Skip to content

Day 5: Review and Practical Challenges

Theory

Exploring Cryptographic Vulnerabilities

Objective: Identify and discuss vulnerabilities in stream ciphers, AES, and RSA.

Common vulnerabilities (e.g., padding oracle attacks, timing attacks).

Specific vulnerabilities in stream ciphers, AES, and RSA.

Case studies of historical attacks.

Practice

Hands-On Exercise

Finish all the challenges in pico classrom.

The internet is vast—explore and tackle new challenges to expand your skills and knowledge.