Developing safe protocol for distributed task-based CTF holding system
Prikladnaâ diskretnaâ matematika, no. 2 (2015), pp. 59-70.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper is devoted to mathematical method of holding task-based CTF contests under threat of DDoS attack against organizers' servers. For the purpose, a decentralized protocol is proposed where a part of organizer role is distributed among participants. There are some important security requirements to the protocol due to the competitive nature of CTF contests. The result protocol meets these requirements. Its stability against considered attacks is researched. Directions of further research are described.
Keywords: distributed protocol, secure computation, fault-tolerant system.
@article{PDM_2015_2_a6,
     author = {N. I. Anisenya},
     title = {Developing safe protocol for distributed task-based {CTF} holding system},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {59--70},
     publisher = {mathdoc},
     number = {2},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/}
}
TY  - JOUR
AU  - N. I. Anisenya
TI  - Developing safe protocol for distributed task-based CTF holding system
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2015
SP  - 59
EP  - 70
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/
LA  - ru
ID  - PDM_2015_2_a6
ER  - 
%0 Journal Article
%A N. I. Anisenya
%T Developing safe protocol for distributed task-based CTF holding system
%J Prikladnaâ diskretnaâ matematika
%D 2015
%P 59-70
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/
%G ru
%F PDM_2015_2_a6
N. I. Anisenya. Developing safe protocol for distributed task-based CTF holding system. Prikladnaâ diskretnaâ matematika, no. 2 (2015), pp. 59-70. http://geodesic.mathdoc.fr/item/PDM_2015_2_a6/

[1] Kolegov D. N., Chernushenko Yu. N., “About the CTF – computer security competitions”, Prikladnaya Diskretnaya Matematika, 2008, no. 2, 81–83 (in Russian)

[2] CTFtime.org – All about CTF (Capture The Flag), , 2014 https://ctftime.org/ctf-wtf/

[3] DEF CON Hacking Conference, , 2014 https://www.defcon.org/

[4] PHDays – Positive Hack Days, , 2014 http://www.phdays.ru/

[5] RuCTF, , 2014 http://ructf.org/

[6] Anisenya N. I., Stefantsov D. A., Torgaeva T. A., “The BlackBox service for hosting Capture The Flag computer security competitions”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2013, no. 6, 52–56 (in Russian)

[7] Blackbox, , 2014 http://blackbox.sibears.ru/

[8] SiBCTF, , 2014 http://sibctf.ru/

[9] Clarke I., Sandberg O., Wiley B., Hong T. W., “Freenet: a distributed anonymous information storage and retrieval system”, Designing Privacy Enhancing Technologies, Intern. Workshop on Design Issues in Anonymity and Unobservability, Springer Verlag, N.Y., 2001, 46–66 | Zbl

[10] Tor Project, , 2014 https://www.torproject.org/

[11] Haber S., Stornetta W. S., “How to time-stamp a digital document”, J. Cryptology, 3:2 (1991), 99–111

[12] Bitcoin – Open source P2P money, , 2014 http://bitcoin.org/

[13] Dwork C., Naor M., “Pricing via processing or combatting Junk Mail”, Proc. CRYPTO'92, Springer, Berlin–Heidelberg, 1993, 139–147 | Zbl