-3 16. September 2019 zu  22:46
$in   Hash - SHA-3 24. Juli 2019 zu  23:11
franb   Hash - SHA-3 30. Mai 2019 zu  09:28
Skywhi   Hash - SHA-3 22. Mai 2019 zu  23:27
H4cK0pp   Hash - SHA-3 20. März 2019 zu  14:51
lederrey   Hash - SHA-3 14. März 2019 zu  10:54
joel   Hash - SHA-3 14. März 2019 zu  10:49

 48 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 42487 5 Xartrick 2
pas_valide Encoding - UU 21% 33560 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 34212 5 g0uZ 1
pas_valide Hash - SHA-2 11% 17248 5 koma 1
pas_valide Shift cipher 7% 10359 10 m31z0nyx 0
pas_valide Pixel Madness 5% 8271 15 Ryscrow 1
pas_valide ELF64 - PID encryption 3% 4650 15 Lu33Y 1
pas_valide File - PKZIP 4% 6158 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 7876 15 Arod 0
pas_valide Known plaintext - XOR 3% 4879 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1835 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5250 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 5332 20 Arod 0
pas_valide System - Android lock pattern 3% 3432 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3261 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 422 25 Tie21 0
pas_valide AES - ECB 1% 1369 25 cez40 0
pas_valide LFSR - Known plaintext 1% 320 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2255 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 652 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1551 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1850 25 koma 0
pas_valide Initialisation Vector 1% 1009 25 manticore, notfound404 0
pas_valide GEDEFU 1% 323 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 158 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 766 30 sambecks 0
pas_valide RSA - Common modulus 1% 759 30 franb 0
pas_valide Service - Hash length extension attack 1% 472 30 koma 0
pas_valide AES - 4 Rounds 1% 117 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 81 35 Jrmbt 0
pas_valide RSA - Padding 1% 141 35 Tosh 0
pas_valide AES128 - CTR 1% 408 40 Tosh 0
pas_valide Discrete logarithm problem 1% 560 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 109 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 51 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 671 40 franb 0
pas_valide AES - Fault attack #1 1% 61 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 112 50 peyman 0
pas_valide ECDHE 1% 123 60 Tosh 0
pas_valide RSA - Lee cooper 1% 35 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 690 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 267 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 90 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 38 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 61 75 Revenger 0
pas_valide AES - Fault attack #2 1% 43 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 9 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 14 100 Tosh 0