Skip to content

Identifying and exploiting various cryptographic schemes

Notifications You must be signed in to change notification settings

samhithatarra/Cryptography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cryptography

HW1: Stream Cipher Biases, ECB Partial Plaintext Recovery, CTR Plaintext Recovery

HW2: Malleability Against SHA256 into CTR, Malleability Against Truncated HMAC-SHA256 into CTR, CBC Padding Oracle Attack

HW3: Exploiting CBC-MAC Collisions, MD5 Length Extension Attack, HMAC Timing Attack

HW4: ECDSA Nonce Reuse, Attacking Textbook RSA, Bleichenbacher’s RSA e=3 Signature Forgery

HW5: Invisible Salamanders in GCM, Compression-Oracle Attacks

About

Identifying and exploiting various cryptographic schemes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages