Giter Site home page Giter Site logo

cryptopals's People

Contributors

mrbrianhobo avatar

Stargazers

 avatar

Watchers

 avatar  avatar

cryptopals's Issues

Set 5: Diffie-Hellman & Friends

https://cryptopals.com/sets/5

  • Implement Diffie-Hellman
  • Implement a MITM key-fixing attack on Diffie-Hellman with parameter injection
  • Implement DH with negotiated groups, and break with malicious "g" parameters
  • Implement Secure Remote Password (SRP)
  • Break SRP with a zero key
  • Offline dictionary attack on simplified SRP
  • Implement RSA
  • Implement an E=3 RSA Broadcast attack

Set 2: Block Crypto

https://cryptopals.com/sets/2

  • Implement PKCS#7 padding
  • Implement CBC mode
  • An ECB/CBC detection oracle
  • Byte-at-a-time ECB decryption (Simple)
  • ECB cut-and-paste
  • Byte-at-a-time ECB decryption (Harder)
  • PKCS#7 padding validation
  • CBC bitflipping attacks

Set 3: Block & Stream Crypto

https://cryptopals.com/sets/3

  • The CBC padding oracle
  • Implement CTR, the stream cipher mode
  • Break fixed-nonce CTR mode using substitutions
  • Break fixed-nonce CTR statistically
  • Implement the MT19937 Mersenne Twister RNG
  • Crack an MT19937 seed
  • Clone an MT19937 RNG from its output
  • Create the MT19937 stream cipher and break it

Set 6: RSA & DSA

https://cryptopals.com/sets/6

  • Implement unpadded message recovery oracle
  • Bleichenbacher's e=3 RSA Attack
  • DSA key recovery from nonce
  • DSA nonce recovery from repeated nonce
  • DSA parameter tampering
  • RSA parity oracle
  • Bleichenbacher's PKCS 1.5 Padding Oracle (Simple Case)
  • Bleichenbacher's PKCS 1.5 Padding Oracle (Complete Case)

Set 4: Stream Crypto & Randomness

https://cryptopals.com/sets/4

  • Break "random access read/write" AES CTR
  • CTR bitflipping
  • Recover the key from CBC with IV=Key
  • Implement a SHA-1 keyed MAC
  • Break a SHA-1 keyed MAC using length extension
  • Break an MD4 keyed MAC using length extension
  • Implement and break HMAC-SHA1 with an artificial timing leak
  • Break HMAC-SHA1 with a slightly less artificial timing leak

Set 7: Hashes

https://cryptopals.com/sets/7

  • CBC-MAC Message Forgery
  • Hashing with CBC-MAC
  • Compression Ratio Side-Channel Attacks
  • Iterated Hash Function Multicollisions
  • Kelsey and Schneier's Expandable Messages
  • Kelsey and Kohno's Nostradamus Attack
  • MD4 Collisions
  • RC4 Single-Byte Biases

Set 1: Basics

https://cryptopals.com/sets/1

  • Convert hex to base64
  • Fixed XOR
  • Single-byte XOR cipher
  • Detect single-character XOR
  • Implement repeating-key XOR
  • Break repeating-key XOR
  • AES in ECB mode
  • Detect AES in ECB mode

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.