The excellent kanak (creator of pwn.college) has recorded lectures and slides from prior CSE 365 that might be useful:
Cryptography: Introduction
Cryptography: Symmetric Encryption
Cryptography: Key Exchange
Cryptography: Asymmetric Encryption
Cryptography: Hashing
Cryptography: Trust
Decode base64-encoded data
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt a secret encrypted with a one-time pad, assuming a securely transferred key
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt a secret encrypted with a one-time pad, where the key is reused for arbitrary data
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt a secret encrypted with AES using the ECB mode of operation
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt a secret encrypted with AES-ECB, where arbitrary data is appended to the secret and the key is reused. This level is quite a step up in difficulty (and future levels currently do not build on this level), so if you are completely stuck feel free to move ahead. Check out this lecture video on how to approach level 5.
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Perform a Diffie-Hellman key exchange to establish a shared secret
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt an RSA-encrypted secret using provided public and private keys
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Decrypt an RSA-encrypted secret using the provided prime factors of n
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Find a small hash collision using SHA256, considering only the first 2 bytes
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Compute a small proof-of-work by appending response data to the challenge data, resulting in a SHA256 hash with 2 null-bytes
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Complete an RSA challenge-response using provided public and private keys
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Complete an RSA challenge-response by providing the public key
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Sign a user certificate using a provided self-signed root certificate and root private key
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
Perform a simplified TLS handshake as the server, completing a Diffie-Hellman key exchange and establishing an encrypted channel to provide a user certificate and prove private key ownership
Connect with SSH
Link your SSH key, then connect with: ssh hacker@pwn.college
30-Day Scoreboard:
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.