Hash - SHA-3

75 Points  

Reverse the Keccak algorithm

Author

Revenger,  

Level  Difficulty

Validations

46 Challengers 1%

Note  Notation

14 Votes
To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
pmonti   Hash - SHA-3 en 1 January 2019 at 23:21
3cl1ps   Hash - SHA-3 en 12 December 2018 at 13:38
Tie21   Hash - SHA-3 fr 27 November 2018 at 10:58
Evig   Hash - SHA-3 fr 22 November 2018 at 23:23
Aexelion   Hash - SHA-3 fr 20 November 2018 at 15:47
Haenim   Hash - SHA-3 en 20 November 2018 at 15:46
Lefnui   Hash - SHA-3 fr 24 October 2018 at 14:21
Sogg   Hash - SHA-3 fr 20 September 2018 at 13:55
corpsfini   Hash - SHA-3 fr 12 September 2018 at 13:36
Baptiste M. (Creased)   Hash - SHA-3 fr 28 August 2018 at 15:31

Challenges associated with this section 43 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 27% 30539 5 Xartrick 10
pas_valide Encoding - UU 21% 24346 5 g0uZ 10
pas_valide Hash - Message Digest 5 22% 25031 5 g0uZ 6
pas_valide Hash - SHA-2 11% 12554 5 koma 3
pas_valide Shift cipher 7% 7422 10 m31z0nyx 5
pas_valide Pixel Madness 6% 6011 15 Ryscrow 10
pas_valide ELF64 - PID encryption 4% 3604 15 Lu33Y 10
pas_valide File - PKZIP 4% 4440 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 6% 5873 15 Arod 4
pas_valide Known plaintext - XOR 4% 3716 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1390 20 Tosh 4
pas_valide File - Insecure storage 1 4% 4341 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 4009 20 Arod 3
pas_valide System - Android lock pattern 3% 2541 20 Silentd 3
pas_valide Transposition - Rail Fence 3% 2386 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 137 25 Tie21 1
pas_valide AES - ECB 1% 1015 25 cez40 4
pas_valide LFSR - Known plaintext 1% 146 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1635 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 386 25 Zweisamkeit 3
pas_valide Service - Timing attack 2% 1264 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1401 25 koma 6
pas_valide Initialisation Vector 1% 730 25 manticore, notfound 3
pas_valide GEDEFU 1% 232 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 89 30 blackndoor 1
pas_valide RSA - Continued fractions 1% 578 30 sambecks 1
pas_valide RSA - Common modulus 1% 487 30 franb 2
pas_valide Service - Hash length extension attack 1% 342 30 koma 1
pas_valide AES - 4 Rounds 1% 53 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 106 35 Tosh 0
pas_valide AES128 - CTR 1% 335 40 Tosh 1
pas_valide Discrete logarithm problem 1% 431 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key V2 1% 65 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 487 40 franb 3
pas_valide AES - Fault attack #1 1% 26 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 86 50 peyman 0
pas_valide ECDHE 1% 89 60 Tosh 2
pas_valide Service - CBC Padding 1% 528 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 234 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 47 60 Cryptanalyse 2
pas_valide AES - Weaker variant 1% 21 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 46 75 Revenger 1
pas_valide AES - Fault attack #2 1% 19 80 Cryptanalyse 0