Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
Cryptopals Set 8

Cryptopals is a set of cryptographic challenges, originally published here: https://cryptopals.com

Set 8 of the challenges was never published publicly, until late March 2018. However the cryptopals website was not updated to include the challenges. This gist compiles the 8th set of the Cryptopals challenges.

title link
57. Diffie-Hellman Revisited: Small Subgroup Confinement https://toadstyle.org/cryptopals/513b590b41d19eff3a0aa028023349fd.txt
58. Pollard's Method for Catching Kangaroos https://toadstyle.org/cryptopals/3e17c7b35fcf491d08c989081ed18c9a.txt
59. Elliptic Curve Diffie-Hellman and Invalid-Curve Attacks https://toadstyle.org/cryptopals/a0833e607878a80fdc0808f889c721b1.txt
60. Single-Coordinate Ladders and Insecure Twists https://toadstyle.org/cryptopals/c53b90a3e9e753ddad56edbbd33838aa.txt
61. Duplicate-Signature Key Selection in ECDSA (and RSA) https://toadstyle.org/cryptopals/809dccecda0e94ea588d66c12a1cf593.txt
62. Key-Recovery Attacks on ECDSA with Biased Nonces https://toadstyle.org/cryptopals/76f2e314809b2a34ce9ff0d2a08f7a7f.txt
63. Key-Recovery Attacks on GCM with Repeated Nonces https://toadstyle.org/cryptopals/2dfbf7e58fd43c140b62485f8d90bebe.txt
64. Key-Recovery Attacks on GCM with a Truncated MAC https://toadstyle.org/cryptopals/1d79ee513b73e1e0367eae2297e9f234.txt
65. Truncated-MAC GCM Revisited: Improving the Key-Recovery Attack via Ciphertext Length Extension https://toadstyle.org/cryptopals/a1a2e7311ec5f2535ec46eaebd4588f0.txt
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.