Commit graph

22 commits

Author SHA1 Message Date
733d2d8ef0 CTR stream cipher mode 2025-03-08 22:01:08 +01:00
c3b3b729ea CBC Padding Oracle Crack 2025-03-05 19:56:12 +01:00
f77a556b4c Fix padding check 2025-03-02 16:05:50 +01:00
bbc1dadeee CBC bitflipping attack 2025-03-01 23:11:29 +01:00
4c07af21fd MT19937 Mersenne Twister 2025-02-23 08:50:36 +01:00
5da9257bc6 PKCS#7 padding validation 2025-02-22 21:49:31 +01:00
34821b66d8 Byte-at-a-time ECB decryption (hard mode) 2025-02-22 21:49:31 +01:00
ea404af16c ECB cut-and-paste attack 2025-02-22 21:49:31 +01:00
62b8c18e09 Add PKCS#7 unpadding and padding bugfix
When padding with a blocksize that aligns exactly with input buf, a
full block of padding is added instead of none at all.
2025-02-22 21:49:31 +01:00
b3155acd00 Byte-at-a-time ECB decryption 2025-02-22 21:49:31 +01:00
f9a03f507b Move oracle to cipher 2025-02-22 21:49:31 +01:00
4a2f81a142 ECB/CBC Detection Oracle 2025-02-22 21:49:31 +01:00
ee0f213650 AES CBC Mode
Implement AES CBC mode. Also fix key initialization, as it turns out,
Nettle AES keys cannot be initialized for encryption and decryption at
the same time. Hence, initialize the key when encryption/decryption is
invoked instead.
2025-02-22 21:49:31 +01:00
b544b1ccc5 PKCS#7 padding 2025-02-22 21:49:31 +01:00
48e7966923 Detect AES in ECB mode 2025-02-22 21:49:31 +01:00
2bf53562bf AES in ECB mode 2025-02-09 12:19:07 +01:00
bc0b59dc65 Set 1 - Challenge 4-6 2025-02-09 12:19:07 +01:00
b7b11efb0d Fix score
Doesn't really matter all that much but there's also no reason to
divide by 2
2025-02-08 16:36:49 +01:00
19036e4dec Single-byte XOR cipher 2025-02-08 08:24:57 +01:00
067f29127a Fixed XOR 2025-02-08 06:33:30 +01:00
efbe8b98dc Remove root.zig 2025-02-08 06:31:45 +01:00
d7a7e8a4ad Convert hex to base64 2025-02-07 21:35:45 +01:00