ECDHE

60 Points  

Diffie-Hellman key exchange on elliptic curves

Author

Tosh,  

Level  Difficulty

Validations

115 Challengers 1%

Note  Notation

27 Votes
To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
g2i   ECDHE fr 25 September 2019 at 16:11
YADDD   ECDHE fr 14 September 2019 at 11:48
PiAil   ECDHE fr 2 September 2019 at 13:40
chuck_bartowsky   ECDHE en 19 August 2019 at 19:18
Sacriyana   ECDHE fr 3 August 2019 at 00:53
Headorteil   ECDHE fr 31 July 2019 at 10:39
Bdenneu   ECDHE fr 30 July 2019 at 06:48
S3v3ru5   ECDHE en 29 July 2019 at 11:08
Mister7F   ECDHE fr 27 July 2019 at 00:49
apges01   ECDHE fr 5 July 2019 at 15:08

Challenges associated with this section 47 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 38814 5 Xartrick 10
pas_valide Encoding - UU 20% 30739 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 31470 5 g0uZ 6
pas_valide Hash - SHA-2 11% 15686 5 koma 4
pas_valide Shift cipher 7% 9345 10 m31z0nyx 5
pas_valide Pixel Madness 5% 7520 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 4283 15 Lu33Y 10
pas_valide File - PKZIP 4% 5528 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 5% 7195 15 Arod 4
pas_valide Known plaintext - XOR 3% 4484 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1692 20 Tosh 5
pas_valide File - Insecure storage 1 4% 4923 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 4868 20 Arod 3
pas_valide System - Android lock pattern 3% 3123 20 Silentd 3
pas_valide Transposition - Rail Fence 2% 2947 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 334 25 Tie21 1
pas_valide AES - ECB 1% 1241 25 cez40 4
pas_valide LFSR - Known plaintext 1% 253 25 Brissouille 1
pas_valide RSA - Factorisation 2% 2041 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 563 25 Zweisamkeit 3
pas_valide Service - Timing attack 1% 1475 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1692 25 koma 6
pas_valide Initialisation Vector 1% 920 25 manticore, notfound 3
pas_valide GEDEFU 1% 297 30 makhno 1
pas_valide RSA - Corrupted key 1 1% 132 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 701 30 sambecks 1
pas_valide RSA - Common modulus 1% 658 30 franb 2
pas_valide Service - Hash length extension attack 1% 433 30 koma 1
pas_valide AES - 4 Rounds 1% 99 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 38 35 Jrmbt 0
pas_valide RSA - Padding 1% 128 35 Tosh 0
pas_valide AES128 - CTR 1% 385 40 Tosh 1
pas_valide Discrete logarithm problem 1% 508 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key 2 1% 96 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 33 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 589 40 franb 3
pas_valide AES - Fault attack #1 1% 50 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 109 50 peyman 1
pas_valide ECDHE 1% 115 60 Tosh 2
pas_valide Service - CBC Padding 1% 627 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 263 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 87 60 Cryptanalyse 2
pas_valide AES - Weaker variant 1% 36 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 60 75 Revenger 1
pas_valide AES - Fault attack #2 1% 34 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 8 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 9 100 Tosh 0