About

Below are some problems related to computer security (specifically poorly implemented security). Do Them. You are free to use any language and environment you like to complete them. The problems require familiarity with programming, but not necessarily with applied cryptography or computer security in general. An understanding of how some of the algorithms and tools in the problems work will be of use, so as a starting point you can find some resources to help you begin here. If this topic is new to you, you may want to start with the Tutorial Problems.

Problems

AES-CTR with Nonce Reuse

Can you exploit a reused nonce?

Solved by 54
ECDSA Nonce Recovery

Nonce reuse leading to private key recovery, this time with elliptic curves

Solved by 55
Double Strength Affine

A slight security upgrade, is it enough?

Solved by 54
Rainbow Table Hash Chain

Can you use a rainbow table to recover a password?

Solved by 51
previous 1 2 3 4 5 6 7 8 9 10 11 next