Cryptography Known-plaintext BF-ecb file edit - Uni Assignment |
- Known-plaintext BF-ecb file edit - Uni Assignment
- Possible for a client to verify software running on server?
- Cracking /etc/shadow
Known-plaintext BF-ecb file edit - Uni Assignment Posted: 25 Apr 2019 03:17 PM PDT So I'm doing a first year Cybersecurity fundamentals paper and we have our first assignment. I've finished all questions bar this one in particular and need some push in the right direction. We have a small "payroll/ann salary" file that we need to edit. And make "our" salary equal to the higher salaries. We know employee names, know the length of each line, and also that it is sorted alphabetically. After quite a bit of reading I'm concluding that I'm stumped. After decryption I still don't have the key to re-encrypt, editing the file will change its hash, making it obvious that it has been edited. What are the typical steps to approach something like this? Is there any appropriate documents that would be of help? Thanks [link] [comments] |
Possible for a client to verify software running on server? Posted: 25 Apr 2019 07:36 AM PDT Sorry if this has already been asked, I tried searching and didn't find any results. Imagine there was a software service that open sourced its code. Is there any mechanism that clients could use to verify that the server was running the software it claimed? Like a hash of some sort included in the response to the client? [link] [comments] |
Posted: 25 Apr 2019 04:39 PM PDT Is it possible to crack shadow file in which root password is stored for Linux? [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment