RSA - Corrupted key 1

30 Punkte  

Private exponent

Autor

blackndoor,  

Stufe  Schwierigkeitsgrad

Validierung

132 Herausforderer 1%

Bewertung  Bewertung

32 votes
Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

Musterlösung  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Danhia   RSA - Clé privée corrompue 1 fr 19. Oktober 2019 zu  14:14
yokésé   RSA - Clé privée corrompue 1 fr 15. Oktober 2019 zu  11:55
MaxiSam   RSA - Clé privée corrompue 1 fr 10. Oktober 2019 zu  17:29
nonstandardmodel   RSA - Corrupted key 1 en 9. Oktober 2019 zu  19:27
pse   RSA - Corrupted key 1 en 1. Oktober 2019 zu  10:59
iansus   RSA - Clé privée corrompue 1 fr 23. September 2019 zu  17:25
rAxOV   RSA - Corrupted key 1 en 21. September 2019 zu  01:26
Cryptanalyse   RSA - Clé privée corrompue 1 fr 20. September 2019 zu  18:26
Duani   RSA - Corrupted key 1 en 20. September 2019 zu  10:51
rogdham   RSA - Clé privée corrompue 1 fr 17. September 2019 zu  21:03

In dieser Rubrik veröffentlichte Übungen 47 Übungen

Ergebnis Name der Übung Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 38853 5 Xartrick 1
pas_valide Encoding - UU 20% 30776 5 g0uZ 0
pas_valide Hash - Message Digest 5 21% 31500 5 g0uZ 1
pas_valide Hash - SHA-2 11% 15700 5 koma 1
pas_valide Shift cipher 7% 9356 10 m31z0nyx 0
pas_valide Pixel Madness 5% 7526 15 Ryscrow 0
pas_valide ELF64 - PID encryption 3% 4286 15 Lu33Y 1
pas_valide File - PKZIP 4% 5534 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 7205 15 Arod 0
pas_valide Known plaintext - XOR 3% 4488 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 1697 20 Tosh 0
pas_valide File - Insecure storage 1 4% 4929 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 4875 20 Arod 0
pas_valide System - Android lock pattern 3% 3126 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 2950 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 335 25 Tie21 0
pas_valide AES - ECB 1% 1245 25 cez40 0
pas_valide LFSR - Known plaintext 1% 253 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2043 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 566 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1476 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 1693 25 koma 0
pas_valide Initialisation Vector 1% 921 25 manticore, notfound 0
pas_valide GEDEFU 1% 297 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 132 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 702 30 sambecks 0
pas_valide RSA - Common modulus 1% 658 30 franb 0
pas_valide Service - Hash length extension attack 1% 433 30 koma 0
pas_valide AES - 4 Rounds 1% 99 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 39 35 Jrmbt 0
pas_valide RSA - Padding 1% 128 35 Tosh 0
pas_valide AES128 - CTR 1% 385 40 Tosh 0
pas_valide Discrete logarithm problem 1% 508 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 96 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 33 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 589 40 franb 0
pas_valide AES - Fault attack #1 1% 50 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 109 50 peyman 0
pas_valide ECDHE 1% 115 60 Tosh 0
pas_valide Service - CBC Padding 1% 629 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 263 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 87 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 36 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 60 75 Revenger 0
pas_valide AES - Fault attack #2 1% 34 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 8 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 9 100 Tosh 0