pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to intro-to-cybersecurity

Cryptography

intro-to-cybersecurity
0/35 challenges completed

Solve various cryptography challenges, starting from the fundamentals and diving toward advanced concepts! This module assumes that you know how to deal with data encodings.

Cryptography: Introduction
Video
Slides

Symmetric Cryptography

Cryptography: Symmetric Encryption
Video
Slides
1
XOR
2
XORing Hex
3
XORing ASCII
4
XORing ASCII Strings
5
One-time Pad
6
One-time Pad Tampering
7
Many-time Pad
8
AES
Useful Resource
9
AES-ECB-CPA
10
AES-ECB-CPA-HTTP
11
AES-ECB-CPA-HTTP (base64)
12
AES-ECB-CPA-Suffix
13
AES-ECB-CPA-Prefix
14
AES-ECB-CPA-Prefix-2
15
AES-ECB-CPA-Prefix-Miniboss
16
AES-ECB-CPA-Prefix-Boss
17
AES-CBC
18
AES-CBC Tampering
19
AES-CBC Resizing
Useful Resources
20
AES-CBC-POA-Partial-Block
21
AES-CBC-POA-Full-Block
22
AES-CBC-POA-Multi-Block
23
AES-CBC-POA-Encrypt
24
AES-CBC-POA-Encrypt-2

Asymmetric Cryptography

Cryptography: Key Exchange
Video
Slides
Cryptography: Asymmetric Encryption
Video
Slides
25
DHKE
26
DHKE-to-AES
27
RSA 1
28
RSA 2
29
RSA 3
30
RSA 4
31
RSA Signatures

Cryptographic Hashes

Cryptography: Hashing
Video
Slides
32
SHA 1
33
SHA 2

Trust

Cryptography: Trust
Video
Slides
34
TLS 1
35
TLS 2