Directories
¶
Path | Synopsis |
---|---|
challenges
|
|
01
Convert hex to base64
|
Convert hex to base64 |
02
Fixed XOR: Write a function that takes two equal-length buffers and produces their XOR combination.
|
Fixed XOR: Write a function that takes two equal-length buffers and produces their XOR combination. |
03
Single-byte XOR cipher
|
Single-byte XOR cipher |
04
Detect single-character XOR
|
Detect single-character XOR |
05
Implement repeating-key XOR
|
Implement repeating-key XOR |
06
Break repeating-key XOR
|
Break repeating-key XOR |
07
AES in ECB mode
|
AES in ECB mode |
08
Detect AES in ECB mode
|
Detect AES in ECB mode |
09
Implement PKCS#7 padding
|
Implement PKCS#7 padding |
10
Implement CBC mode
|
Implement CBC mode |
11
An ECB/CBC detection oracle
|
An ECB/CBC detection oracle |
12
Byte-at-a-time ECB decryption (Simple)
|
Byte-at-a-time ECB decryption (Simple) |
13
ECB cut-and-paste
|
ECB cut-and-paste |
14
Byte-at-a-time ECB decryption (Harder)
|
Byte-at-a-time ECB decryption (Harder) |
15
PKCS#7 padding validation
|
PKCS#7 padding validation |
16
CBC bitflipping attacks
|
CBC bitflipping attacks |
17
The CBC padding oracle
|
The CBC padding oracle |
18
Implement CTR, the stream cipher mode
|
Implement CTR, the stream cipher mode |
19
Break fixed-nonce CTR mode using substitutions
|
Break fixed-nonce CTR mode using substitutions |
20
Break fixed-nonce CTR statistically
|
Break fixed-nonce CTR statistically |
21
Implement the MT19937 Mersenne Twister RNG
|
Implement the MT19937 Mersenne Twister RNG |
22
Crack an MT19937 seed
|
Crack an MT19937 seed |
23
Clone an MT19937 RNG from its output
|
Clone an MT19937 RNG from its output |
24
Create the MT19937 stream cipher and break it
|
Create the MT19937 stream cipher and break it |
25
Break "random access read/write" AES CTR
|
Break "random access read/write" AES CTR |
26
CTR bitflipping
|
CTR bitflipping |
27
Recover the key from CBC with IV=Key
|
Recover the key from CBC with IV=Key |
28
Implement a SHA-1 keyed MAC
|
Implement a SHA-1 keyed MAC |
29
Break a SHA-1 keyed MAC using length extension
|
Break a SHA-1 keyed MAC using length extension |
30
Break an MD4 keyed MAC using length extension
|
Break an MD4 keyed MAC using length extension |
31
Implement and break HMAC-SHA1 with an artificial timing leak
|
Implement and break HMAC-SHA1 with an artificial timing leak |
32
Break HMAC-SHA1 with a slightly less artificial timing leak
|
Break HMAC-SHA1 with a slightly less artificial timing leak |
Package md4 implements the MD4 hash algorithm as defined in RFC 1320.
|
Package md4 implements the MD4 hash algorithm as defined in RFC 1320. |
Package sha1 implements the SHA-1 hash algorithm as defined in RFC 3174.
|
Package sha1 implements the SHA-1 hash algorithm as defined in RFC 3174. |
Click to show internal directories.
Click to hide internal directories.