whale120

Two robots

Joined:

Rank: #637

Country: 

Website: https://wha13.github.io/

Level: 1
6490 0 0 0

0 points to level up

Trophy Case

gold-trophy gold-trophy silver-trophy gold-trophy gold-trophy silver-trophy silver-trophy silver-trophy bronze-trophy gold-trophy empty-trophy empty-trophy bronze-trophy

Solved Challenges

Lattices Bounded Noise 50
Lattices Noise Free 40
Lattices From Private to Public Key LWE 25
Lattices LWE Low Bits Message 20
Elliptic Curves Digestive 60
Elliptic Curves Elliptic Nodes 150
Elliptic Curves Moving Problems 150
Elliptic Curves ProSign 3 100
Elliptic Curves Curveball 100
Elliptic Curves Montgomery's Ladder 40
Hash Functions Merkle Trees 25
Mathematics Prime and Prejudice 200
Diffie-Hellman Additive 70
RSA Endless Emails 150
Hash Functions MDFlag 125
Mathematics Unencryptable 125
RSA Let's Decrypt 80
RSA Signing Server 60
RSA Fast Primes 75
Symmetric Ciphers Stream of Consciousness 80
Mathematics No Way Back Home 100
Misc Bruce Schneier's Password 100
Lattices LWE High Bits Message 15
Lattices LWE Intro 10
Elliptic Curves Micro Transmissions 120
Elliptic Curves Exceptional Curves 100
Diffie-Hellman Export-grade 100
RSA Everything is Still Big 100
Lattices LWE Background 5
Misc Lo-Hi Card Game 120
Mathematics Ellipse Curve Cryptography 125
Symmetric Ciphers CTRIME 70
Elliptic Curves Smooth Criminal 60
Symmetric Ciphers Bean Counter 60
Elliptic Curves Efficient Exchange 50
Elliptic Curves Curves and Logs 40
Elliptic Curves Scalar Multiplication 35
Elliptic Curves Point Addition 30
Elliptic Curves Point Negation 10
Symmetric Ciphers Symmetry 50
Elliptic Curves Background Reading 5
RSA Null or Never 100
General Encoding Challenge 40
General Transparency 50
General SSH Keys 35
General CERTainly not 30
Hash Functions PriMeD5 100
Lattices Backpack Cryptography 120
Lattices Find the Lattice 100
Lattices Gaussian Reduction 50
Lattices What's a Lattice? 40
Lattices Gram Schmidt 30
Crypto on the Web RSA or HMAC? Part 2 100
Misc No Leaks 100
Hash Functions MD0 80
RSA Marin's Secrets 50
RSA Infinite Descent 50
Mathematics Broken RSA 100
Mathematics Successive Powers 60
Misc Gotta Go Fast 40
Crypto on the Web JSON in JSON 40
Crypto on the Web RSA or HMAC? 35
Crypto on the Web JWT Sessions 10
Hash Functions Hash Stuffing 50
Hash Functions Collider 50
Hash Functions Jack's Birthday Confusion 30
Hash Functions Jack's Birthday Hash 20
Lattices Size and Basis 15
Lattices Vectors 10
Diffie-Hellman Static Client 100
Diffie-Hellman Parameter Injection 60
Diffie-Hellman Deriving Symmetric Keys 40
Diffie-Hellman Computing Shared Secrets 30
Diffie-Hellman Computing Public Values 25
Diffie-Hellman Generators of Groups 20
Diffie-Hellman Working with Fields 10
Symmetric Ciphers Lazy CBC 60
Symmetric Ciphers Triple DES 60
Symmetric Ciphers Passwords as Keys 50
Symmetric Ciphers Modes of Operation Starter 15
Symmetric Ciphers Bringing It All Together 50
Symmetric Ciphers Diffusion through Permutation 30
Symmetric Ciphers Confusion through Substitution 25
Symmetric Ciphers Round Keys 20
Symmetric Ciphers Structure of AES 15
RSA Crossed Wires 100
Symmetric Ciphers Flipping Cookie 60
RSA Everything is Big 70
RSA Modulus Inutilis 50
RSA Salty 20
RSA Manyprime 40
RSA Square Eyes 35
RSA Monoprime 30
RSA Inferius Prime 30
RSA Factoring 15
RSA RSA Signatures 25
Symmetric Ciphers ECB Oracle 60
RSA RSA Decryption 20
RSA Private Keys 20
RSA Euler's Totient 20
RSA Public Keys 15
RSA Modular Exponentiation 10
Symmetric Ciphers Resisting Bruteforce 10
Symmetric Ciphers ECB CBC WTF 55
Crypto on the Web JWT Secrets 25
Crypto on the Web No Way JOSE 20
Crypto on the Web Token Appreciation 5
Symmetric Ciphers Keyed Permutations 5
General Privacy-Enhanced Mail? 25
Mathematics Modular Binomials 80
Mathematics Adrien's Signs 80
Mathematics Chinese Remainder Theorem 40
Mathematics Modular Square Root 35
Mathematics Legendre Symbol 35
Mathematics Quadratic Residues 25
General Modular Inverting 25
General Modular Arithmetic 2 20
General Modular Arithmetic 1 20
General Extended GCD 20
General Greatest Common Divisor 15
General Lemur XOR 40
Introduction Network Attacks 5
General You either know, XOR you don't 30
General Favourite byte 20
General XOR Properties 15
General XOR Starter 10
General Bytes and Big Integers 10
General Base64 10
General Hex 5
General ASCII 5
Introduction Great Snakes 3
Introduction Finding Flags 2

Level Up

level up icon

You are now level Current level