Explore >> Select a destination


You are here

blog.pkh.me
| | www.da.vidbuchanan.co.uk
1.4 parsecs away

Travel
| | [AI summary] A detailed writeup of a cryptographic side-channel attack challenge from the UofTCTF where the author exploits timing variations in an AES decryption implementation to recover the flag.
| | blog.0x7d0.dev
1.6 parsecs away

Travel
| | The AES algorithm is widely used today, whether it's for encrypting a connection to a website, encrypting data on your hard drive, or storing passwords in your favorite password manager. It has been battle-tested for many decades and is still recommended as one of the most secure algorithms. In this article, I explain how AES encryption works and how the algorithm is implemented.
| | cocomelonc.github.io
1.4 parsecs away

Travel
| | [AI summary] The provided text discusses the development of a payload using a custom encryption method, likely based on the Skipjack algorithm, to evade detection by antivirus systems. It outlines the steps to compile and run the payload on a Windows machine, and mentions that the code is intended for educational purposes only. The text also references the Clipper chip initiative and highlights the importance of awareness for cybersecurity professionals.
| | doar-e.github.io
2.5 parsecs away

Travel
|