Service - Timing attack

25 Points  0x0

Be patient.

Author

g0uZkoma,  

Level  Difficulty

Validations

1862 Challengers 1%

Note  Notation

123 Votes

To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
MsBlueberry   Service - Timing attack 28 February 2021 at 12:57
3lectro   Service - Timing attack 24 February 2021 at 22:16
mezzo   Service - Timing attack 22 February 2021 at 19:37
ThaySan   Service - Timing attack 22 February 2021 at 15:47
Enelg   Service - Timing attack 20 February 2021 at 10:19
ZayrroX   Service - Timing attack 19 February 2021 at 23:29
Fukurou   Service - Timing attack 19 February 2021 at 21:52
Pierre   Service - Timing attack 16 February 2021 at 17:12
Charlie   Service - Timing attack 15 February 2021 at 19:40
Doc Secure   Service - Timing attack 14 February 2021 at 00:21

 50 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 54139 5 Xartrick 10
pas_valide Encoding - UU 21% 42422 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 42740 5 g0uZ 6
pas_valide Hash - SHA-2 11% 22008 5 koma 4
pas_valide Shift cipher 7% 13429 10 m31z0nyx 9
pas_valide Pixel Madness 6% 10535 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 5601 15 Lu33Y 10
pas_valide File - PKZIP 4% 7915 15 g0uZ 6
pas_valide Monoalphabetic substitution - Caesar 5% 9988 15 Arod 4
pas_valide Known plaintext - XOR 3% 5968 20 Ryscrow 5
pas_valide Code - Pseudo Random Number Generator 2% 2321 20 Tosh 5
pas_valide File - Insecure storage 1 3% 6228 20 g0uZ 6
pas_valide Polyalphabetic substitution - Vigenère 4% 6616 20 Arod 3
pas_valide System - Android lock pattern 3% 4364 20 Silentd 4
pas_valide Transposition - Rail Fence 2% 4039 20 YellowS4 3
pas_valide AES - CBC - Bit-Flipping Attack 1% 756 25 Tie21 2
pas_valide AES - ECB 1% 1679 25 cez40 4
pas_valide LFSR - Known plaintext 1% 511 25 Brissouille 1
pas_valide RSA - Factorisation 2% 2829 25 HacKSpider 5
pas_valide RSA - Decipher Oracle 1% 966 25 Zweisamkeit 3
pas_valide Service - Timing attack 1% 1862 25 g0uZ, koma 4
pas_valide Monoalphabetic substitution - Polybe 2% 2354 25 koma 6
pas_valide Twisted secret 1% 134 25 NonStandardModel 1
pas_valide Initialisation Vector 1% 1280 25 manticore, notfound404 5
pas_valide GEDEFU 1% 417 30 makhno 1
pas_valide RSA - Corrupted key 1 1% 240 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 952 30 sambecks 1
pas_valide RSA - Common modulus 1% 1027 30 franb 2
pas_valide Service - Hash length extension attack 1% 644 30 koma 1
pas_valide AES - 4 Rounds 1% 169 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 141 35 Jrmbt 2
pas_valide RSA - Padding 1% 184 35 Tosh 0
pas_valide RSA - Signature 1% 74 35 s4r 1
pas_valide AES128 - CTR 1% 478 40 Tosh 2
pas_valide Discrete logarithm problem 1% 703 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key 2 1% 160 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 80 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 855 40 franb 3
pas_valide AES - Fault attack #1 1% 91 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 157 50 peyman 2
pas_valide ECDHE 1% 153 60 Tosh 2
pas_valide RSA - Lee cooper 1% 74 60 blackndoor, Synacktiv 1
pas_valide Service - CBC Padding 1% 834 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 306 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 117 60 Cryptanalyse 3
pas_valide AES - Weaker variant 1% 77 70 Cryptanalyse 1
pas_valide Hash - SHA-3 1% 86 75 Revenger 1
pas_valide AES - Fault attack #2 1% 67 80 Cryptanalyse 1
pas_valide AES-PMAC 1% 12 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 22 100 Tosh 0