Editing Cryptography Tricks
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
Here are some cryptography tricks that | Here are some cryptography tricks that i've learned with some important people and that helped made this page. They helped a lot with the Keys and Seeds page construction. Use them wisely :) | ||
= AES-CTR tricks = | = AES-CTR tricks = | ||
* Recovery of partial plaintext with two ciphertexts encrypted with same | * Recovery of partial plaintext with two ciphertexts encrypted with same key and iv by knowing where zeroes (\x00) are located | ||
* This trick was used in the recovery of the ebootrom keys | |||
* Xoring these ciphertexts will reveal plaintext where in both locations there are zeroes in one place and plaintext in the other | |||
= AES-CBC tricks = | = AES-CBC tricks = | ||
* The iv of a CBC operation is always the previous block | * The iv of a CBC operation is always the previous 0x10 block, UNLESS it's the starting operation. in this case it is specified by the end-user | ||
= AES-ECB tricks = | = AES-ECB tricks = | ||
* If | * If cbc is used on a block and if the attacker knows where 16 bytes of zeroes are located in known plaintext with given ciphertext location, he can use AES-ECB with the guessed key on that location. if there is a match of the previous 16 bytes as result, the attacker automatically knows the guessed key is the correct key | ||
* this means that the first 0x10 bytes of the ciphered text will be equal to the second 0x10 bytes of the plaintext, if the plaintext is supposed to have zeroes. | |||
{{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude> | {{Reverse engineering}}<noinclude>[[Category:Main]]</noinclude> |