Hash - Message Digest 5

5 Points  

Bob found that Ronald Rivest is a terrific cryptanalyst.

Author

g0uZ,  

Level  Difficulty

Validations

23227 Challengers 23%

Note  Notation

830 Votes
To reach this part of the site please login
You should validate this challenge first

Challenge Results Challenge Results

Pseudo Challenge Lang date
_uturu_   Hash - Message Digest 5 en 18 November 2018 at 09:06
Jodode   Hash - Message Digest 5 fr 18 November 2018 at 07:18
masquerad3r   Hash - Message Digest 5 en 18 November 2018 at 04:03
DemangeJeremy   Hash - Message Digest 5 fr 18 November 2018 at 01:33
MonlyGM   Hash - Message Digest 5 en 18 November 2018 at 01:04
jckhmr   Hash - Message Digest 5 en 18 November 2018 at 00:31
olliezilla   Hash - Message Digest 5 en 18 November 2018 at 00:03
lataaja   Hash - Message Digest 5 en 17 November 2018 at 23:13
Yassiiinnn99   Hash - Message Digest 5 fr 17 November 2018 at 22:49
LawTime   Hash - Message Digest 5 fr 17 November 2018 at 21:38

Challenges associated with this section 43 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 28% 28073 5 Xartrick 10
pas_valide Encoding - UU 22% 22499 5 g0uZ 10
pas_valide Hash - Message Digest 5 23% 23227 5 g0uZ 6
pas_valide Hash - SHA-2 12% 11833 5 koma 3
pas_valide Shift cipher 7% 6947 10 m31z0nyx 5
pas_valide Pixel Madness 6% 5670 15 Ryscrow 10
pas_valide ELF64 - PID encryption 4% 3478 15 Lu33Y 10
pas_valide File - PKZIP 5% 4198 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 6% 5578 15 Arod 4
pas_valide Known plaintext - XOR 4% 3526 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1327 20 Tosh 4
pas_valide File - Insecure storage 1 5% 4208 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 3823 20 Arod 3
pas_valide System - Android lock pattern 3% 2425 20 Silentd 3
pas_valide Transposition - Rail Fence 3% 2272 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 115 25 Tie21 1
pas_valide AES - ECB 1% 981 25 cez40 4
pas_valide LFSR - Known plaintext 1% 134 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1557 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 354 25 Zweisamkeit 3
pas_valide Service - Timing attack 2% 1214 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1351 25 koma 6
pas_valide Initialisation Vector 1% 691 25 notfound, manticore 3
pas_valide GEDEFU 1% 220 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 78 30 blackndoor 1
pas_valide RSA - Continued fractions 1% 550 30 sambecks 1
pas_valide RSA - Common modulus 1% 445 30 franb 2
pas_valide Service - Hash length extension attack 1% 329 30 koma 1
pas_valide AES - 4 Rounds 1% 42 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 100 35 Tosh 0
pas_valide AES128 - CTR 1% 315 40 Tosh 1
pas_valide Discrete logarithm problem 1% 416 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key V2 1% 58 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 452 40 franb 3
pas_valide AES - Fault attack #1 1% 20 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 77 50 peyman 0
pas_valide ECDHE 1% 81 60 Tosh 2
pas_valide Service - CBC Padding 1% 505 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 223 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 35 60 Cryptanalyse 1
pas_valide AES - Weaker variant 1% 15 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 40 75 Revenger 1
pas_valide AES - Fault attack #2 1% 13 80 Cryptanalyse 0