Cryptanalysis

Break encryption algorithms

These tests will allow you to hone your cryptography skills. You will be faced with an encoded data. The challenge is to find the type of encoding or encryption and revert it back to find the solution.

Prerequisites:

- Knowledge of most common encoding formats.
- Knowledge of most common hash algorithms and ciphers.
- Knowledge of a scripting language.

Challenges associated with this section 47 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide AES-PMAC 1% 8 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 9 100 Tosh 0
pas_valide RSA - Corrupted key 3 1% 33 40 blackndoor 0
pas_valide AES - Fault attack #2 1% 34 80 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 36 70 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 40 35 Jrmbt 0
pas_valide AES - Fault attack #1 1% 50 50 Cryptanalyse 1
pas_valide Hash - SHA-3 1% 60 75 Revenger 1
pas_valide White-Box Cryptography 1% 87 60 Cryptanalyse 2
pas_valide RSA - Corrupted key 2 1% 96 40 blackndoor 0
pas_valide AES - 4 Rounds 1% 100 35 Cryptanalyse 0
pas_valide Enigma Machine 1% 109 50 peyman 1
pas_valide ECDHE 1% 115 60 Tosh 2
pas_valide RSA - Padding 1% 128 35 Tosh 0
pas_valide RSA - Corrupted key 1 1% 133 30 blackndoor 2
pas_valide LFSR - Known plaintext 1% 255 25 Brissouille 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 263 60 Thanat0s 0
pas_valide GEDEFU 1% 297 30 makhno 1
pas_valide AES - CBC - Bit-Flipping Attack 1% 336 25 Tie21 1
pas_valide AES128 - CTR 1% 385 40 Tosh 1
pas_valide Service - Hash length extension attack 1% 433 30 koma 1
pas_valide Discrete logarithm problem 1% 509 40 Thanat0s, RFC4949 3
pas_valide RSA - Decipher Oracle 1% 566 25 Zweisamkeit 3
pas_valide RSA - Multiple recipients 1% 590 40 franb 3
pas_valide Service - CBC Padding 1% 630 60 koma 1
pas_valide RSA - Common modulus 1% 658 30 franb 2
pas_valide RSA - Continued fractions 1% 703 30 sambecks 1
pas_valide Initialisation Vector 1% 921 25 manticore, notfound 3
pas_valide AES - ECB 1% 1246 25 cez40 4
pas_valide Service - Timing attack 1% 1477 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1694 25 koma 6
pas_valide Code - Pseudo Random Number Generator 2% 1699 20 Tosh 5
pas_valide RSA - Factorisation 2% 2044 25 HacKSpider 4
pas_valide Transposition - Rail Fence 2% 2953 20 YellowS4 2
pas_valide System - Android lock pattern 3% 3129 20 Silentd 3
pas_valide ELF64 - PID encryption 3% 4289 15 Lu33Y 10
pas_valide Known plaintext - XOR 3% 4489 20 Ryscrow 4
pas_valide Polyalphabetic substitution - Vigenère 4% 4877 20 Arod 3
pas_valide File - Insecure storage 1 4% 4933 20 g0uZ 5
pas_valide File - PKZIP 4% 5537 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 5% 7208 15 Arod 4
pas_valide Pixel Madness 5% 7532 15 Ryscrow 10
pas_valide Shift cipher 7% 9363 10 m31z0nyx 5
pas_valide Hash - SHA-2 11% 15712 5 koma 4
pas_valide Encoding - UU 20% 30790 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 31511 5 g0uZ 6
pas_valide Encoding - ASCII 26% 38869 5 Xartrick 10

Challenge Results Challenge Results

Pseudo Challenge Lang date
alguien   File - PKZIP es 21 October 2019 at 05:10
Waseem.A-K   Hash - SHA-2 en 21 October 2019 at 04:50
alguien   ELF64 - PID encryption es 21 October 2019 at 04:32
TsukinoSec   Service - CBC Padding fr 21 October 2019 at 02:41
alguien   Pixel Madness es 21 October 2019 at 02:22
alguien   Shift cipher es 21 October 2019 at 02:04
alguien   Hash - SHA-2 es 21 October 2019 at 01:58
alguien   Hash - Message Digest 5 es 21 October 2019 at 01:49
alguien   Encoding - UU es 21 October 2019 at 01:48
alguien   Encoding - ASCII es 21 October 2019 at 01:47