Symmetric Ciphers | Diffusion through Permutation | 30 | |
Symmetric Ciphers | Confusion through Substitution | 25 | |
Symmetric Ciphers | Round Keys | 20 | |
General | Extended GCD | 20 | |
General | You either know, XOR you don't | 30 | |
General | Favourite byte | 20 | |
General | XOR Properties | 15 | |
RSA | Public Keys | 15 | |
RSA | Euler's Totient | 20 | |
RSA | Factoring | 15 | |
RSA | RSA Signatures | 25 | |
RSA | RSA Decryption | 20 | |
RSA | Private Keys | 20 | |
RSA | Modular Exponentiation | 10 | |
Symmetric Ciphers | Structure of AES | 15 | |
General | XOR Starter | 10 | |
Mathematics | Legendre Symbol | 35 | |
Mathematics | Quadratic Residues | 25 | |
Symmetric Ciphers | Resisting Bruteforce | 10 | |
Symmetric Ciphers | Keyed Permutations | 5 | |
General | Modular Inverting | 25 | |
General | Modular Arithmetic 2 | 20 | |
General | Modular Arithmetic 1 | 20 | |
General | Greatest Common Divisor | 15 | |
General | Bytes and Big Integers | 10 | |
General | Base64 | 10 | |
General | Hex | 5 | |
General | ASCII | 5 | |
Introduction | Network Attacks | 5 | |
Introduction | Great Snakes | 3 | |
Introduction | Finding Flags | 2 |
You are now level Current level