Showing results for: crypto

6 results found

Cipher block chaining
| Exercise

This exercise details how to tamper with data encrypted using CBC

CBC-MAC
| Exercise

This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC

CBC-MAC II
| Exercise

This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV

Electronic Code Book
| Exercise

This exercise explains how you can tamper with encrypted cookies to access another user's account

ECDSA
| Exercise

This exercise covers the exploitation of a weakness in the usage of ECDSA

EDDSA vulnerability in Monocypher
| Exercise

This exercise covers the exploitation of a vulnerability impacting Monocypher.

Didn't find what you were after?

or contact us at: