crypto-attacks icon indicating copy to clipboard operation
crypto-attacks copied to clipboard

Python implementations of cryptographic attacks and utilities.

Results 8 crypto-attacks issues
Sort by recently updated
recently updated
newest added

rewrited exploit for cpa from https://wiki.newae.com/V4:Tutorial_B6_Breaking_AES_(Manual_CPA_Attack) : ```python import numpy as np import logging HW = [bin(n).count("1") for n in range(0,256)] sbox=( 0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76, 0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0, 0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15, 0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75, 0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84, 0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf, 0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8, 0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,...

https://github.com/jvdsn/crypto-attacks/blob/master/shared/hensel.py#L33 FIX: ```python # roots = list(range(p)) roots = range(p) ``` because `list(range(big_p))` will use so much memory

I was wondering if it is possible to extend the the function `generate_anomalous_q` to generate curves with more types of prime numbers, as mentioned in this paper for the case...

Thank you very much for your library sir and I want to ask when will be Fourier analysis attack available this is very interesting script.

> [Due to this equality, if a curve with a certain j-invariant is not anomalous, we check if the group order is p + 2. If this is the case,...

Required for #24. The underlying idea is to factorize $F_p^{12}-1$ and solve power root for each resulting moduli. I can share https://ieeexplore.ieee.org/abstract/document/6530387 privately for more details.

Pairings can be used for attacking the discrete logarithm on supersingular curves as you propose, it’s used for encryption or signature purposes. https://pdfupload.io/docs/8453308d#%5B%7B%22num%22%3A2790%2C%22gen%22%3A0%7D%2C%7B%22name%22%3A%22FitH%22%7D%2C343%5D shows how certain type of pairings can...

For any binary curve, the aim is to map the discrete logarithm to an hyperelliptic curve. It’s something as much well known as pairings. See https://hal.science/hal-01121942/document for details.