Cryptography What is the BLS signature scheme? |
- What is the BLS signature scheme?
- Grab my crypto red packet!
- Pentesterlab. ECDSA challenge
- A question about cryptopals problem 6
- Looking to contribute!
- Is SHA-3 (Keccak) already broken?
What is the BLS signature scheme? Posted: 17 Feb 2019 09:19 AM PST |
Posted: 18 Feb 2019 01:40 AM PST |
Posted: 17 Feb 2019 11:05 AM PST Hi there, I am struggling with Pentesterlab challenge: https://pentesterlab.com/exercises/ecdsa I'm wondering who can give some lights on how to resolve some steps in this challenge. You can read about similar challenge there - https://ropnroll.co.uk/2017/05/breaking-ecdsa/ I suppose I have problems with extracting (r,s) from ESDCA (SECP256k1) signature (here details - https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm) I even try to brute-force all possible (r,s) values but no luck. Every time I receive error 500. Input_data (2 cookies in base64): cookie1_b64 = "dGVzdDEtLTBFAiAvi95NGgcgk1W0pyUKXFEo6IuEvdxhmrfLqNVpskDv5AIhAPIKmKXHWWWlQmeYNW5LRJwQsEBTLhM%2FYteAhVX5HAwE" Its very interesting challenge and I want to break ECDSA finally. Thanks in advance [link] [comments] |
A question about cryptopals problem 6 Posted: 17 Feb 2019 07:05 AM PST I am working through the cryptopals problems for the second time. The first time I used them mainly as an exercise to learn to code but this time I am trying to understand each step as thoroughly as possible. First though, I know that problem 6 deals more with subject matter found on r/codes but I am looking for relation to cryptographic relevance as well so I am posting here. For the most part I understand the problem, excepting the 4th step: "The KEYSIZE with the smallest normalized edit distance is probably the key. You could proceed perhaps with the smallest 2-3 KEYSIZE values. Or take 4 KEYSIZE blocks instead of 2 and average the distances. " Why is the KEYSIZE with the smallest edit distance probably the key? When xoring plaintext with the key isn't the idea that the results are randomized? Even if they weren't, how would xoring byte x with byte y each time produce similar results given a key that isn't just a single byte? I suppose I would be more prone to understand if we were given a suggestion of a longer KEYSIZE sample, but 40 characters seems rather small to determine letter frequency. In any case, thanks for whatever explanation I get and apologies if it is ultimately determined this does not belong here [link] [comments] |
Posted: 17 Feb 2019 10:49 AM PST I'm looking to get stuck into more cryptography related engineering projects, please point me in the right direction! Preferably something C or Go based, but I'm open to anything with open issues. :) [link] [comments] |
Is SHA-3 (Keccak) already broken? Posted: 17 Feb 2019 12:40 PM PST |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment