Hack The Box Challenges (Crypto)
Personal writeups from Hack The Box challenges with nice explanations, techniques and scripts
<- HTB CHALLENGESCrypto - Total:
86

CTFECDSA. Partially-known nonces. LLL lattice reduction 
CTFJWT. ECDSA. Python random
state 
CTFJWT. ECDSA. Java psychic signatures 
CTFE2E encryption. Diffie-Hellman. AES 
CTFModular arithmetic. RSA signature. Malleability 
CTFSolution to a non-linear system of equations 
CTFMultiprime RSA. Find private key 
CTFMD5 hash collision with constraints 
CTFQuantum Cryptography. Frame-based Quantum Key Distribution 
CTFHash function. XOR. Oracle 
CTFHash length extension attack. Custom hash function 
CTFAES. Shamir Secret Sharing 
CTFInteger linear relations. LLL lattice reduction. ECDLP. CRT 
CTFBLS12-381. BLS signatures. Rogue key attack. Zero-knowledge proof. EC-LCG. LLL lattice reduction 
CTFLearning With Errors. Probabilistic oracle 
CTFClose primes. RSA and ECC. Finding curve parameters. Elliptic curve over composite modulus 
CTFECDSA. Nonces with known bits. Hidden Number Problem. LLL lattice reduction 
CTFMerkle Tree. Second preimage attack 
CTFQuadratic residues. Legendre Symbol 
CTFTEA. Equivalent keys. CBC mode 
CTFECC. Finding curve parameters. Modular arithmetic. ECDLP 
CTFRSA. Partially-known private information. Modular arithmetic 
CTFTEA. Reverse encryption function 
CTFRSA. Modular square root. Smooth primes. Discrete logarithm 
CTFDSA. Modular arithmetic. LLL lattice reduction 
CTFRSA. GCD. Coppersmith method. Euler’s Theorem 
CTFFractions. Diophantine equation solution with elliptic curve. RSA signature. LLL lattice reduction. Groebner basis 
CTFRSA-CRT. Modular arithmetic. Coppersmith method 
CTFMignotte Secret Sharing. Modular arithmetic. Chinese Remainder Theorem 
CTFAES CTR. Stream cipher. XOR 
CTFAES CBC. Bit Flipping Attack. XOR 
CTFRecurrence relation. Telescoping series. LCG 
CTFPRNG. Custom Mersenne Twister. System of equations with binary variables 
CTFAES cipher. Frequency analysis. Depth-first search 
CTFAES cipher. Frequency analysis 
CTFHexadecimal and Base64 encodings 
CTFPadding Oracle Attack. Custom cipher and padding 
CTFDES. Padding Oracle Attack 
CTFHomomorphic encryption. XOR cipher. AES cipher. Brute force 
CTFDSA. Nonce reuse. Modular arithmetic 
CTFRelated messages attack. Modular arithmetic 
CTFECC. Binary search. Finding curve parameters. Smart’s attack. PRNG 
CTFSchnorr signature. Hidden Number Problem. LLL lattice reduction 
CTFECC. Finding curve parameters. Coppersmith method on a bivariate polynomial 
CTFSchnorr signature. MD5 collision 
CTFMatrix operations. Chinese Remainder Theorem 
CTFAES cipher. XOR properties 
CTFRSA. Common modulus attack 
CTFBinary operations. Simplify and reverse encryption algorithm 
CTFElliptic Curve Cryptography. Invalid Curve Attack 
CTFRSA. Euler’s totient function. AES decryption 
CTFPCAP analysis. XOR cipher 
CTFRSA. Greatest Common Divisor 
CTFTruncated LCG. AES. Knapsack. LLL lattice reduction 
CTFDNA encoding. Substitution cipher. Frequency analysis 
CTFTraffic analysis. ElGamal. Modular arithmetic 
CTFKnapsack. Brute force. Modular arithmetic. Shuffling. LLL lattice reduction 
CTFCustom encryption using AES and XOR 
CTFRSA. Known bits. Coppersmith method. LLL lattice reduction 
CTFCustom hash function. Bit operations 
CTFAES cipher modes. Stream cipher. Known plaintext attack 
CTFRSA. Greatest Common Divisor 
CTFMiller-Rabin primality test 
CTFAES CTR. Inverse function of the Python built-in hash function 
CTFRSA. Forge signature. Regular Expression bypass 
CTFBrainfuck. RSA with CRT 
CTFShamir Secret Sharing. PRNG seed 
CTFRSA. Close primes. PRNG 
CTFFranklin-Reiter related-message attack 
CTFBlock cipher. Known plaintext attack. Induction. SHA256 
CTFGreatest Common Divisor. Modular arithmetic. PKCS7 padding 
CTFReverse encryption algorithm