Git hosting

cryptopals: Solutions to the cryptopals crypto challenges in Ruby

Files

Size Path
..
1685 33.md
614 33.rb
1440 34.md
2137 34.rb
714 35.md
3180 35.rb
1691 36.md
3507 36.rb
683 37.md
2615 37.rb
801 38.md
3859 38.rb
1429 39.md
373 39.rb
1268 40.md
979 40.rb
1347 README.md

README.md

Crypto Challenge Set 5

This is the first set of number-theoretic cryptography challenges, and also our coverage of message authentication.

This set is significantly harder than the last set. The concepts are new, the attacks bear no resemblance to those of the previous sets, and... math.

On the other hand, our favorite cryptanalytic attack ever is in this set (you'll see it soon). We're happy with this set. Don't wimp out here. You're almost done!

  1. Implement Diffie-Hellman
  2. Implement a MITM key-fixing attack on Diffie-Hellman with parameter injection
  3. Implement DH with negotiated groups, and break with malicious "g" parameters
  4. Implement Secure Remote Password (SRP)
  5. Break SRP with a zero key
  6. Offline dictionary attack on simplified SRP
  7. Implement RSA
  8. Implement an E=3 RSA Broadcast attack