RSA - Corrupted key 2

40 Punkte  0x0

Even with less, you can do it!

Autor

blackndoor,  

Stufe  Schwierigkeitsgrad

Validierung

162 Herausforderer 1%

Bewertung  Bewertung

25 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

  Musterlösung

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
EF115_bmkiet   RSA - Corrupted key 2 2. März 2021 zu  19:05
kira_1805   RSA - Clé privée corrompue 2 1. März 2021 zu  20:21
themaks   RSA - Clé privée corrompue 2 8. Februar 2021 zu  17:19
Landais   RSA - Clé privée corrompue 2 8. Februar 2021 zu  10:04
xanhacks   RSA - Clé privée corrompue 2 2. Februar 2021 zu  09:42
acmo0   RSA - Clé privée corrompue 2 19. Januar 2021 zu  11:14
John Russel   RSA - Clé privée corrompue 2 11. Januar 2021 zu  20:54
bandianconde   RSA - Corrupted key 2 2. Januar 2021 zu  20:04
yokese   RSA - Clé privée corrompue 2 28. Dezember 2020 zu  17:19
ghizmo   RSA - Clé privée corrompue 2 23. Dezember 2020 zu  15:12

 50 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 54285 5 Xartrick 2
pas_valide Encoding - UU 21% 42523 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 42840 5 g0uZ 1
pas_valide Hash - SHA-2 11% 22060 5 koma 1
pas_valide Shift cipher 7% 13454 10 m31z0nyx 1
pas_valide Pixel Madness 6% 10552 15 Ryscrow 2
pas_valide ELF64 - PID encryption 3% 5606 15 Lu33Y 1
pas_valide File - PKZIP 4% 7935 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 9998 15 Arod 0
pas_valide Known plaintext - XOR 3% 5979 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 2323 20 Tosh 0
pas_valide File - Insecure storage 1 3% 6239 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 6634 20 Arod 0
pas_valide System - Android lock pattern 3% 4375 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 4055 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 766 25 Tie21 0
pas_valide AES - ECB 1% 1683 25 cez40 0
pas_valide LFSR - Known plaintext 1% 516 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2836 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 967 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1867 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 2363 25 koma 0
pas_valide Twisted secret 1% 138 25 NonStandardModel 0
pas_valide Initialisation Vector 1% 1281 25 manticore, notfound404 0
pas_valide GEDEFU 1% 418 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 241 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 954 30 sambecks 0
pas_valide RSA - Common modulus 1% 1028 30 franb 0
pas_valide Service - Hash length extension attack 1% 647 30 koma 0
pas_valide AES - 4 Rounds 1% 170 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 143 35 Jrmbt 0
pas_valide RSA - Padding 1% 184 35 Tosh 0
pas_valide RSA - Signature 1% 75 35 s4r 0
pas_valide AES128 - CTR 1% 478 40 Tosh 0
pas_valide Discrete logarithm problem 1% 706 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 162 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 80 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 859 40 franb 0
pas_valide AES - Fault attack #1 1% 91 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 157 50 peyman 0
pas_valide ECDHE 1% 154 60 Tosh 0
pas_valide RSA - Lee cooper 1% 75 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 837 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 306 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 117 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 77 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 92 75 Revenger 0
pas_valide AES - Fault attack #2 1% 68 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 12 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 22 100 Tosh 0