Showing results for “crypto”
6 results found
-
Cipher block chaining
[Exercise]This exercise details how to tamper with data encrypted using CBC
-
CBC-MAC
[Exercise]This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC
-
CBC-MAC II
[Exercise]This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
-
Electronic Code Book
[Exercise]This exercise explains how you can tamper with an encrypted cookies to access another user's account.
-
ECDSA
[Exercise]This exercise covers the exploitation of a weakness in the usage of ECDSA
-
EDDSA vulnerability in Monocypher
[Exercise]This exercise covers the exploitation of a vulnerability impacting Monocypher.