RSA - Padding

35 Points  0x0

PKCS#1 v1.5 - DROWN

Author

Tosh,  

Level  Difficulty

Validations

137 Challengers 1%

Note  Notation

23 Votes

To reach this part of the site please login

  Solution

Challenge Results Challenge Results

Pseudo Challenge Lang date
pouet   RSA - Padding 4 December 2019 at 22:09
Th3G3ntl3man   RSA - Padding 18 November 2019 at 15:35
pse   RSA - Padding 17 November 2019 at 15:42
yokésé   RSA - Padding 12 November 2019 at 19:22
Grobatow   RSA - Padding 10 November 2019 at 12:19
hugow   RSA - Padding 5 November 2019 at 19:13
teemo   RSA - Padding 1 November 2019 at 17:51
Forgi   RSA - Padding 30 October 2019 at 18:10
DSpiricate   RSA - Padding 22 October 2019 at 16:15
Pierre   RSA - Padding 21 September 2019 at 19:37

 48 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 40904 5 Xartrick 10
pas_valide Encoding - UU 21% 32366 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 33125 5 g0uZ 6
pas_valide Hash - SHA-2 11% 16609 5 koma 4
pas_valide Shift cipher 7% 9965 10 m31z0nyx 6
pas_valide Pixel Madness 5% 7956 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 4492 15 Lu33Y 10
pas_valide File - PKZIP 4% 5884 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 5% 7566 15 Arod 4
pas_valide Known plaintext - XOR 3% 4687 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1762 20 Tosh 5
pas_valide File - Insecure storage 1 4% 5099 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 5107 20 Arod 3
pas_valide System - Android lock pattern 3% 3279 20 Silentd 3
pas_valide Transposition - Rail Fence 2% 3096 20 YellowS4 3
pas_valide AES - CBC - Bit-Flipping Attack 1% 371 25 Tie21 1
pas_valide AES - ECB 1% 1299 25 cez40 4
pas_valide LFSR - Known plaintext 1% 277 25 Brissouille 1
pas_valide RSA - Factorisation 2% 2142 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 605 25 Zweisamkeit 3
pas_valide Service - Timing attack 1% 1512 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1758 25 koma 6
pas_valide Initialisation Vector 1% 961 25 manticore, notfound404 4
pas_valide GEDEFU 1% 309 30 makhno 1
pas_valide RSA - Corrupted key 1 1% 144 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 730 30 sambecks 1
pas_valide RSA - Common modulus 1% 693 30 franb 2
pas_valide Service - Hash length extension attack 1% 450 30 koma 1
pas_valide AES - 4 Rounds 1% 110 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 68 35 Jrmbt 0
pas_valide RSA - Padding 1% 137 35 Tosh 0
pas_valide AES128 - CTR 1% 400 40 Tosh 1
pas_valide Discrete logarithm problem 1% 534 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key 2 1% 101 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 41 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 621 40 franb 3
pas_valide AES - Fault attack #1 1% 54 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 110 50 peyman 1
pas_valide ECDHE 1% 121 60 Tosh 2
pas_valide RSA - Lee cooper 1% 26 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 653 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 265 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 90 60 Cryptanalyse 3
pas_valide AES - Weaker variant 1% 37 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 61 75 Revenger 1
pas_valide AES - Fault attack #2 1% 38 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 9 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 13 100 Tosh 0