Below are some problems related to computer security (specifically poorly implemented security). Do Them. You are free to use any language and environment you like to complete them. The problems require familiarity with programming, but not necessarily with applied cryptography or computer security in general. An understanding of how some of the algorithms and tools in the problems work will be of use, so as a starting point you can find some resources to help you begin here. If this topic is new to you, you may want to start with the Tutorial Problems.



This bigram cipher is a bit trickier...

Solved by 30
CRIMEs against TLS

Exploit a protocol that compresses data before encrypting it

Solved by 27
Bleichenbacher's CCA2 on RSA

A server is giving feedback it's not supposed to. Can you stage an online attack?

Solved by 22
Backdoored PRNG

Exploit a backdoor in an elliptic curve based PRNG

Solved by 19
previous 1 2 3 ... 8 9 10 11 next