Cryptography in reverse analysis -- MD5

0x01 introduction MD5 message digest algorithm (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value. It can be used to ensure the integrity and consistency of information transmission. Save the password in the database (md5(pass,salt) mode). 0x02 algorithm flow 1. Dat ...

Added by egroeg41 on Tue, 08 Mar 2022 15:25:42 +0200

SHA224 and SHA256 hash algorithm principle and Implementation (with source code)

Related articles: Principle and implementation of state secret SM3 hash algorithm (with source code)Principle and implementation of SHA1 hash algorithm (with source code)Principle and implementation of MD5 hash algorithm (with source code)Principle and implementation of MD4 hash algorithm (with source code)Principle and implementation of MD2 ...

Added by gazever on Fri, 28 Jan 2022 22:38:12 +0200

OpenSSL3.0 learning 3 encryption library provider CSDN creation punch in

๐Ÿ“’ Blog home page: Actor's blog ๐ŸŽ‰ Welcome to pay attention ๐Ÿ”Ž give the thumbs-up ๐Ÿ‘ Collection โญ Leave a message ๐Ÿ“ โค๏ธ Look forward to communicating together! ๐Ÿ™ The author's level is very limited. If you find an error, please let me know. Thank you! ๐ŸŒบ If you have any questions, you can communicate by private letter!!! ๐Ÿฅฆ OpenSSL provider Op ...

Added by guilhenfsu on Fri, 28 Jan 2022 03:39:52 +0200

Cryptohack Title Record Mathematics Section Lattice WriteUp

Backpack Cryptograph is missing Mathematics Lattices 1. Vectors Basic vector-to-scalar operations Title: v = (2,6,3), w = (1,0,0) and u = (7,7,2), calculate 3*(2*v - w) โˆ™ 2*u. Calculate directly using sage sage: v = vector([2,6,3]) sage: w = vector([1,0,0]) sage: u = vector([7,7,2]) sage: 3*(2*v-w)*2*u 702 flag is 702 2. Size ...

Added by ryan-uk on Thu, 27 Jan 2022 00:03:13 +0200

Cryptography: encryption mode and padding mode and message digest

catalogue Encryption mode ECB CBC Fill mode NoPadding PKCS5Padding Tips Message summary characteristic Get string message summary base64 encoding Other digital summarization algorithms Get file message summary Encryption mode Encryption mode: https://docs.oracle.com/javase/8/docs/api/javax/crypto/Cipher.html ECB ECB: electroni ...

Added by gevensen on Tue, 18 Jan 2022 23:44:42 +0200

Cryptography: asymmetric encryption

catalogue Asymmetric encryption Generate public and private keys Private key encryption Private key encryption private key decryption Private key encryption public key decryption Public key encryption and public key decryption Save public and private keys Read private key Read public key Asymmetric encryption Introduction: โ‘  Asymme ...

Added by hamboy on Tue, 18 Jan 2022 06:43:40 +0200

BUUCTF clocks in every day on July 28, 2021

introduction nothing [De1CTF2019]xorz The encryption code is as follows: from itertools import * from data import flag,plain key=flag.strip("de1ctf{").strip("}") assert(len(key)<38) salt="WeAreDe1taTeam" ki=cycle(key) si=cycle(salt) cipher = ''.join([hex(ord(p) ^ ord(next(ki)) ^ ord(next(si)))[2:].zfill(2) for p in plain]) print cipher ...

Added by roonnyy on Mon, 10 Jan 2022 21:50:00 +0200

BUUCTF clocks in every day on August 9, 2021

introduction Join the Nep united team, and get busy again [NCTF2019]easyRSA The encryption code is as follows: from flag import flag e = 0x1337 p = 1991386778237438373399275201576078200297465745577465490949214882928772265091983150160189193852597812381484028333160336349681632761989992793278279018794264296646743588440844918305432716251472809 ...

Added by smordue on Thu, 06 Jan 2022 03:43:40 +0200

Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java implementation

Realize the working mode of DES 1, Experimental purpose Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm. 2, Experimental principle Basic principle of DES ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...

Added by superdan_35 on Mon, 13 Dec 2021 08:34:56 +0200

Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java python implementation

Realize the working mode of DES 1, Experimental purpose Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm. 2, Experimental principle Basic principle of DES ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...

Added by rationalrabbit on Sun, 12 Dec 2021 12:26:08 +0200