summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* challenge: do challenge 17rsiddharth2021-02-212-0/+187
|
* lib: add OracleIVrsiddharth2021-02-211-0/+6
|
* lib: update Pkcs7PaddingUndo, AESDecryptCBCrsiddharth2021-02-115-19/+29
| | | | | Add error as the second return value to Pkcs7PaddingUndo and AESDecryptCBC.
* lib: add CPErrorrsiddharth2021-02-111-0/+11
|
* lib: oracleKey -> OracleKeyrsiddharth2021-02-111-4/+4
|
* lib: randomInt -> RandomIntrsiddharth2021-02-111-4/+4
|
* README.md: update statusrsiddharth2021-02-011-1/+1
|
* challenge: update ch16rsiddharth2021-02-011-32/+16
| | | | | | | - Don't use AESDecryptCBC directly for the bitflap attack. - Use just function 1 (cbcBitFlipEncrypt) and 2 (cbcBitFlipDecryptHasAdmin) to modify the cipher to produce the needed ';admin=true;' in the de-ciphered text.
* challenge: do challenge 16rsiddharth2021-01-302-0/+122
|
* lib: add StrHasrsiddharth2021-01-301-0/+10
|
* lib: update StripSpaceCharsrsiddharth2021-01-301-0/+3
| | | | strip 'NUL' character too.
* lib: stripSpaceChars -> StripSpaceCharsrsiddharth2021-01-303-3/+3
|
* lib: add StrToUpperrsiddharth2021-01-271-0/+12
|
* challenge: update C15rsiddharth2021-01-261-2/+2
|
* challenge: do challenge 15rsiddharth2021-01-262-0/+42
|
* lib: update Pkcs7PaddingUndorsiddharth2021-01-261-1/+10
| | | | Add validation.
* challenge: add output for challenge 14rsiddharth2021-01-251-0/+7
|
* challenge: freshSheepBlock -> freshSheepBytesrsiddharth2021-01-252-8/+8
|
* challenge: do challenge 14rsiddharth2021-01-253-1/+131
|
* challenge: fix findUnknownStringCharacteristicsrsiddharth2021-01-191-1/+1
|
* lib: add HasConsecutiveMatchingBlocksrsiddharth2021-01-121-0/+14
|
* lib: add OracleAESVarEncryptECBrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `AES-128-ECB` function.
* lib: add oracleRandomrsiddharth2021-01-121-0/+6
| | | | For challenge 14. This will be used as the `random-prefix`.
* lib: update randomBytesrsiddharth2021-01-121-14/+2
| | | | Use randomInt to get the random byte array length.
* lib: add randomIntrsiddharth2021-01-121-0/+19
|
* lib/web: update import statmentrsiddharth2020-12-211-3/+1
|
* challenge/ch13.go -> challenge/c13.gorsiddharth2020-12-211-0/+0
|
* do challenge 13rsiddharth2020-12-212-0/+32
|
* lib: add web.gorsiddharth2020-12-201-0/+96
| | | | For challenge 13.
* lib/str: add StrSplitAtrsiddharth2020-12-201-0/+17
|
* lib/str: add NumToStrrsiddharth2020-12-201-0/+9
|
* lib/str: add NumToCharrsiddharth2020-12-201-0/+8
|
* update README.mdrsiddharth2020-12-131-2/+0
|
* challenge: do challenge 12rsiddharth2020-12-132-0/+123
|
* lib/aes: add OracleAESEncryptECBrsiddharth2020-12-131-0/+18
|
* lib/blocks: rename CipherIsECB -> CipherUsesECBrsiddharth2020-12-123-3/+3
|
* do challenge 11rsiddharth2020-12-102-0/+39
|
* lib/blocks: BlockIsECB -> CipherIsECBrsiddharth2020-12-092-2/+2
|
* lib/oracle.go: add OracleAESRandomEncryptrsiddharth2020-12-091-0/+68
|
* lib/aes: update AESEncryptCBCrsiddharth2020-12-092-11/+14
| | | | Add padding
* lib/aes: update AESEncryptECBrsiddharth2020-12-091-0/+7
| | | | Add padding.
* lib/aes: update AESEncrryptECBrsiddharth2020-12-091-3/+3
| | | | Change argument name `cipher` to `plain`.
* lib/blocks: add Pkcs7PaddingUndorsiddharth2020-12-091-0/+5
|
* lib/blocks: move isECB from ch. 8 in here as BlockIsECBrsiddharth2020-12-082-24/+24
|
* challenge: fix typo in challenge 08rsiddharth2020-12-061-2/+2
|
* challenge: fix challenge 08rsiddharth2020-12-061-4/+4
|
* challenge: complete challenge 10rsiddharth2020-12-061-4/+24
|
* lib/hex: add PrettifyHexStrrsiddharth2020-12-061-0/+12
|
* lib/hex: update BytesToHexStrrsiddharth2020-12-061-1/+1
| | | | Don't add space character.
* lib/aes: add AESEncryptCBCrsiddharth2020-12-061-1/+17
|