Below are some problems related to computer security (specifically poorly implemented security). Do Them. You are free to use any language and environment you like to complete them. The problems require familiarity with programming, but not necessarily with applied cryptography or computer security in general. An understanding of how some of the algorithms and tools in the problems work will be of use, so as a starting point you can find some resources to help you begin here. If this topic is new to you, you may want to start with the Tutorial Problems.


Factoring RSA With CRT Optimization

Recover a RSA private key when an optimization goes wrong

Solved by 119
RSA Modulus Factorization

Factor an RSA modulus using the public and private key

Solved by 89

One of the most difficult problems to pronounce

Solved by 150
Monoalphabetic Cipher

Monoalphabetic ciphers leak information. Can you recover it?

Solved by 135
previous 1 2 3 4 5 6 ... 9 10 11 next