## Cryptography in reverse analysis -- MD5

0x01 introduction
MD5 message digest algorithm (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value. It can be used to ensure the integrity and consistency of information transmission. Save the password in the database (md5(pass,salt) mode).
0x02 algorithm flow
1. Dat ...

Added by **egroeg41** on *Tue, 08 Mar 2022 15:25:42 +0200*

## SHA224 and SHA256 hash algorithm principle and Implementation (with source code)

Related articles:
Principle and implementation of state secret SM3 hash algorithm (with source code)Principle and implementation of SHA1 hash algorithm (with source code)Principle and implementation of MD5 hash algorithm (with source code)Principle and implementation of MD4 hash algorithm (with source code)Principle and implementation of MD2 ...

Added by **gazever** on *Fri, 28 Jan 2022 22:38:12 +0200*

## OpenSSL3.0 learning 3 encryption library provider CSDN creation punch in

๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ฅฆ OpenSSL pro ...

Added by **guilhenfsu** on *Fri, 28 Jan 2022 03:39:52 +0200*

## Cryptohack Title Record Mathematics Section Lattice WriteUp

Backpack Cryptograph is missing
Mathematics
Lattices
1. Vectors
Basic vector-to-scalar operations
Title:
v = (2,6,3), w = (1,0,0) and u = (7,7,2), calculate 3*(2*v - w) โ 2*u.
Calculate directly using sage
sage: v = vector([2,6,3])
sage: w = vector([1,0,0])
sage: u = vector([7,7,2])
sage: 3*(2*v-w)*2*u
702
flag is 702
2. Size ...

Added by **ryan-uk** on *Thu, 27 Jan 2022 00:03:13 +0200*

## Cryptography: encryption mode and padding mode and message digest

catalogue
Encryption mode
ECB
CBC
Fill mode
NoPadding
PKCS5Padding
Tips
Message summary
characteristic
Get string message summary
base64 encoding
Other digital summarization algorithms
Get file message summary
Encryption mode
Encryption mode: https://docs.oracle.com/javase/8/docs/api/javax/crypto/Cipher.html
ECB
ECB: electroni ...

Added by **gevensen** on *Tue, 18 Jan 2022 23:44:42 +0200*

## Cryptography: asymmetric encryption

catalogue
Asymmetric encryption
Generate public and private keys
Private key encryption
Private key encryption private key decryption
Private key encryption public key decryption
Public key encryption and public key decryption
Save public and private keys
Read private key
Read public key
Asymmetric encryption
Introduction:
โ Asymme ...

Added by **hamboy** on *Tue, 18 Jan 2022 06:43:40 +0200*

## BUUCTF clocks in every day on July 28, 2021

introduction
nothing
[De1CTF2019]xorz
The encryption code is as follows:
from itertools import *
from data import flag,plain
key=flag.strip("de1ctf{").strip("}")
assert(len(key)<38)
salt="WeAreDe1taTeam"
ki=cycle(key)
si=cycle(salt)
cipher = ''.join([hex(ord(p) ^ ord(next(ki)) ^ ord(next(si)))[2:].zfill(2) for p in plain])
print cipher
...

Added by **roonnyy** on *Mon, 10 Jan 2022 21:50:00 +0200*

## BUUCTF clocks in every day on August 9, 2021

introduction
Join the Nep united team, and get busy again
[NCTF2019]easyRSA
The encryption code is as follows:
from flag import flag
e = 0x1337
p = 1991386778237438373399275201576078200297465745577465490949214882928772265091983150160189193852597812381484028333160336349681632761989992793278279018794264296646743588440844918305432716251472809 ...

Added by **smordue** on *Thu, 06 Jan 2022 03:43:40 +0200*

## Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java implementation

Realize the working mode of DES
1, Experimental purpose
Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm.
2, Experimental principle
Basic principle of DES
ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...

Added by **superdan_35** on *Mon, 13 Dec 2021 08:34:56 +0200*

## Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java python implementation

Realize the working mode of DES
1, Experimental purpose
Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm.
2, Experimental principle
Basic principle of DES
ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...

Added by **rationalrabbit** on *Sun, 12 Dec 2021 12:26:08 +0200*