MysteryTwister C3
NUMBER OF ACTIVE MEMBERS:

10781
Follow us: Facebook Twitter
 



Level III Challenges (72)

Page 14 of the challenges in Level III, ordered by date posted (the most recent appear first).

Digital Signatures: DSA with Medium Fields

[lange-01] - 0 users already solved this challenge, 1 is working on it.
 
 
 

This challenge concerns the Discrete Logarithm Problem (DLP) in a "medium" field.
For powers of very small primes and for large prime fields the function-field sieve and the number-field sieve are highly optimized; for intermediate fields algorithms with the same asymptotic behavior exist but the actual running times are slower. Are you able to solve the DLP in such a field anyway?
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-09-02 12:23
Maximum number of attempts for this challenge: 20

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


Substitution Cipher with Non-Prefix Codes

[muralidhar-01] - 1 user already solved this challenge, 3 are working on it.
 
 
 

Usually prefix-free codes are used for encryption because it makes the decryption process easier at the receiver's end. However, this challenge deals with a substitution cipher with non-prefix codes. This should be broken by performing a "ciphertext-only attack".
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.

Authors: This email address is being protected from spambots. You need JavaScript enabled to view it.,This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-06-15 11:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#1) Achieved points (Global score) y-m-d - h:m:s

Peter Mustermann (Gummiboot) 13959 (60285) 2013-01-14 07:53:12
You must be logged in to solve the challenge


Recovering the Private Key in the Fully Homomorphic Encryption Scheme

[ramaekers-02] - 0 users already solved this challenge, 4 are working on it.
 
 
 

In the Fully Homomorphic Encryption scheme by Gentry and Halevi the private key is included in the public key. So, theoretically it is possible to recover the secret key.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2011-01-14 00:00
Maximum number of attempts for this challenge: 25

All successful users of this challenge

No one solved the challenge right now. Be the first!
You must be logged in to solve the challenge


CMEA 2

[stamp-11] - 27 users already solved this challenge, 1 is working on it.
 
 
 

CMEA is a block cipher and was one of the 4 cryptographic primitives of the mobile communications network in the US. It is your challenge to perform a known-plaintext attack on CMEA with 40 known plaintext blocks given.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-12-06 00:00
Maximum number of attempts for this challenge: 20

All successful users of this challenge

Rank User (#27) Achieved points (Global score) y-m-d - h:m:s

Armin Krauss (argh) 17412 (206664) 2010-12-14 17:00:33
Wolfgang Weisser (wowmyst) 15101 (33108) 2011-03-15 20:30:10
J. M. (jomandi) 14472 (113270) 2011-08-07 11:09:20
Flip (Flip) 14396 (31107) 2011-09-07 18:30:19
#5 Viktor (Veselovský) 14086 (169244) 2012-03-11 13:41:15
#6 Seth Kintigh (DarkFibre) 14050 (79471) 2012-04-11 00:54:45
#7 Luigi Tomelli (archstanton) 13882 (113164) 2012-10-02 16:30:24
#8 Kurt Gebauer (Yokozuna) 13846 (274906) 2012-11-17 15:01:27
#9 zahir mohsen moradi (ariobarzan) 13696 (99757) 2013-07-15 07:57:55
#10 Francisco Moraes (fmoraes) 13631 (90044) 2013-11-24 23:47:34
#11 Alain (Integral) 13617 (207924) 2013-12-26 12:16:10
#12 George (Theofanidis) 13616 (119711) 2013-12-27 21:39:19
#13 Em Doulgerakis (Greko) 13614 (137334) 2014-01-01 00:00:59
#14 Bart den Hartog (Bart13) 13551 (148936) 2014-06-04 12:37:55
#15 S Combes (jerva) 13451 (204567) 2015-04-02 14:39:05
#16 Julia Bernotat (El Greco ) 13370 (81129) 2016-02-01 16:13:43
#17 Nicolas (nicosPavlov) 13305 (257791) 2016-11-27 18:02:06
#18 Javantea (Javantea) 13304 (40816) 2016-11-30 10:01:22
#19 chris (c2) 13282 (51973) 2017-03-22 08:35:23
#20 Mir Dim (mir0soft) 13281 (79760) 2017-03-29 12:18:20
#21 George Lasry (george4096) 13265 (369910) 2017-06-22 21:57:33
#22 D3d4lu5 (D3d4lu5) 13195 (363282) 2018-08-21 12:05:50
#23 Random Dude (rnd) 13184 (98856) 2018-11-06 11:37:31
#24 Jacob (NohatCoder) 13155 (13455) 2019-06-04 09:14:52
#25 Mike (RogueRamblers) 13128 (63452) 2019-12-31 00:27:45
#26 Alain Collignon (vexilla72) 13127 (122384) 2020-01-04 15:44:08
#27 Eugene (lim0n) 13100 (169787) 2020-08-22 08:23:46
You must be logged in to solve the challenge


RSA with Special d

[kitrub-04] - 23 users already solved this challenge, 5 are working on it.
 
 
 

It is well known that RSA with a small private key is insecure. The company, Smart, Inc. has decided to try using special private keys that are large but have a small Hamming weight in order to speed up decryptions and signature generation. The question is whether these keys are safe. Try to reconstruct the private key d from the public parameters.

The codeword for this challenge is the private key d in decimal notation.
Read more...

Click here to get to the corresponding forum topic to share your opinion.
Click here to download the challenge.
Click here to download the additional file of the challenge.

Author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published on: 2010-10-14 13:30
Maximum number of attempts for this challenge: 50

All successful users of this challenge

Rank User (#23) Achieved points (Global score) y-m-d - h:m:s

Nobody (nobody) 17412 (42945) 2010-10-22 18:54:58
Christian (Etschupu) 16769 (31788) 2010-10-30 12:12:28
Ilya Ozerov (ilya) 16133 (20556) 2010-11-12 18:59:39
J. M. (jomandi) 14494 (113270) 2011-06-07 17:43:27
#5 Armin Krauss (argh) 14348 (206664) 2011-08-08 08:17:16
#6 Viktor (Veselovský) 14042 (169244) 2012-02-24 21:52:48
#7 Bart den Hartog (Bart13) 13897 (148936) 2012-07-23 09:45:13
#8 Luigi Tomelli (archstanton) 13887 (113164) 2012-08-04 16:30:55
#9 Almut (problelmo) 13681 (45992) 2013-06-22 05:03:48
#10 Kurt Gebauer (Yokozuna) 13661 (274906) 2013-08-01 11:14:10
#11 Em Doulgerakis (Greko) 13613 (137334) 2013-11-13 10:14:29
#12 Francisco Moraes (fmoraes) 13607 (90044) 2013-11-26 19:28:06
#13 Alain (Integral) 13577 (207924) 2014-02-06 16:33:08
#14 George (Theofanidis) 13568 (119711) 2014-02-27 17:15:46
#15 Sean (Kavanaugh) 13386 (29143) 2015-10-09 21:33:57
#16 zahir mohsen moradi (ariobarzan) 13331 (99757) 2016-05-31 18:56:14
#17 George Lasry (george4096) 13248 (369910) 2017-08-05 00:08:48
#18 Kasia (kasia-tutej) 13232 (53366) 2017-11-08 19:49:05
#19 Mir Dim (mir0soft) 13217 (79760) 2018-02-09 18:01:42
#20 Dominik M. (Sgt. Pepper) 13176 (127349) 2018-11-12 01:03:17
#21 Marco Cinelli (Snap) 13148 (34364) 2019-05-31 19:15:04
#22 Eugene (lim0n) 13115 (169787) 2020-02-22 11:24:51
#23 LurkNoi (Lurkrul) 13089 (19595) 2020-10-02 16:18:20
You must be logged in to solve the challenge
Pages [15] << < 123456789101112131415 > >> Show All  
 
 
powered by the CrypTool project  CrypTool

 

   +++    [12:30 - 22.01.2021] Muskrat solved the Level I challenge 'M-138 — Part 1'    +++    [22:55 - 21.01.2021] RYW solved the Level I challenge 'Number Sequence — Part 2'    +++    [22:51 - 21.01.2021] RYW solved the Level I challenge 'Original Caesar Cipher'    +++    [22:48 - 21.01.2021] Muhamad solved the Level I challenge 'Original Caesar Cipher'    +++    [22:11 - 21.01.2021] RYW solved the Level I challenge 'Number Sequence'    +++