Crypton – Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

0
18
Crypton – Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an academic library to be taught and follow Offensive and Defensive Cryptography. It is principally a group of rationalization and implementation of all the present vulnerabilities and assaults on varied Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each assault can be supplemented with instance challenges from “Capture The Flag” contests and their respective write-ups. Individuals who’re already acquainted (or are into CTFs) with this area can use Crypton as a device to unravel challenges primarily based on a selected present vulnerability.

The library shall be constantly up to date with assault explanations and CTF challenges!

WARNING: The creator by no means ensures that the code is safe. The library is just meant for instructional functions and the code shouldn’t be used for implementing in actual world. All the instance scripts within the library are trivial implementations.

There are completely different sections on this README:

  • Motivation– What motivated me to create this library
  • Library Structure– Directory construction of Crypton
  • Domain Coverage– What all cryptosystems and assaults are lined on this library
  • Future Plans/TODO– Attacks/ideas which are to be included quickly

Motivation

Help CTF gamers and people within the area of Cryptography present a platform for studying assaults in crypto and for skilled CTF gamers to follow challenges systematically divided into assaults related to completely different sub-domains in crypto. Also, illustrate by varied assault explanations how correct implementation of protocols is essential.

Library Structure

Domain Coverage

1. Block Ciphers

2. RSA Encryption

3. Message Authentication Codes (MACs)

4. Discrete Logarithm Problem

S.No. Topic Explanation Impl./Exploit Challenge#
1 DLP– cyclic teams, discrete logarithm downside, Baby-Step-Giant-Step algorithm http://feedproxy.google.com/~r/PentestTools/~3/pV9GKrjPU_4/crypton-library-consisting-of.html  http://feedproxy.google.com/~r/PentestTools/~3/pV9GKrjPU_4/crypton-library-consisting-of.html
2 Elliptic Curve DLP– defining identification component, inverse of some extent, cyclic teams over factors on an EC, Hasse’s theorem, ECDLP http://feedproxy.google.com/~r/PentestTools/~3/pV9GKrjPU_4/crypton-library-consisting-of.html

5. ElGamal Encryption

6. Authenticated Encryption (AE)

7. Elliptic Curves

S.No. Topic Explanation Impl./Exploit Challenge#
1 Elliptic Curve Internals– defining Elliptic Curves, level addition, level doubling and scalar multiplication http://feedproxy.google.com/~r/PentestTools/~3/pV9GKrjPU_4/crypton-library-consisting-of.html

8. Digital Signatures

TODO

  1. RSA Encryption
    • Chosen Ciphertext Attack on RSA Cryptosystem- Byte by Byte decryption
    • Padding Oracle Attack on PKCS1 padded RSA encryption systemat
    • Fermat’s Factorisation
    • Coppersmith’s Attack
    • Hastad’s Broadcast Attack
      • Implementation of HBA on padded messages
    • PKCS1-v1.5 Padded RSA encryption
  2. [More to be added]

Author
Ashutosh Ahelleya

MoreTip.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.