Finish challenge set 6, original challenges completed
This commit is contained in:
55
README.md
55
README.md
@@ -1,3 +1,58 @@
|
||||
# cryptopals
|
||||
|
||||
My solutions to the [cryptopals](https://cryptopals.com/) challenges.
|
||||
|
||||
As of February 2023, after 123 FocusMate sessions, I have completed the
|
||||
(original) six challenge sets. I consider this project to be complete.
|
||||
|
||||
```
|
||||
[okay] Challenge 1: SSdtIGtpbGxpbmcgeW91ciBicmFpbiBsaWtlIGEgcG9pc29ub3VzIG11c2hyb29t
|
||||
[okay] Challenge 2: 746865206b696420646f6e277420706c6179
|
||||
[okay] Challenge 3: Cooking MC's like a pound of bacon
|
||||
[okay] Challenge 4: Now that the party is jumping
|
||||
[okay] Challenge 5: 0b3637272a2b2e63622c2e69692a23693a2a3c6324202d623d...
|
||||
[okay] Challenge 6: I'm back and I'm rin...
|
||||
[okay] Challenge 7: I'm back and I'm rin...
|
||||
[okay] Challenge 8: Cipher 132 [d880619740...] with rating 2398 (average = 2873.8186) is the solution.
|
||||
[okay] Challenge 9: "YELLOW SUBMARINE\u{4}\u{4}\u{4}\u{4}"
|
||||
[okay] Challenge 10: I'm back and I'm
|
||||
[okay] Challenge 11: [10 / 10]
|
||||
[okay] Challenge 12: Rollin' in my 5.0
|
||||
[okay] Challenge 13: role=admin
|
||||
[okay] Challenge 14: Rollin' in my 5.0
|
||||
[okay] Challenge 15: PKCS7 works
|
||||
[okay] Challenge 16: admin=true
|
||||
[okay] Challenge 17: 000003Cooking MC's like a pound of bacon
|
||||
[okay] Challenge 18: Yo, VIP Let's kick it Ice, Ice, baby Ice, Ice, baby
|
||||
[okay] Challenge 19: i have met them at close of day
|
||||
[okay] Challenge 20: I'm rated "R"...this is a warning, ya better void / P
|
||||
[okay] Challenge 21: implemented MT19937
|
||||
[okay] Challenge 22: cracked MT19937 seed
|
||||
[okay] Challenge 23: MT19937 RNG successfully cloned from output
|
||||
[okay] Challenge 24: MT19937 stream cipher implemented and cracked
|
||||
[okay] Challenge 25: recovered AES CTR plaintext via edit
|
||||
[okay] Challenge 26: admin=true
|
||||
[okay] Challenge 27: recovered key successfully
|
||||
[okay] Challenge 28: implemented SHA-1
|
||||
[okay] Challenge 29: extended SHA-1 keyed message successfully
|
||||
[okay] Challenge 30: implemented and extended MD4 successfully
|
||||
[okay] Challenge 31: recovered HMAC-SHA1 via timing attack
|
||||
[okay] Challenge 32: recovered HMAC-SHA1 with slightly less artificial timing leak
|
||||
[okay] Challenge 33: implemented Diffie-Hellman
|
||||
[okay] Challenge 34: implement MITM key-fixing attack on DH
|
||||
[okay] Challenge 35: implement MITM with malicious g attack on DH
|
||||
[okay] Challenge 36: implement secure remote password
|
||||
[okay] Challenge 37: break SRP with zero key
|
||||
[okay] Challenge 38: offline dictionary attack on SRP
|
||||
[okay] Challenge 39: implement RSA
|
||||
[okay] Challenge 40: implement an e=3 RSA Broadcast attack
|
||||
[okay] Challenge 41: implement unpadded message recovery oracle
|
||||
[okay] Challenge 42: Bleichenbacher's e=3 RSA Attack
|
||||
[okay] Challenge 43: DSA key recovery from nonce
|
||||
[okay] Challenge 44: DSA nonce recovery from repeated nonce
|
||||
[okay] Challenge 45: DSA parameter tampering
|
||||
[okay] Challenge 46: RSA parity oracle
|
||||
[okay] Challenge 47: Bleichenbacher's PKCS 1.5 Padding Oracle (Simple Case)
|
||||
[okay] Challenge 48: Bleichenbacher's PKCS 1.5 Padding Oracle (Complex Case)
|
||||
```
|
||||
|
||||
|
||||
Reference in New Issue
Block a user