This page archives the rules from the 2015 Crypto Village contest. They are not the current rules. Introduction The Underhanded Crypto contest was inspired by the famous Underhanded C Contest, which is a contest for producing C programs that look correct, yet are flawed in some subtle way that makes them behave inappropriately. This is a great model for demonstrating how hard code review is, and...
Crypto & Privacy Village Contest Winners!
The Crypto & Privacy Village mini-contest is over. Despite the tight deadline, we received five high-quality submissions in two categories. The categories were, in brief: Backdoor GnuPG. Patch GnuPG to leak the private key. Backdoored Password Authentication: Design (and optionally implement) some kind of password authentication where a secret value known to the attacker can be used in place...
Announcing the 2015 Crypto & Privacy Village Challenges
We are pleased to announce the details for the for the 2015 Crypto & Privacy Village Challenges! In cooperation with the DEF CON Crypto & Privacy Village, we are running two special challenges, with the winners to be announced on Saturday, August 8th. The challenges are are in two categories: backdooring existing software, and designing something from scratch. Each category will be judged...