Cryptography
10.0
(1)
Tier 1 Medium Skill Path Cryptography
Learn the key concepts in cryptography, from the fundamental theory to real-world attack techniques, by implementing cryptographic algorithms with Python and SageMath. This Path aims to cover both theoretical and practical aspects of cryptography.
Cryptography
10.0
(1)
Tier 1 Medium Skill Path Cryptography
Learn the key concepts in cryptography, from the fundamental theory to real-world attack techniques, by implementing cryptographic algorithms with Python and SageMath. This Path aims to cover both theoretical and practical aspects of cryptography.
0% Completed Total 0 completed
Lecture 0 /29
29
Wargame 0 /15
15
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.

Why It's Worth Your Time

Cryptography is a fundamental technology for protecting information in all digital communications and authentication processes. Despite its importance, many find it difficult to approach due to the required mathematical background.
This Path aims to make cryptography accessible by systematically covering basic concepts and offering hands-on exercises using Python and SageMath. You will explore the structure and vulnerabilities of major cryptographic systems like block ciphers, public key cryptography, hash functions, and digital signatures, while also learning key attack techniques.

Topics Covered

  • Basics of classical, symmetric, and public key cryptography
  • Core mathematical principles using number theory and linear algebra
  • AES and block cipher structure, CBC mode attacks (Padding Oracle)
  • Internal workings and vulnerabilities of RSA and Diffie-Hellman
  • Structure and attack methods for cryptographic hash functions and digital signatures
  • Cryptographic analysis and implementation using Python and SageMath

Recommended For

  • Those seeking a complete journey from cryptography basics to practical skills
  • Those interested in understanding security algorithms at a deeper level
  • Anyone wanting to experience cryptographic techniques and attack analysis
  • People excited to combine math and programming in cybersecurity learning

Prerequisite Knowledge

  • Basic programming skills, including Python
  • Basic understanding of number theory and linear algebra
  • Fundamental knowledge of encryption, decryption, and network security concepts
Unit Composition
Total 6 units
  1. 1
    9.9
    (121)
    9.9
    (121)
    Learn how to use pwntools, a versatile tool widely used across various security fields.
    pwntools Basics
    Pwntools Basics
    Quiz: pwntools
    [Exercise] pwntools 1
    Exercise: Pwntools 1
    addition-quiz
    [Exercise] pwntools 2
    Exercise: Pwntools 2
    flag-shop
  2. 2
    9.9
    (19)
    9.9
    (19)
    Explore classical and modern cryptography principles, attacks, and Python applications.
    Classical Ciphers
    Classical Ciphers
    Modern Ciphers
    Tools for Modern Cryptography
    Modern Ciphers
    [Exercise] Meet-in-the-middle Attack
    Exploit Tech: Meet-in-the-middle Attack
    Double DES
  3. 3
    10.0
    (12)
    200 Coin
    10.0
    (12)
    200 Coin
    Explore number theory and cryptography concepts essential for secure systems.
    Number Theory
    Number Theory 1
    Number Theory 2
    Linear Algebra
    Linear Algebra 1
    Linear Algebra 2
    [Exercise] Linear Congruences
    Exploit Tech: Linear Congruences
    Squared Flag
  4. 4
    10.0
    (7)
    150 Coin
    10.0
    (7)
    150 Coin
    Explore AES encryption, its vulnerabilities, and practical attack methods.
    AES
    Block Cipher: AES
    [Exercise] AES without SubBytes
    Exploit Tech: AES without SubBytes
    No sub please!
    [Exercise] AES without ShiftRows
    Exploit Tech: AES without ShiftRows
    No shift please!
    Block Cipher Modes of Operation
    Block ciphers and modes of operation
    [Exercise] CBC Mode
    Exploit Tech: CBC Mode
    Textbook-CBC
    [Exercise] Padding Oracle Attack
    Exploit Tech: Padding Oracle Attack
    Padding Miracle Attack
  5. 5
    150 Coin
    10.0
    (4)
    150 Coin
    Explore RSA and Diffie-Hellman algorithms, their vulnerabilities, and cryptographic challenges.
    Public-key Cryptography
    Public-key Cryptosystem: RSA
    [Exercise] Common Modulus Attack
    Exploit Tech: Common Modulus Attack
    uncommon e
    Key Exchange Algorithms
    Key exchange: Diffie-Hellman Protocol
    [Exercise] Man-in-the-middle Attack
    Exploit Tech: Man-in-the-middle Attack
    Textbook-DH
    [Exercise] DLP with Smooth Primes
    Exploit Tech: DLP with Vulnerable Primes
    Hundre-d-log
  6. 6
    150 Coin
    10.0
    (3)
    150 Coin
    Explore cryptographic hash functions, their applications, and vulnerabilities in digital signatures.
    Hash Functions
    Hash Functions
    [Exercise] Birthday Paradox
    Exploit Tech: Birthday Paradox
    40 Birthdays
    [Exercise] Length Extension Attack
    Exploit Tech: Length Eextension Attack
    Textbook-HMAC
    Digital Signatures
    Digital Signatures
    [Exercise] Associated Nonces
    Exploit Tech: Associated Nonces
    Textbook-DSA
    [Exercise] Signatures without Hashing
    Exploit Tech: Signature without Hashing
    Textbook-DSA2
Reviews
10.0 (1)

암호학을 입문하기 위한 기초 지식을 익히는데 매우 유용합니다. 이 Path를 수강하기 위해 따로 전공수준의 지식이 요구되지도 않으며 누구나 편하게 도전하기 좋은 Path라고 생각합니다.

0% Completed Total 0 completed
Lecture 0 /29
29
Wargame 0 /15
15
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.