Cryptography Tricks: Difference between revisions
Jump to navigation
Jump to search
(Created page with "Here are some cryptography tricks that i've learned with some important people and that helped made this page. They helped a lot with the Keys and Seeds page construction. Use...") |
|||
Line 11: | Line 11: | ||
= AES-ECB tricks = | = AES-ECB tricks = | ||
* If the attacker knows where 16 bytes of zeroes are located in known plaintext/ciphertext location, he can use | * If the attacker knows where 16 bytes of zeroes are located in known plaintext/ciphertext location, he can use AES-ECB with the guessed key on that location. if there is a match of the previous 16 bytes as result, the attacker automatically knows the guessed key is the correct key | ||
AES-ECB with the guessed key on that location. if there is a match of the previous 16 bytes as result, the attacker automatically knows the guessed key is the correct key |
Revision as of 11:36, 8 October 2020
Here are some cryptography tricks that i've learned with some important people and that helped made this page. They helped a lot with the Keys and Seeds page construction. Use them wisely :)
AES-CTR tricks
- Recovery of partial plaintext with two ciphertexts encrypted with same key and iv by knowing where zeroes (\x00) are located
AES-CBC tricks
- The iv of a CBC operation is always the previous 0x10 block, UNLESS it's the starting operation. in this case it is specified by the end-user
AES-ECB tricks
- If the attacker knows where 16 bytes of zeroes are located in known plaintext/ciphertext location, he can use AES-ECB with the guessed key on that location. if there is a match of the previous 16 bytes as result, the attacker automatically knows the guessed key is the correct key