Skip to content

Instantly share code, notes, and snippets.

@ericmann
Forked from arkadiyt/cryptopals_set_8.md
Created July 17, 2018 22:29
Show Gist options
  • Save ericmann/e905182e8b03408b609489055b3a1729 to your computer and use it in GitHub Desktop.
Save ericmann/e905182e8b03408b609489055b3a1729 to your computer and use it in GitHub Desktop.
Cryptopals Set 8

Cryptopals is a set of cryptographic challenges, originally published here: https://cryptopals.com

Set 8 of the challenges was never published publicly, until late March 2018. However the cryptopals website was not updated to include the challenges. This gist compiles the 8th set of the Cryptopals challenges.

title link
57. Diffie-Hellman Revisited: Small Subgroup Confinement https://toadstyle.org/cryptopals/513b590b41d19eff3a0aa028023349fd.txt
58. Pollard's Method for Catching Kangaroos https://toadstyle.org/cryptopals/3e17c7b35fcf491d08c989081ed18c9a.txt
59. Elliptic Curve Diffie-Hellman and Invalid-Curve Attacks https://toadstyle.org/cryptopals/a0833e607878a80fdc0808f889c721b1.txt
60. Single-Coordinate Ladders and Insecure Twists https://toadstyle.org/cryptopals/c53b90a3e9e753ddad56edbbd33838aa.txt
61. Duplicate-Signature Key Selection in ECDSA (and RSA) https://toadstyle.org/cryptopals/809dccecda0e94ea588d66c12a1cf593.txt
62. Key-Recovery Attacks on ECDSA with Biased Nonces https://toadstyle.org/cryptopals/76f2e314809b2a34ce9ff0d2a08f7a7f.txt
63. Key-Recovery Attacks on GCM with Repeated Nonces https://toadstyle.org/cryptopals/2dfbf7e58fd43c140b62485f8d90bebe.txt
64. Key-Recovery Attacks on GCM with a Truncated MAC https://toadstyle.org/cryptopals/1d79ee513b73e1e0367eae2297e9f234.txt
65. Truncated-MAC GCM Revisited: Improving the Key-Recovery Attack via Ciphertext Length Extension https://toadstyle.org/cryptopals/a1a2e7311ec5f2535ec46eaebd4588f0.txt
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment