About

Below are some problems related to computer security (specifically poorly implemented security). Do Them. You are free to use any language and environment you like to complete them. The problems require familiarity with programming, but not necessarily with applied cryptography or computer security in general. An understanding of how some of the algorithms and tools in the problems work will be of use, so as a starting point you can find some resources to help you begin here. If this topic is new to you, you may want to start with the Tutorial Problems.

Problems

Fast Hashing Passwords

Cryptographic hash functions shouldn't be used to hash passwords directly

Solved by 123
CCA on Textbook RSA

Turns out padding is important

Solved by 112
CBC Padding Attack

CBC is one of the best modes of operation for block ciphers, but even leaking a tiny amount of information is enough to completely undermine its security.

Solved by 47
Intro to RSA

Learn the basics of a common public key cryptosystem

Solved by 385
previous 1 2 3 4 5 6 7 8 9 10 11 next