Cryptanalysis

You can test your cryptanalysis skills here.

These tests will allow you to hone your cryptography skills. You will be faced with an encoded data. The challenge is to find the type of encoding or encryption and revert it back to find the solution.

Prerequisites:

- Knowledge of most common encoding formats.
- Knowledge of most common hash algorithms and ciphers.
- Knowledge of a scripting language.

Challenges associated with this section 38 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 28% 24663 5 Xartrick 10
pas_valide Encoding - UU 22% 19771 5 g0uZ 8
pas_valide Hash - Message Digest 5 23% 20470 5 g0uZ 4
pas_valide Hash - SHA-2 12% 10292 5 koma 2
pas_valide Shift cipher 7% 6083 10 m31z0nyx 5
pas_valide Pixel Madness 6% 4876 15 Ryscrow 8
pas_valide ELF32 - PID encryption 4% 3236 15 Lu33Y 9
pas_valide File - PKZIP 5% 3641 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 6% 5007 15 Arod 4
pas_valide Known plaintext - XOR 4% 3151 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1199 20 Tosh 3
pas_valide File - Insecure storage 1 5% 3904 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 3438 20 Arod 3
pas_valide System - Android lock pattern 3% 2166 20 Silentd 2
pas_valide Transposition - Rail Fence 3% 2013 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 46 25 Tie21 0
pas_valide AES - ECB 1% 899 25 cez40 4
pas_valide LFSR - Known plaintext 1% 105 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1409 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 293 25 Zweisamkeit 2
pas_valide Service - Timing attack 2% 1119 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1240 25 koma 6
pas_valide Initialisation Vector 1% 640 25 notfound, manticore 3
pas_valide GEDEFU 1% 196 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 60 30 blackndoor 1
pas_valide RSA - Continued fractions 1% 500 30 sambecks 1
pas_valide RSA - Common modulus 1% 382 30 franb 2
pas_valide Service - Hash length extension attack 1% 298 30 koma 1
pas_valide RSA - Padding 1% 87 35 Tosh 0
pas_valide AES128 - CTR 1% 289 40 Tosh 1
pas_valide Discrete logarithm problem 1% 394 40 Thanat0s, RFC4949 2
pas_valide RSA - Corrupted key V2 1% 43 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 409 40 franb 1
pas_valide Enigma Machine 1% 63 50 peyman 0
pas_valide ECDHE 1% 76 60 Tosh 1
pas_valide Service - CBC Padding 1% 484 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 214 60 Thanat0s 0
pas_valide Hash - SHA-3 1% 31 75 Revenger 1

Challenge Results Challenge Results

Pseudo Challenge Lang date
Ozdor   Encodage - ASCII fr 16 July 2018 at 02:06
Mysak0CZ   System - Android lock pattern en 16 July 2018 at 01:26
Mysak0CZ   Polyalphabetic substitution - Vigenère en 16 July 2018 at 01:19
Mysak0CZ   File - Insecure storage 1 en 16 July 2018 at 01:04
Mysak0CZ   Code - Pseudo Random Number Generator en 16 July 2018 at 00:56
ken   Clair connu - XOR fr 16 July 2018 at 00:47
Mysak0CZ   File - PKZIP en 16 July 2018 at 00:01
Moebius   Code - Pseudo Random Number Generator fr 15 July 2018 at 23:22
Javi   AES - ECB en 15 July 2018 at 22:20
Javi   AES - CBC - Bit-Flipping Attack en 15 July 2018 at 22:07