pwncollege
DojosLeaderboardCommunity
Back to cryptomania

Integrity and Authentication

cryptomania
0/9 challenges completed

This module covers cryptographic hash functions and message authentication codes. You will compute SHA-3 family digests, study preimage and collision resistance, and exploit practical weaknesses such as length extension, CBC-MAC misuse, and weak HMAC secrets.

Challenges

1
SHA3-256
2
SHAKE256
3
Preimage Resistance
4
Collision Resistance
5
Length Extension
6
CBC-MAC
7
CBC-MAC with Random IV
8
CBC-MAC Length Extension
9
Weak HMAC Keys