Cryptography in reverse analysis -- MD5
0x01 introduction
MD5 message digest algorithm (English: MD5 message digest algorithm), a widely used cryptographic hash function, can generate a 128 bit (16 byte) hash value. It can be used to ensure the integrity and consistency of information transmission. Save the password in the database (md5(pass,salt) mode).
0x02 algorithm flow
1. Dat ...
Added by egroeg41 on Tue, 08 Mar 2022 15:25:42 +0200
SHA224 and SHA256 hash algorithm principle and Implementation (with source code)
Related articles:
Principle and implementation of state secret SM3 hash algorithm (with source code)Principle and implementation of SHA1 hash algorithm (with source code)Principle and implementation of MD5 hash algorithm (with source code)Principle and implementation of MD4 hash algorithm (with source code)Principle and implementation of MD2 ...
Added by gazever on Fri, 28 Jan 2022 22:38:12 +0200
OpenSSL3.0 learning 3 encryption library provider CSDN creation punch in
๐ Blog home page: Actor's blog ๐ Welcome to pay attention ๐ give the thumbs-up ๐ Collection โญ Leave a message ๐ โค๏ธ Look forward to communicating together! ๐ The author's level is very limited. If you find an error, please let me know. Thank you! ๐บ If you have any questions, you can communicate by private letter!!!
๐ฅฆ OpenSSL pro ...
Added by guilhenfsu on Fri, 28 Jan 2022 03:39:52 +0200
Cryptohack Title Record Mathematics Section Lattice WriteUp
Backpack Cryptograph is missing
Mathematics
Lattices
1. Vectors
Basic vector-to-scalar operations
Title:
v = (2,6,3), w = (1,0,0) and u = (7,7,2), calculate 3*(2*v - w) โ 2*u.
Calculate directly using sage
sage: v = vector([2,6,3])
sage: w = vector([1,0,0])
sage: u = vector([7,7,2])
sage: 3*(2*v-w)*2*u
702
flag is 702
2. Size ...
Added by ryan-uk on Thu, 27 Jan 2022 00:03:13 +0200
Cryptography: encryption mode and padding mode and message digest
catalogue
Encryption mode
ECB
CBC
Fill mode
NoPadding
PKCS5Padding
Tips
Message summary
characteristic
Get string message summary
base64 encoding
Other digital summarization algorithms
Get file message summary
Encryption mode
Encryption mode: https://docs.oracle.com/javase/8/docs/api/javax/crypto/Cipher.html
ECB
ECB: electroni ...
Added by gevensen on Tue, 18 Jan 2022 23:44:42 +0200
Cryptography: asymmetric encryption
catalogue
Asymmetric encryption
Generate public and private keys
Private key encryption
Private key encryption private key decryption
Private key encryption public key decryption
Public key encryption and public key decryption
Save public and private keys
Read private key
Read public key
Asymmetric encryption
Introduction:
โ Asymme ...
Added by hamboy on Tue, 18 Jan 2022 06:43:40 +0200
BUUCTF clocks in every day on July 28, 2021
introduction
nothing
[De1CTF2019]xorz
The encryption code is as follows:
from itertools import *
from data import flag,plain
key=flag.strip("de1ctf{").strip("}")
assert(len(key)<38)
salt="WeAreDe1taTeam"
ki=cycle(key)
si=cycle(salt)
cipher = ''.join([hex(ord(p) ^ ord(next(ki)) ^ ord(next(si)))[2:].zfill(2) for p in plain])
print cipher
...
Added by roonnyy on Mon, 10 Jan 2022 21:50:00 +0200
BUUCTF clocks in every day on August 9, 2021
introduction
Join the Nep united team, and get busy again
[NCTF2019]easyRSA
The encryption code is as follows:
from flag import flag
e = 0x1337
p = 1991386778237438373399275201576078200297465745577465490949214882928772265091983150160189193852597812381484028333160336349681632761989992793278279018794264296646743588440844918305432716251472809 ...
Added by smordue on Thu, 06 Jan 2022 03:43:40 +0200
Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java implementation
Realize the working mode of DES
1, Experimental purpose
Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm.
2, Experimental principle
Basic principle of DES
ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...
Added by superdan_35 on Mon, 13 Dec 2021 08:34:56 +0200
Cryptography to achieve DES working mode codebook mode ECB cipher packet link mode CBC java python implementation
Realize the working mode of DES
1, Experimental purpose
Master the working principle of DES algorithm; Familiar with the working mode of packet encryption algorithm.
2, Experimental principle
Basic principle of DES
ppop has three entry parameters: key, data and mode. Key is the key used for encryption and decryption, data is the encrypt ...
Added by rationalrabbit on Sun, 12 Dec 2021 12:26:08 +0200