GEDEFU

30 Points  0x0

June 2, 1918, he decrypts an important message to win the First World War

Author

makhno,  

Level  Difficulty

Validations

330 Challengers 1%

Note  Notation

53 Votes

To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
Pierre   GEDEFU 20 February 2020 at 18:23
Pytak   GEDEFU 20 February 2020 at 16:50
Hordemavue   GEDEFU 20 February 2020 at 08:39
0x78585f4434724b5f433470556368306e5f5878   GEDEFU 12 February 2020 at 00:40
so3   GEDEFU 5 February 2020 at 19:03
Syngard   GEDEFU 30 January 2020 at 15:45
gwel   GEDEFU 28 January 2020 at 22:22
mirwitch   GEDEFU 23 January 2020 at 21:27
Fwed   GEDEFU 21 January 2020 at 18:27
1nf1n1t3_l00p   GEDEFU 18 January 2020 at 23:26

 48 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 43662 5 Xartrick 10
pas_valide Encoding - UU 21% 34447 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 35064 5 g0uZ 6
pas_valide Hash - SHA-2 11% 17717 5 koma 4
pas_valide Shift cipher 7% 10663 10 m31z0nyx 7
pas_valide Pixel Madness 5% 8507 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 4757 15 Lu33Y 10
pas_valide File - PKZIP 4% 6327 15 g0uZ 6
pas_valide Monoalphabetic substitution - Caesar 5% 8086 15 Arod 4
pas_valide Known plaintext - XOR 3% 5011 20 Ryscrow 5
pas_valide Code - Pseudo Random Number Generator 2% 1885 20 Tosh 5
pas_valide File - Insecure storage 1 4% 5346 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 5471 20 Arod 3
pas_valide System - Android lock pattern 3% 3518 20 Silentd 4
pas_valide Transposition - Rail Fence 2% 3339 20 YellowS4 3
pas_valide AES - CBC - Bit-Flipping Attack 1% 445 25 Tie21 1
pas_valide AES - ECB 1% 1401 25 cez40 4
pas_valide LFSR - Known plaintext 1% 344 25 Brissouille 1
pas_valide RSA - Factorisation 2% 2310 25 HacKSpider 5
pas_valide RSA - Decipher Oracle 1% 685 25 Zweisamkeit 3
pas_valide Service - Timing attack 1% 1579 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1890 25 koma 6
pas_valide Initialisation Vector 1% 1035 25 manticore, notfound404 5
pas_valide GEDEFU 1% 330 30 makhno 1
pas_valide RSA - Corrupted key 1 1% 163 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 781 30 sambecks 1
pas_valide RSA - Common modulus 1% 782 30 franb 2
pas_valide Service - Hash length extension attack 1% 487 30 koma 1
pas_valide AES - 4 Rounds 1% 124 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 84 35 Jrmbt 0
pas_valide RSA - Padding 1% 146 35 Tosh 0
pas_valide AES128 - CTR 1% 421 40 Tosh 1
pas_valide Discrete logarithm problem 1% 568 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key 2 1% 113 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 55 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 687 40 franb 3
pas_valide AES - Fault attack #1 1% 67 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 118 50 peyman 1
pas_valide ECDHE 1% 127 60 Tosh 2
pas_valide RSA - Lee cooper 1% 40 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 708 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 271 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 91 60 Cryptanalyse 3
pas_valide AES - Weaker variant 1% 42 70 Cryptanalyse 1
pas_valide Hash - SHA-3 1% 62 75 Revenger 1
pas_valide AES - Fault attack #2 1% 48 80 Cryptanalyse 1
pas_valide AES-PMAC 1% 10 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 16 100 Tosh 0