Explore >> Select a destination


You are here

8051enthusiast.github.io
| | carterbancroft.com
5.0 parsecs away

Travel
| | These days, there are two major "categories" of encryption. Symmetric key encryption and Asymmetric key encryption. Today we're going to talk about the symmetric side of things. What is it? How does it work? Examples, etc. Let's dive in. What is it? Symmetric encryption is any cipher algorithm where plaintext
| | www.da.vidbuchanan.co.uk
5.4 parsecs away

Travel
| | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key.
| | goggleheadedhacker.com
5.5 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | thatsmaths.com
35.4 parsecs away

Travel
| A digital signature is a mathematical means of verifying that an e-document is authentic, that it has come from the claimed sender and that it has not been tampered with or corrupted during transit. Digital signatures are a standard component of cryptographic systems. They use asymetric cryptography that is based on key pairs, consisting of...