<- HTB CHALLENGES

Crypto - Total: 86

Mind In The Clouds
CTF

Mind In The Clouds

ECDSA. Partially-known nonces. LLL lattice reduction
secure source
CTF

secure source

JWT. ECDSA. Python random state
read before you sign
CTF

read before you sign

JWT. ECDSA. Java psychic signatures
hybrid unifier
CTF

hybrid unifier

E2E encryption. Diffie-Hellman. AES
Signing Factory
CTF

Signing Factory

Modular arithmetic. RSA signature. Malleability
sugar free candies
CTF

sugar free candies

Solution to a non-linear system of equations
sekur julius
CTF

sekur julius

Caesar cipher
binary basis
CTF

binary basis

Multiprime RSA. Find private key
brevi moduli
CTF

brevi moduli

RSA. Factorization
alphascii clashing
CTF

alphascii clashing

MD5 hash collision with constraints
Clutch
CTF

Clutch

Quantum Cryptography. Frame-based Quantum Key Distribution
Secure Signing
CTF

Secure Signing

Hash function. XOR. Oracle
Protein Cookies 2
CTF

Protein Cookies 2

Hash length extension attack. Custom hash function
Bloom Bloom
CTF

Bloom Bloom

AES. Shamir Secret Sharing
Not that random
CTF

Not that random

HMAC. Hash functions
Quadratic Points
CTF

Quadratic Points

Integer linear relations. LLL lattice reduction. ECDLP. CRT
Blessed
CTF

Blessed

BLS12-381. BLS signatures. Rogue key attack. Zero-knowledge proof. EC-LCG. LLL lattice reduction
Living with Elegance
CTF

Living with Elegance

Learning With Errors. Probabilistic oracle
Lost Modulus
CTF

Lost Modulus

RSA. Cube Root Attack
Composition
CTF

Composition

Close primes. RSA and ECC. Finding curve parameters. Elliptic curve over composite modulus
Waiting List
CTF

Waiting List

ECDSA. Nonces with known bits. Hidden Number Problem. LLL lattice reduction
I'm gRoot
CTF

I'm gRoot

Merkle Tree. Second preimage attack
Symbols
CTF

Symbols

Quadratic residues. Legendre Symbol
SPG
CTF

SPG

Boolean oracle
Tsayaki
CTF

Tsayaki

TEA. Equivalent keys. CBC mode
Arranged
CTF

Arranged

ECC. Finding curve parameters. Modular arithmetic. ECDLP
Partial Tenacity
CTF

Partial Tenacity

RSA. Partially-known private information. Modular arithmetic
Iced Tea
CTF

Iced Tea

TEA. Reverse encryption function
Rookie Mistake
CTF

Rookie Mistake

RSA. Modular square root. Smooth primes. Discrete logarithm
Vitrium Stash
CTF

Vitrium Stash

DSA. Modular arithmetic. LLL lattice reduction
Interception
CTF

Interception

RSA. GCD. Coppersmith method. Euler’s Theorem
RLotto
CTF

RLotto

PRNG. Time-based seed
Zombie Rolled
CTF

Zombie Rolled

Fractions. Diophantine equation solution with elliptic curve. RSA signature. LLL lattice reduction. Groebner basis
Mayday Mayday
CTF

Mayday Mayday

RSA-CRT. Modular arithmetic. Coppersmith method
MSS
CTF

MSS

Mignotte Secret Sharing. Modular arithmetic. Chinese Remainder Theorem
Initialization
CTF

Initialization

AES CTR. Stream cipher. XOR
Flippin Bank
CTF

Flippin Bank

AES CBC. Bit Flipping Attack. XOR
TurboCipher
CTF

TurboCipher

Recurrence relation. Telescoping series. LCG
Roulette
CTF

Roulette

PRNG. Custom Mersenne Twister. System of equations with binary variables
CryptoConundrum
CTF

CryptoConundrum

AES cipher. Frequency analysis. Depth-first search
BFD56
CTF

BFD56

CBC Bifid cipher
Perfect Synchronization
CTF

Perfect Synchronization

AES cipher. Frequency analysis
Ancient Encodings
CTF

Ancient Encodings

Hexadecimal and Base64 encodings
Fibopadcci
CTF

Fibopadcci

Padding Oracle Attack. Custom cipher and padding
I know Mag1k
CTF

I know Mag1k

DES. Padding Oracle Attack
Homomurphy's Law
CTF

Homomurphy's Law

Homomorphic encryption. XOR cipher. AES cipher. Brute force
signup
CTF

signup

DSA. Nonce reuse. Modular arithmetic
baby quick maffs
CTF

baby quick maffs

Related messages attack. Modular arithmetic
Oracle Leaks
CTF

Oracle Leaks

RSA. Manger’s attack
Converging Visions
CTF

Converging Visions

ECC. Binary search. Finding curve parameters. Smart’s attack. PRNG
Biased Heritage
CTF

Biased Heritage

Schnorr signature. Hidden Number Problem. LLL lattice reduction
Elliptic Labyrinth
CTF

Elliptic Labyrinth

ECC. Finding curve parameters. Coppersmith method on a bivariate polynomial
Colliding Heritage
CTF

Colliding Heritage

Schnorr signature. MD5 collision
Inside The Matrix
CTF

Inside The Matrix

Matrix operations. Chinese Remainder Theorem
Multipage Recyclings
CTF

Multipage Recyclings

AES cipher. XOR properties
TwoForOne
CTF

TwoForOne

RSA. Common modulus attack
LunaCrypt
CTF

LunaCrypt

Binary operations. Simplify and reverse encryption algorithm
400curves
CTF

400curves

Elliptic Curve Cryptography. Invalid Curve Attack
RsaCtfTool
CTF

RsaCtfTool

RSA. Euler’s totient function. AES decryption
Nuclear Sale
CTF

Nuclear Sale

PCAP analysis. XOR cipher
Optimus Prime
CTF

Optimus Prime

RSA. Greatest Common Divisor
AbraCryptabra
CTF

AbraCryptabra

Truncated LCG. AES. Knapsack. LLL lattice reduction
Ebola Virus
CTF

Ebola Virus

DNA encoding. Substitution cipher. Frequency analysis
ElElGamal
CTF

ElElGamal

Traffic analysis. ElGamal. Modular arithmetic
Infinite Knapsack
CTF

Infinite Knapsack

Knapsack. Brute force. Modular arithmetic. Shuffling. LLL lattice reduction
AESWCM
CTF

AESWCM

Custom encryption using AES and XOR
Bank-er-smith
CTF

Bank-er-smith

RSA. Known bits. Coppersmith method. LLL lattice reduction
AHS512
CTF

AHS512

Custom hash function. Bit operations
Whole Lotta Candy
CTF

Whole Lotta Candy

AES cipher modes. Stream cipher. Known plaintext attack
Spooky RSA
CTF

Spooky RSA

RSA. Greatest Common Divisor
Fast Carmichael
CTF

Fast Carmichael

Miller-Rabin primality test
Gonna-Lift-Em-All
CTF

Gonna-Lift-Em-All

Modular arithmetic
Find Marher's Secret
CTF

Find Marher's Secret

RC4. FMS attack
Hash the Filesystem
CTF

Hash the Filesystem

AES CTR. Inverse function of the Python built-in hash function
BBGun06
CTF

BBGun06

RSA. Forge signature. Regular Expression bypass
Brainy's Cipher
CTF

Brainy's Cipher

Brainfuck. RSA with CRT
The Three-Eyed Oracle
CTF

The Three-Eyed Oracle

AES ECB oracle
Space Pirates
CTF

Space Pirates

Shamir Secret Sharing. PRNG seed
Infinite Descent
CTF

Infinite Descent

RSA. Close primes. PRNG
One Step Closer
CTF

One Step Closer

Franklin-Reiter related-message attack
Classic, yet complicated!
CTF

Classic, yet complicated!

Vigenère cipher
Jenny From The Block
CTF

Jenny From The Block

Block cipher. Known plaintext attack. Induction. SHA256
Android-in-the-middle
CTF

Android-in-the-middle

Diffie-Hellman. MITM
Weak RSA
CTF

Weak RSA

RSA. Wiener’s attack
Down the Rabinhole
CTF

Down the Rabinhole

Greatest Common Divisor. Modular arithmetic. PKCS7 padding
How The Columns Have Turned
CTF

How The Columns Have Turned

Reverse encryption algorithm