crypto-attacks
crypto-attacks copied to clipboard
Python implementations of cryptographic attacks and utilities.
rewrited exploit for cpa from https://wiki.newae.com/V4:Tutorial_B6_Breaking_AES_(Manual_CPA_Attack) : ```python import numpy as np import logging HW = [bin(n).count("1") for n in range(0,256)] sbox=( 0x63,0x7c,0x77,0x7b,0xf2,0x6b,0x6f,0xc5,0x30,0x01,0x67,0x2b,0xfe,0xd7,0xab,0x76, 0xca,0x82,0xc9,0x7d,0xfa,0x59,0x47,0xf0,0xad,0xd4,0xa2,0xaf,0x9c,0xa4,0x72,0xc0, 0xb7,0xfd,0x93,0x26,0x36,0x3f,0xf7,0xcc,0x34,0xa5,0xe5,0xf1,0x71,0xd8,0x31,0x15, 0x04,0xc7,0x23,0xc3,0x18,0x96,0x05,0x9a,0x07,0x12,0x80,0xe2,0xeb,0x27,0xb2,0x75, 0x09,0x83,0x2c,0x1a,0x1b,0x6e,0x5a,0xa0,0x52,0x3b,0xd6,0xb3,0x29,0xe3,0x2f,0x84, 0x53,0xd1,0x00,0xed,0x20,0xfc,0xb1,0x5b,0x6a,0xcb,0xbe,0x39,0x4a,0x4c,0x58,0xcf, 0xd0,0xef,0xaa,0xfb,0x43,0x4d,0x33,0x85,0x45,0xf9,0x02,0x7f,0x50,0x3c,0x9f,0xa8, 0x51,0xa3,0x40,0x8f,0x92,0x9d,0x38,0xf5,0xbc,0xb6,0xda,0x21,0x10,0xff,0xf3,0xd2,...
https://github.com/jvdsn/crypto-attacks/blob/master/shared/hensel.py#L33 FIX: ```python # roots = list(range(p)) roots = range(p) ``` because `list(range(big_p))` will use so much memory
I was wondering if it is possible to extend the the function `generate_anomalous_q` to generate curves with more types of prime numbers, as mentioned in this paper for the case...
Thank you very much for your library sir and I want to ask when will be Fourier analysis attack available this is very interesting script.
> [Due to this equality, if a curve with a certain j-invariant is not anomalous, we check if the group order is p + 2. If this is the case,...
Required for #24. The underlying idea is to factorize $F_p^{12}-1$ and solve power root for each resulting moduli. I can share https://ieeexplore.ieee.org/abstract/document/6530387 privately for more details.
Pairings can be used for attacking the discrete logarithm on supersingular curves as you propose, it’s used for encryption or signature purposes. https://pdfupload.io/docs/8453308d#%5B%7B%22num%22%3A2790%2C%22gen%22%3A0%7D%2C%7B%22name%22%3A%22FitH%22%7D%2C343%5D shows how certain type of pairings can...
For any binary curve, the aim is to map the discrete logarithm to an hyperelliptic curve. It’s something as much well known as pairings. See https://hal.science/hal-01121942/document for details.