GEDEFU

30 Points  

June 2, 1918, he decrypts an important message to win the First World War

Author

makhno,  

Level  Difficulty

Validations

215 Challengers 1%

Note  Notation

37 Votes
To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
meadori   GEDEFU en 13 October 2018 at 18:50
kosyk   GEDEFU fr 12 October 2018 at 00:52
swap89   GEDEFU fr 3 October 2018 at 01:40
PiAil   GEDEFU fr 25 September 2018 at 14:44
f286c42f3d9b0b1bb0ce736333a46030   GEDEFU fr 25 September 2018 at 13:06
H2H   GEDEFU fr 23 September 2018 at 15:17
Snow   GEDEFU fr 21 September 2018 at 16:24
equin0x   GEDEFU fr 21 September 2018 at 14:30
whira   GEDEFU fr 13 September 2018 at 19:53
das   GEDEFU fr 9 September 2018 at 20:13

Challenges associated with this section 42 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 28% 26774 5 Xartrick 10
pas_valide Encoding - UU 22% 21447 5 g0uZ 10
pas_valide Hash - Message Digest 5 23% 22186 5 g0uZ 5
pas_valide Hash - SHA-2 12% 11268 5 koma 3
pas_valide Shift cipher 7% 6642 10 m31z0nyx 5
pas_valide Pixel Madness 6% 5402 15 Ryscrow 10
pas_valide ELF32 - PID encryption 4% 3383 15 Lu33Y 10
pas_valide File - PKZIP 5% 4010 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 6% 5346 15 Arod 4
pas_valide Known plaintext - XOR 4% 3391 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1288 20 Tosh 4
pas_valide File - Insecure storage 1 5% 4139 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 3680 20 Arod 3
pas_valide System - Android lock pattern 3% 2350 20 Silentd 3
pas_valide Transposition - Rail Fence 3% 2168 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 95 25 Tie21 1
pas_valide AES - ECB 1% 958 25 cez40 4
pas_valide LFSR - Known plaintext 1% 122 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1494 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 329 25 Zweisamkeit 2
pas_valide Service - Timing attack 2% 1185 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1313 25 koma 6
pas_valide Initialisation Vector 1% 676 25 notfound, manticore 3
pas_valide GEDEFU 1% 215 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 72 30 blackndoor 1
pas_valide RSA - Continued fractions 1% 532 30 sambecks 1
pas_valide RSA - Common modulus 1% 424 30 franb 2
pas_valide Service - Hash length extension attack 1% 325 30 koma 1
pas_valide AES - 4 Rounds 1% 31 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 96 35 Tosh 0
pas_valide AES128 - CTR 1% 305 40 Tosh 1
pas_valide Discrete logarithm problem 1% 410 40 Thanat0s, RFC4949 2
pas_valide RSA - Corrupted key V2 1% 53 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 438 40 franb 3
pas_valide AES - Fault attack #1 1% 14 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 75 50 peyman 0
pas_valide ECDHE 1% 80 60 Tosh 2
pas_valide Service - CBC Padding 1% 501 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 223 60 Thanat0s 0
pas_valide AES - Weaker variant 1% 12 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 39 75 Revenger 1
pas_valide AES - Fault attack #2 1% 8 80 Cryptanalyse 0