GEDEFU

30 Points  

June 2, 1918, he decrypts an important message to win the First World War

Author

makhno,  

Level  Difficulty

Validations

232 Challengers 1%

Note  Notation

38 Votes
To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
Simon   GEDEFU en 8 January 2019 at 18:48
pmonti   GEDEFU fr 7 January 2019 at 16:52
RadekG   GEDEFU en 5 January 2019 at 11:10
matthew   GEDEFU en 5 January 2019 at 04:29
kritchek   GEDEFU en 2 January 2019 at 17:43
-le-guitou-   GEDEFU fr 2 January 2019 at 16:56
k6   GEDEFU fr 31 December 2018 at 02:05
r1_   GEDEFU fr 30 December 2018 at 10:32
Tie21   GEDEFU fr 29 December 2018 at 15:28
jmpbzh   GEDEFU en 23 December 2018 at 23:38

Challenges associated with this section 43 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 27% 30356 5 Xartrick 10
pas_valide Encoding - UU 21% 24229 5 g0uZ 10
pas_valide Hash - Message Digest 5 22% 24915 5 g0uZ 6
pas_valide Hash - SHA-2 11% 12507 5 koma 3
pas_valide Shift cipher 7% 7387 10 m31z0nyx 5
pas_valide Pixel Madness 6% 5988 15 Ryscrow 10
pas_valide ELF64 - PID encryption 4% 3591 15 Lu33Y 10
pas_valide File - PKZIP 4% 4425 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 6% 5856 15 Arod 4
pas_valide Known plaintext - XOR 4% 3698 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1388 20 Tosh 4
pas_valide File - Insecure storage 1 4% 4338 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 3995 20 Arod 3
pas_valide System - Android lock pattern 3% 2534 20 Silentd 3
pas_valide Transposition - Rail Fence 3% 2381 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 136 25 Tie21 1
pas_valide AES - ECB 1% 1013 25 cez40 4
pas_valide LFSR - Known plaintext 1% 146 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1628 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 383 25 Zweisamkeit 3
pas_valide Service - Timing attack 2% 1261 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1398 25 koma 6
pas_valide Initialisation Vector 1% 728 25 manticore, notfound 3
pas_valide GEDEFU 1% 232 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 89 30 blackndoor 1
pas_valide RSA - Continued fractions 1% 575 30 sambecks 1
pas_valide RSA - Common modulus 1% 481 30 franb 2
pas_valide Service - Hash length extension attack 1% 342 30 koma 1
pas_valide AES - 4 Rounds 1% 53 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 106 35 Tosh 0
pas_valide AES128 - CTR 1% 335 40 Tosh 1
pas_valide Discrete logarithm problem 1% 431 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key V2 1% 65 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 482 40 franb 3
pas_valide AES - Fault attack #1 1% 26 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 85 50 peyman 0
pas_valide ECDHE 1% 89 60 Tosh 2
pas_valide Service - CBC Padding 1% 527 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 234 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 47 60 Cryptanalyse 2
pas_valide AES - Weaker variant 1% 21 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 46 75 Revenger 1
pas_valide AES - Fault attack #2 1% 19 80 Cryptanalyse 0