About

Below are some problems related to computer security (specifically poorly implemented security). Do Them. You are free to use any language and environment you like to complete them. The problems require familiarity with programming, but not necessarily with applied cryptography or computer security in general. An understanding of how some of the algorithms and tools in the problems work will be of use, so as a starting point you can find some resources to help you begin here. If this topic is new to you, you may want to start with the Tutorial Problems.

Problems

HÃ¥stad's Broadcast Attack

RSA with a small exponent is fast to compute but it has a serious weakness.

Solved by 102
Insufficient Key Size

Are you running on all 8 cores? This small key is factorable on a PC with an efficient implementation.

Solved by 116
Forging OCB2 Mode Tags

OCB2 mode is proven to be theoretically secure. Unfortunately it's not practically secure.

Solved by 19
Fvtavat Xrl Erpbirel

Lbh fubhyq erpbtavmr guvf nggnpx

Solved by 42
previous 1 2 3 4 5 6 ... 9 10 11 next