Summary of "WEBINAR NEVCRYP3 #“Crypto CTF Adventures: Can You Catch the Flag?” 2025"

Summary of “WEBINAR NEVCRYP3 #“Crypto CTF Adventures: Can You Catch the Flag?” 2025”


Overview of Capture The Flag (CTF) in Cybersecurity

Capture The Flag (CTF) competitions are competitive hacking games where participants find and exploit vulnerabilities (“flags”) in code or systems. These events help build community, sharpen skills, and simulate real-world cybersecurity scenarios.

There are several types of CTFs:

Fair play and technical skill are emphasized over disruptive tactics. CTFs serve multiple purposes including training, recruiting, and have even led to real-world vulnerability discoveries. Special themed CTFs, such as Hackasat, focus on niche areas like space cybersecurity challenges.


Webinar Structure and Organizers

The webinar was organized by the Network Evolution Research Group in collaboration with Telkom University, Indonesia. The event agenda included:

The format was casual and interactive, attracting global participation.


Key Presentation by Dr. Muhammad Nasar (University of New Haven, USA)

Dr. Nasar focused on two cryptographic CTF puzzles that illustrated applied cryptography concepts and practical vulnerabilities.


Puzzle 1: Symmetric Encryption with ChaCha20 Stream Cipher

ChaCha20 is a secure, lightweight 256-bit stream cipher widely used in encryption.

Puzzle details:

Demonstrations included:

Lesson: Proper nonce management is critical in stream ciphers to avoid catastrophic security failures.


Puzzle 2: Asymmetric Encryption with RSA (Textbook RSA)

This puzzle involved RSA encryption with the following characteristics:

Participants could query a server multiple times to get encryptions of the same message under different keys.

Key vulnerability:

Dr. Nasar explained:

Lesson: Proper padding schemes (e.g., OAEP) and secure parameter choices are essential for RSA security.


Additional Discussion Points


Product Features, Guides, and Tutorials Highlighted


Quiz and Community Engagement


Main Speakers and Sources

Audience participants contributed questions on cryptography, blockchain, and learning pathways.


This webinar provides a comprehensive, practical introduction to cryptographic Capture The Flag challenges, emphasizing applied cryptography, common pitfalls, and problem-solving strategies in cybersecurity competitions.

Category ?

Technology


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video