Cryptanalysis

Break encryption algorithms

These tests will allow you to hone your cryptography skills. You will be faced with an encoded data. The challenge is to find the type of encoding or encryption and revert it back to find the solution.

Prerequisites:

- Knowledge of most common encoding formats.
- Knowledge of most common hash algorithms and ciphers.
- Knowledge of a scripting language.

 48 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 42362 5 Xartrick 10
pas_valide Encoding - UU 21% 33476 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 34136 5 g0uZ 6
pas_valide Hash - SHA-2 11% 17203 5 koma 4
pas_valide Shift cipher 7% 10311 10 m31z0nyx 6
pas_valide Pixel Madness 5% 8251 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 4644 15 Lu33Y 10
pas_valide File - PKZIP 4% 6144 15 g0uZ 6
pas_valide Monoalphabetic substitution - Caesar 5% 7841 15 Arod 4
pas_valide Known plaintext - XOR 3% 4866 20 Ryscrow 5
pas_valide Code - Pseudo Random Number Generator 2% 1829 20 Tosh 5
pas_valide File - Insecure storage 1 4% 5244 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 5313 20 Arod 3
pas_valide System - Android lock pattern 3% 3426 20 Silentd 4
pas_valide Transposition - Rail Fence 2% 3245 20 YellowS4 3
pas_valide AES - CBC - Bit-Flipping Attack 1% 414 25 Tie21 1
pas_valide AES - ECB 1% 1364 25 cez40 4
pas_valide LFSR - Known plaintext 1% 316 25 Brissouille 1
pas_valide RSA - Factorisation 2% 2240 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 639 25 Zweisamkeit 3
pas_valide Service - Timing attack 1% 1550 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1845 25 koma 6
pas_valide Initialisation Vector 1% 1006 25 manticore, notfound404 5
pas_valide GEDEFU 1% 322 30 makhno 1
pas_valide RSA - Corrupted key 1 1% 155 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 762 30 sambecks 1
pas_valide RSA - Common modulus 1% 748 30 franb 2
pas_valide Service - Hash length extension attack 1% 467 30 koma 1
pas_valide AES - 4 Rounds 1% 117 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 78 35 Jrmbt 0
pas_valide RSA - Padding 1% 141 35 Tosh 0
pas_valide AES128 - CTR 1% 406 40 Tosh 1
pas_valide Discrete logarithm problem 1% 557 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key 2 1% 109 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 50 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 664 40 franb 3
pas_valide AES - Fault attack #1 1% 61 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 112 50 peyman 1
pas_valide ECDHE 1% 123 60 Tosh 2
pas_valide RSA - Lee cooper 1% 34 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 687 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 267 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 90 60 Cryptanalyse 3
pas_valide AES - Weaker variant 1% 37 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 61 75 Revenger 1
pas_valide AES - Fault attack #2 1% 43 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 9 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 14 100 Tosh 0

Challenge Results Challenge Results

Pseudo Challenge Lang date
s73p1n   RSA - Common modulus 23 January 2020 at 01:39
Kkameleon   Vecteur d’initialisation 23 January 2020 at 01:04
haytamsahoui   Hash - Message Digest 5 23 January 2020 at 00:54
haytamsahoui   Encodage - UU 23 January 2020 at 00:40
Inta   Encoding - UU 23 January 2020 at 00:33
Inta   Encoding - ASCII 23 January 2020 at 00:31
airone   Substitution polyalphabétique - Vigenère 23 January 2020 at 00:19
knacky   AES - CBC - Bit-Flipping Attack 22 January 2020 at 23:44
so3   AES - Fault attack #2 22 January 2020 at 23:40
elia.azar   LFSR - Known plaintext 22 January 2020 at 23:27