CTFZone Paper: Little Knowledge

Intro

Why a cryptographic task was necessary

How we chose our development stack

How we decided on the task idea

Disclaimer. I am not a mathematician, nor am I a cryptographer. The following statements may sometimes be not mathematically correct or may leave out certain details. My goal here is to show the concepts without putting too much strain on the reader.

How we developed the task

Further, team server = Verifier, checker = Prover, a team attacking another team’s server = malicious Prover.

The final vulnerability

Development quirks

Testing

Anti-cheat

Conclusion

--

--

International community conference for cybersecurity researchers and professionals. No suits, no business — only hardcore research.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
OFFZONE

OFFZONE

International community conference for cybersecurity researchers and professionals. No suits, no business — only hardcore research.