Level: 1
14400
0
131
-3
0 points to level up
| SIDH Key Exchange | 0 | ||
| Abelian SIDH | 0 | ||
| U-turn (Breizh CTF) | 0 | ||
| Better than Linear | 0 | ||
| What's My Kernel | 0 | ||
| LFSR Destroyer | -1 | ||
| Jeff's LFSR | 0 | ||
| Authenticated Handshake | 0 | ||
| Verilicious (Cyber Apocalypse 2025) | 0 | ||
| Pairing-Based Cryptography | 0 | ||
| DLOG on the Surface | 0 | ||
| L-Win | 0 | ||
| Trust Games | 0 | ||
| Twisted CSIDH Isogenies | 1 | ||
| Secret Exponents | 0 | ||
| Prime Power Isogenies | 0 | ||
| Special Isogenies | 0 | ||
| Composite Isogenies | 1 | ||
| Toshi's Treasure | 0 | ||
| Nothing Up My Sleeve | 0 | ||
| WOTS Up 2 | -1 | ||
| WOTS Up | 1 | ||
| Merkle Trees | 0 | ||
| Saying Hello | 0 | ||
| Twin Keys | -1 | ||
| Double and Broken | 0 | ||
| Beatboxer | 0 | ||
| Oh SNAP | 0 | ||
| Prime and Prejudice | 0 | ||
| Three Isogenies | 0 | ||
| Two Isogenies | 1 | ||
| Montgomery Curves | 1 | ||
| Image Point Arithmetic | 0 | ||
| Where's the Supersingular Curve | 0 | ||
| The j-invariant | 0 | ||
| Gaussian Reduction | 0 | ||
| What's a Lattice? | 0 | ||
| Gram Schmidt | 0 | ||
| MD0 | 0 | ||
| Collider | 0 | ||
| Bit by Bit | 0 | ||
| Armory | 0 | ||
| Ellipse Curve Cryptography | 0 | ||
| Real Eisenstein | 1 | ||
| Cofactor Cofantasy | 0 | ||
| Unencryptable | 0 | ||
| Roll your Own | 0 | ||
| No Way Back Home | 0 | ||
| Let's Decrypt Again | 0 | ||
| Digestive | 0 | ||
| Exceptional Curves | 0 | ||
| Elliptic Nodes | 0 | ||
| Vote for Pedro | 0 | ||
| Blinding Light | 0 | ||
| Let's Decrypt | 0 | ||
| Null or Never | 0 | ||
| Bespoke Padding | 0 | ||
| RSA Backdoor Viability | -4 | ||
| Static Client 2 | 0 | ||
| Additive | 0 | ||
| Static Client | 0 | ||
| Export-grade | 0 | ||
| Deriving Symmetric Keys | 0 | ||
| Parameter Injection | 0 | ||
| Dancing Queen | 0 | ||
| Ron was Wrong, Whit is Right | 0 | ||
| Endless Emails | 0 | ||
| Everything is Big | 0 | ||
| Everything is Still Big | -1 | ||
| Modulus Inutilis | 0 | ||
| Salty | 0 | ||
| Bean Counter | 0 | ||
| Symmetry | 0 | ||
| Modular Binomials | 0 | ||
| Adrien's Signs | 0 | ||
| Signing Server | 0 | ||
| Fast Primes | -2 | ||
| Marin's Secrets | 0 | ||
| Infinite Descent | -1 | ||
| Crossed Wires | 0 | ||
| Broken RSA | 0 | ||
| Successive Powers | 0 | ||
| Triple DES | 0 | ||
| Lazy CBC | 0 | ||
| Flipping Cookie | 0 | ||
| ECB Oracle | 0 | ||
| ECB CBC WTF | 0 | ||
| Passwords as Keys | 0 | ||
| Modes of Operation Starter | 0 | ||
| JWT Secrets | 0 | ||
| No Way JOSE | 0 | ||
| Efficient Exchange | 0 | ||
| Curves and Logs | 0 | ||
| Scalar Multiplication | 0 | ||
| Point Addition | 0 | ||
| Manyprime | 0 | ||
| Square Eyes | 0 | ||
| Monoprime | 0 | ||
| Inferius Prime | 0 | ||
| Factoring | -1 | ||
| RSA Signatures | 0 | ||
| RSA Decryption | 0 | ||
| Private Keys | 0 | ||
| Euler's Totient | 0 | ||
| Public Keys | 0 | ||
| Bringing It All Together | 0 | ||
| Chinese Remainder Theorem | 0 | ||
| Modular Square Root | 0 | ||
| Legendre Symbol | 0 | ||
| Computing Shared Secrets | 0 | ||
| Computing Public Values | 0 | ||
| Generators of Groups | 0 | ||
| Quadratic Residues | 0 | ||
| Diffusion through Permutation | 0 | ||
| Confusion through Substitution | 2 | ||
| Round Keys | 0 | ||
| Structure of AES | 0 | ||
| SSH Keys | 0 | ||
| Jack's Birthday Hash | 1 | ||
| Lemur XOR | 0 | ||
| CERTainly not | 0 | ||
| Privacy-Enhanced Mail? | 0 | ||
| Modular Inverting | 0 | ||
| Modular Arithmetic 2 | 0 | ||
| Modular Arithmetic 1 | 0 | ||
| Extended GCD | 0 | ||
| Greatest Common Divisor | 0 | ||
| Encoding Challenge | 0 | ||
| You either know, XOR you don't | 0 | ||
| Favourite byte | 0 | ||
| XOR Properties | 0 |
| Isogenies | SIDH Key Exchange | 80 | |
| Isogenies | Abelian SIDH | 90 | |
| CTF Archive | U-turn (Breizh CTF) | 0 | |
| Isogenies | Better than Linear | 85 | |
| Isogenies | What's My Kernel | 70 | |
| ZKPs | Let's Prove It | 120 | |
| ZKPs | Let's Prove It Again | 175 | |
| ZKPs | Mister Saplins The Prover | 125 | |
| ZKPs | Couples | 100 | |
| Misc | LFSR Destroyer | 250 | |
| Misc | Jeff's LFSR | 150 | |
| Crypto on the Web | Authenticated Handshake | 40 | |
| CTF Archive | Verilicious (Cyber Apocalypse 2025) | 0 | |
| ZKPs | Pairing-Based Cryptography | 50 | |
| Isogenies | DLOG on the Surface | 40 | |
| Misc | L-Win | 120 | |
| Misc | Bruce Schneier's Password | 100 | |
| Misc | Trust Games | 150 | |
| Isogenies | Twisted CSIDH Isogenies | 70 | |
| Isogenies | Secret Exponents | 60 | |
| Isogenies | Prime Power Isogenies | 50 | |
| Isogenies | Special Isogenies | 30 | |
| ZKPs | Fischlin Transform | 180 | |
| ZKPs | Hamiltonicity 1 | 100 | |
| ZKPs | Hamiltonicity 2 | 175 | |
| ZKPs | OR Proof | 75 | |
| Isogenies | Composite Isogenies | 60 | |
| Symmetric Ciphers | The Good, The Pad, The Ugly | 100 | |
| Misc | RSA vs RNG | 150 | |
| Misc | Toshi's Treasure | 150 | |
| Misc | Nothing Up My Sleeve | 150 | |
| Misc | Lo-Hi Card Game | 120 | |
| Hash Functions | WOTS Up 2 | 90 | |
| Hash Functions | WOTS Up | 75 | |
| Hash Functions | Merkle Trees | 25 | |
| Crypto on the Web | Decrypting TLS 1.3 | 35 | |
| Crypto on the Web | Decrypting TLS 1.2 | 30 | |
| Crypto on the Web | Saying Hello | 20 | |
| Lattices | From Private to Public Key LWE | 25 | |
| Lattices | Backpack Cryptography | 120 | |
| ZKPs | Too Honest | 50 | |
| ZKPs | Non-Interactive | 35 | |
| ZKPs | Honest Verifier Zero Knowledge | 30 | |
| ZKPs | Special Soundness | 25 | |
| ZKPs | Proofs of Knowledge | 20 | |
| Lattices | Bounded Noise | 50 | |
| Lattices | Missing Modulus | 80 | |
| Lattices | Noise Cheap | 90 | |
| Lattices | Too Many Errors | 100 | |
| Lattices | Nativity | 60 | |
| Lattices | LWE High Bits Message | 15 | |
| Lattices | LWE Low Bits Message | 20 | |
| Lattices | Noise Free | 40 | |
| Crypto on the Web | TLS Handshake | 15 | |
| Crypto on the Web | Sharks on the Wire | 10 | |
| Crypto on the Web | Secure Protocols | 5 | |
| Lattices | Find the Lattice | 100 | |
| Misc | No Leaks | 100 | |
| Crypto on the Web | Megalomaniac 1 | 100 | |
| Crypto on the Web | RSA or HMAC? Part 2 | 100 | |
| Hash Functions | Mixed Up | 120 | |
| Crypto on the Web | RSA or HMAC? | 35 | |
| Elliptic Curves | Montgomery's Ladder | 40 | |
| Diffie-Hellman | The Matrix Revolutions | 125 | |
| Diffie-Hellman | The Matrix Reloaded | 100 | |
| Hash Functions | Invariant | 250 | |
| Hash Functions | MDFlag | 125 | |
| Hash Functions | No Difference | 175 | |
| Hash Functions | Twin Keys | 100 | |
| Hash Functions | PriMeD5 | 100 | |
| Hash Functions | Hash Stuffing | 50 | |
| Elliptic Curves | Edwards Goes Degenerate | 100 | |
| Elliptic Curves | Real Curve Crypto | 200 | |
| Elliptic Curves | No Random, No Bias | 120 | |
| Elliptic Curves | Double and Broken | 50 | |
| Elliptic Curves | ProSign 3 | 100 | |
| Elliptic Curves | Moving Problems | 150 | |
| Elliptic Curves | Micro Transmissions | 120 | |
| Diffie-Hellman | The Matrix | 75 | |
| Symmetric Ciphers | Beatboxer | 150 | |
| Symmetric Ciphers | Oh SNAP | 120 | |
| Mathematics | Prime and Prejudice | 200 | |
| Symmetric Ciphers | Forbidden Fruit | 150 | |
| Isogenies | Three Isogenies | 35 | |
| Isogenies | Two Isogenies | 30 | |
| Isogenies | Montgomery Curves | 30 | |
| Isogenies | Image Point Arithmetic | 30 | |
| Isogenies | Where's the Supersingular Curve | 25 | |
| Isogenies | The j-invariant | 20 | |
| Lattices | LWE Intro | 10 | |
| Lattices | LWE Background | 5 | |
| Lattices | Gaussian Reduction | 50 | |
| Lattices | What's a Lattice? | 40 | |
| Lattices | Gram Schmidt | 30 | |
| Lattices | Size and Basis | 15 | |
| Lattices | Vectors | 10 | |
| CTF Archive | Twist and shout (ECSC 2023 (Norway)) | 0 | |
| Hash Functions | MD0 | 80 | |
| Crypto on the Web | JSON in JSON | 40 | |
| Hash Functions | Collider | 50 | |
| Misc | Gotta Go Fast | 40 | |
| Misc | Bit by Bit | 100 | |
| Misc | Armory | 100 | |
| Diffie-Hellman | Script Kiddie | 70 | |
| Symmetric Ciphers | Pad Thai | 80 | |
| Mathematics | Ellipse Curve Cryptography | 125 | |
| Mathematics | Real Eisenstein | 150 | |
| Mathematics | Cofactor Cofantasy | 150 | |
| Mathematics | Unencryptable | 125 | |
| Mathematics | Roll your Own | 125 | |
| Mathematics | No Way Back Home | 100 | |
| RSA | Let's Decrypt Again | 175 | |
| Elliptic Curves | Curveball | 100 | |
| Elliptic Curves | Digestive | 60 | |
| Elliptic Curves | Elliptic Nodes | 150 | |
| Elliptic Curves | Smooth Criminal | 60 | |
| Elliptic Curves | Exceptional Curves | 100 | |
| Symmetric Ciphers | Paper Plane | 120 | |
| RSA | Vote for Pedro | 150 | |
| RSA | Blinding Light | 120 | |
| RSA | Let's Decrypt | 80 | |
| RSA | Null or Never | 100 | |
| RSA | Bespoke Padding | 100 | |
| RSA | RSA Backdoor Viability | 175 | |
| Diffie-Hellman | Static Client 2 | 120 | |
| Diffie-Hellman | Additive | 70 | |
| Diffie-Hellman | Static Client | 100 | |
| Diffie-Hellman | Export-grade | 100 | |
| Diffie-Hellman | Deriving Symmetric Keys | 40 | |
| Diffie-Hellman | Parameter Injection | 60 | |
| Symmetric Ciphers | Dancing Queen | 120 | |
| ZKPs | ZKP Introduction | 5 | |
| RSA | Ron was Wrong, Whit is Right | 90 | |
| RSA | Endless Emails | 150 | |
| RSA | Everything is Big | 70 | |
| RSA | Everything is Still Big | 100 | |
| RSA | Modulus Inutilis | 50 | |
| RSA | Salty | 20 | |
| Symmetric Ciphers | Logon Zero | 80 | |
| Symmetric Ciphers | Stream of Consciousness | 80 | |
| Symmetric Ciphers | CTRIME | 70 | |
| Symmetric Ciphers | Bean Counter | 60 | |
| Symmetric Ciphers | Symmetry | 50 | |
| Mathematics | Modular Binomials | 80 | |
| Mathematics | Adrien's Signs | 80 | |
| RSA | Signing Server | 60 | |
| RSA | Fast Primes | 75 | |
| RSA | Marin's Secrets | 50 | |
| RSA | Infinite Descent | 50 | |
| RSA | Crossed Wires | 100 | |
| Mathematics | Broken RSA | 100 | |
| Mathematics | Successive Powers | 60 | |
| Symmetric Ciphers | Triple DES | 60 | |
| Symmetric Ciphers | Lazy CBC | 60 | |
| Symmetric Ciphers | Flipping Cookie | 60 | |
| Symmetric Ciphers | ECB Oracle | 60 | |
| Symmetric Ciphers | ECB CBC WTF | 55 | |
| Symmetric Ciphers | Passwords as Keys | 50 | |
| Symmetric Ciphers | Modes of Operation Starter | 15 | |
| Crypto on the Web | JWT Secrets | 25 | |
| Crypto on the Web | No Way JOSE | 20 | |
| Elliptic Curves | Efficient Exchange | 50 | |
| Elliptic Curves | Curves and Logs | 40 | |
| Elliptic Curves | Scalar Multiplication | 35 | |
| Elliptic Curves | Point Addition | 30 | |
| Elliptic Curves | Point Negation | 10 | |
| Elliptic Curves | Background Reading | 5 | |
| RSA | Manyprime | 40 | |
| RSA | Square Eyes | 35 | |
| RSA | Monoprime | 30 | |
| RSA | Inferius Prime | 30 | |
| RSA | Factoring | 15 | |
| Crypto on the Web | JWT Sessions | 10 | |
| Crypto on the Web | Token Appreciation | 5 | |
| RSA | RSA Signatures | 25 | |
| RSA | RSA Decryption | 20 | |
| RSA | Private Keys | 20 | |
| RSA | Euler's Totient | 20 | |
| RSA | Public Keys | 15 | |
| Symmetric Ciphers | Bringing It All Together | 50 | |
| Mathematics | Chinese Remainder Theorem | 40 | |
| Mathematics | Modular Square Root | 35 | |
| Mathematics | Legendre Symbol | 35 | |
| Isogenies | Introduction to Isogenies | 10 | |
| Diffie-Hellman | Computing Shared Secrets | 30 | |
| Diffie-Hellman | Computing Public Values | 25 | |
| Diffie-Hellman | Generators of Groups | 20 | |
| Diffie-Hellman | Working with Fields | 10 | |
| RSA | Modular Exponentiation | 10 | |
| Mathematics | Quadratic Residues | 25 | |
| Symmetric Ciphers | Diffusion through Permutation | 30 | |
| Symmetric Ciphers | Confusion through Substitution | 25 | |
| Symmetric Ciphers | Round Keys | 20 | |
| Symmetric Ciphers | Structure of AES | 15 | |
| Symmetric Ciphers | Resisting Bruteforce | 10 | |
| Symmetric Ciphers | Keyed Permutations | 5 | |
| General | Transparency | 50 | |
| General | SSH Keys | 35 | |
| Hash Functions | Jack's Birthday Hash | 20 | |
| General | Lemur XOR | 40 | |
| General | CERTainly not | 30 | |
| General | Privacy-Enhanced Mail? | 25 | |
| General | Modular Inverting | 25 | |
| General | Modular Arithmetic 2 | 20 | |
| General | Modular Arithmetic 1 | 20 | |
| General | Extended GCD | 20 | |
| General | Greatest Common Divisor | 15 | |
| General | You either know, XOR you don't | 30 | |
| General | Encoding Challenge | 40 | |
| General | Favourite byte | 20 | |
| Hash Functions | Jack's Birthday Confusion | 30 | |
| General | XOR Properties | 15 | |
| General | XOR Starter | 10 | |
| General | Bytes and Big Integers | 10 | |
| General | Base64 | 10 | |
| General | Hex | 5 | |
| General | ASCII | 5 | |
| Introduction | Network Attacks | 5 | |
| Introduction | Great Snakes | 3 | |
| Introduction | Finding Flags | 2 |
You are now level Current level