Cryptography
0.0
(0)
Tier 1 Medium Skill Path Cryptography
This path covers a wide range of topics, from the fundamentals of cryptography to real-world attack techniques. You'll learn key concepts such as classical cryptography, modern block ciphers, hashing, and digital signatures through hands-on exercises. By using Python and SageMath, you'll implement mathematical principles in code and gain practical experience identifying vulnerabilities in cryptographic algorithms, allowing you to simultaneously master both the theory and practice of cryptography.
Cryptography
0.0
(0)
Tier 1 Medium Skill Path Cryptography
This path covers a wide range of topics, from the fundamentals of cryptography to real-world attack techniques. You'll learn key concepts such as classical cryptography, modern block ciphers, hashing, and digital signatures through hands-on exercises. By using Python and SageMath, you'll implement mathematical principles in code and gain practical experience identifying vulnerabilities in cryptographic algorithms, allowing you to simultaneously master both the theory and practice of cryptography.
Retail Price
650 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /29
29
Wargame 0 /15
15
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.

Why It's Worth Your Time

Cryptography is a fundamental technology for protecting information in all digital communications and authentication processes. Despite its importance, many find it difficult to approach due to the required mathematical background.
This path aims to make cryptography accessible by systematically covering basic concepts and offering hands-on exercises using Python and SageMath. You will explore the structure and vulnerabilities of major cryptographic systems like block ciphers, public key cryptography, hash functions, and digital signatures, while also learning key attack techniques.

Topics Covered

  • Basics of classical, symmetric, and public key cryptography
  • Core mathematical principles using number theory and linear algebra
  • AES and block cipher structure, CBC mode attacks (Padding Oracle)
  • Internal workings and vulnerabilities of RSA and Diffie-Hellman
  • Structure and attack methods for cryptographic hash functions and digital signatures
  • Cryptographic analysis and implementation using Python and SageMath

Recommended For

  • Those seeking a complete journey from cryptography basics to practical skills
  • Those interested in understanding security algorithms at a deeper level
  • Anyone wanting to experience cryptographic techniques and attack analysis
  • People excited to combine math and programming in cybersecurity learning

Prerequisite Knowledge

  • Basic programming skills, including Python
  • Basic understanding of number theory and linear algebra
  • Fundamental knowledge of encryption, decryption, and network security concepts
Unit Composition
Total 6 units
  1. 1
    9.9
    (14)
    Free
    9.9
    (14)
    Free
    Explore the use of pwntools for efficient exploit development.
    pwntools Basics
    Pwntools Basics
    Quiz: pwntools
    [Exercise] pwntools 1
    Exercise: Pwntools 1
    addition-quiz
    [Exercise] pwntools 2
    Exercise: Pwntools 2
    flag-shop
  2. 2
    Free
    0.0
    (0)
    Free
    Explore classical and modern cryptography principles, attacks, and Python applications.
    Classical Ciphers
    Classical Ciphers
    Modern Ciphers
    Tools for Modern Cryptography
    Modern Ciphers
    [Exercise] Meet-in-the-middle Attack
    Exploit Tech: Meet-in-the-middle Attack
    Double DES
  3. 3
    10.0
    (1)
    200
    Coin
    Free with subscription
    10.0
    (1)
    200
    Coin
    Free with subscription
    Explore number theory and cryptography concepts essential for secure systems.
    Number Theory
    Number Theory 1
    Number Theory 2
    Linear Algebra
    Linear Algebra 1
    Linear Algebra 2
    [Exercise] Linear Congruences
    Exploit Tech: Linear Congruences
    Squared Flag
  4. 4
    10.0
    (2)
    150
    Coin
    Free with subscription
    10.0
    (2)
    150
    Coin
    Free with subscription
    Explore AES encryption, its vulnerabilities, and practical attack methods.
    AES
    Block Cipher: AES
    [Exercise] AES without SubBytes
    Exploit Tech: AES without SubBytes
    No sub please!
    [Exercise] AES without ShiftRows
    Exploit Tech: AES without ShiftRows
    No shift please!
    Block Cipher Modes of Operation
    Block ciphers and modes of operation
    [Exercise] CBC Mode
    Exploit Tech: CBC Mode
    Textbook-CBC
    [Exercise] Padding Oracle Attack
    Exploit Tech: Padding Oracle Attack
    Padding Miracle Attack
  5. 5
    150
    Coin
    Free with subscription
    0.0
    (0)
    150
    Coin
    Free with subscription
    Explore RSA and Diffie-Hellman algorithms, their vulnerabilities, and cryptographic challenges.
    Public-key Cryptography
    Public-key Cryptosystem: RSA
    [Exercise] Common Modulus Attack
    Exploit Tech: Common Modulus Attack
    uncommon e
    Key Exchange Algorithms
    Key exchange: Diffie-Hellman Protocol
    [Exercise] Man-in-the-middle Attack
    Exploit Tech: Man-in-the-middle Attack
    Textbook-DH
    [Exercise] DLP with Smooth Primes
    Exploit Tech: DLP with Vulnerable Primes
    Hundre-d-log
  6. 6
    150
    Coin
    Free with subscription
    10.0
    (1)
    150
    Coin
    Free with subscription
    Explore cryptographic hash functions, their applications, and vulnerabilities in digital signatures.
    Hash Functions
    Hash Functions
    [Exercise] Birthday Paradox
    Exploit Tech: Birthday Paradox
    40 Birthdays
    [Exercise] Length Extension Attack
    Exploit Tech: Length Eextension Attack
    Textbook-HMAC
    Digital Signatures
    Digital Signatures
    [Exercise] Associated Nonces
    Exploit Tech: Associated Nonces
    Textbook-DSA
    [Exercise] Signatures without Hashing
    Exploit Tech: Signature without Hashing
    Textbook-DSA2
Reviews
0.0 (0)
Retail Price
650 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /29
29
Wargame 0 /15
15
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.