{"id":2440,"date":"2018-09-02T18:13:52","date_gmt":"2018-09-02T12:43:52","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=2440"},"modified":"2018-09-02T18:13:52","modified_gmt":"2018-09-02T12:43:52","slug":"crypton","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/crypton\/","title":{"rendered":"Crypton &#8211; Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms"},"content":{"rendered":"<p><strong>Crypton<\/strong> is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented with example challenges from &#8220;Capture The Flag&#8221; contests and their respective write-ups. Individuals who are already acquainted (or are into CTFs) with this field can use Crypton as a tool to solve challenges based on a particular existing vulnerability.<\/p>\n<p>There are different sections in this README:<\/p>\n<ul>\n<li><strong>Motivation<\/strong>&#8211; What motivated me to create this library<\/li>\n<li><strong>Library Structure-<\/strong> Directory structure of Crypton<\/li>\n<li><strong>Domain Coverage-<\/strong> What all cryptosystems and attacks are covered in this library<\/li>\n<li><strong>Future Plans\/Fuss-<\/strong> Attacks\/concepts that are to be included soon<\/li>\n<\/ul>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\" target=\"_blank\" rel=\"noopener\">Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts<\/a><\/strong><\/p>\n<h2><strong>Motivation<\/strong><\/h2>\n<p>Help CTF players and individuals interested in the field of Cryptography provide a platform for learning attacks in crypto and for experienced CTF players to practice challenges systematically divided into attacks associated with different sub-domains in crypto. Also, illustrate through various attack explanations how proper implementation of protocols is crucial.<\/p>\n<h2><strong>Library Structure<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2442\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\" alt=\"\" width=\"782\" height=\"402\" \/><\/p>\n<h2><strong>Domain Coverage<\/strong><\/h2>\n<h3><a id=\"user-content-1-block-ciphers\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#1-block-ciphers\" aria-hidden=\"true\"><\/a><strong>1. Block Ciphers<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center;\">S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th style=\"text-align: center;\" align=\"center\">Explanation<\/th>\n<th style=\"text-align: center;\" align=\"center\">Impl.\/Exploit<\/th>\n<th style=\"text-align: center;\" align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher#block-cipher\">Block Cipher Basics<\/a>&#8211; working of block ciphers, padding etc.<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Mode-of-Encryption\">Modes of Encryption<\/a>&#8211; different modes of operation on block ciphers: ECB, CBC, CTR<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Mode-of-Encryption\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher#block-size-detection\">Block Size Detection<\/a>&#8211; detect blocksize of a block cipher encrypting data on a remote service<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher#block-size-detection\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher#mode-detection\">Mode Detection<\/a>&#8211; detect type of mode of encryption: independent or dependent encryption of blocks<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher#mode-detection\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-ECB-Byte-at-a-Time\">ECB Byte at a Time<\/a>&#8211; byte at a time decryption of a <code>secret<\/code> string running on a remote service encrypting <code>input<\/code>+<code>secret<\/code> in ECB mode<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-ECB-Byte-at-a-Time\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-ECB-Byte-at-a-Time\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/CBC-IV-Detection\">CBC IV Detection<\/a>&#8211; detect the value of Initialisation Vector on a remote service that is encrypting our input using a block cipher in CBC mode<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/CBC-IV-Detection\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/CBC-IV-Detection\/example.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CBC-Bit-Flipping\">CBC Bit Flipping Attack<\/a>&#8211; exploiting cookie generation mechanism to login as admin when cookie is generated using a block cipher in CBC mode<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-CBC-Bit-Flipping\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CBC-Bit-Flipping\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CBC-Byte-at-a-Time\">CBC Byte at a Time<\/a>&#8211; byte at a time decryption of a <code>secret<\/code> string running on a remote service encrypting <code>input<\/code>+<code>secret<\/code> in ECB mode<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-CBC-Byte-at-a-Time\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-CBC-Byte-at-a-Time\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CBC-Padding-Oracle\">CBC Padding Oracle Attack<\/a>&#8211; decryption of data encrypted by a vulnerable service providing encryption\/decryption<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-CBC-Padding-Oracle\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CBC-Padding-Oracle\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CTR-Bit-Flipping\">CTR Bit Flipping<\/a>&#8211; exploiting cookie generation mechanism to login as admin when cookie is generated using a block cipher in CBC mode<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Block-Cipher\/Attack-CTR-Bit-Flipping\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Block-Cipher\/Attack-CTR-Bit-Flipping\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-2-rsa-encryption\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#2-rsa-encryption\" aria-hidden=\"true\"><\/a><strong>2. RSA Encryption<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\">Unpadded RSA Enc\/Dec<\/a>&#8211; key generation, distribution, encryption\/decryption, verification of decryption formula and padding in RSA<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/README.md#padding-and-padding-schemes\">Direct Root Attack<\/a>&#8211; attack on unpadded RSA with low public key exponent<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/README.md#padding-and-padding-schemes\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Factorisation-Fermat\">Fermat&#8217;s Factorisation<\/a>&#8211; technique used to factor modulus <code>n<\/code> when <code>p<\/code> and <code>q<\/code> values are in proximity<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Factorisation-Fermat\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Factorisation-Fermat\/fermat.sage\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Factorisation-Fermat\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Factorisation-Pollard's_p-1\">Pollard&#8217;s p-1 Factorisation<\/a>&#8211; technique to factorise <code>n<\/code> when both of it&#8217;s factors <code>p<\/code> &amp; <code>q<\/code>, <code>p-1<\/code> and <code>q-1<\/code> have very small prime divisors<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Factorisation-Pollard's_p-1\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Factorisation-Pollard's_p-1\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Factorisation-Pollard's_p-1\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Common-Modulus\">Common Modulus Attack<\/a>&#8211; decrypt ciphertext when it&#8217;s corresponding plaintext is encrypted two different times with the same modulus <code>n<\/code><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Common-Modulus\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Common-Modulus\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Common-Modulus\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Common-Prime\">Common Prime Attack<\/a>&#8211; retrieve factors of moduli <code>n1<\/code> and <code>n2<\/code> when they have a common factor<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Common-Prime\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Common-Prime\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Wiener\">Wiener&#8217;s Attack<\/a>&#8211; get value of decryption key exponent <code>d<\/code> when d &lt; N<sup>0.25<\/sup><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Wiener\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Wiener\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Wiener\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Wiener-variant\">Wiener&#8217;s Attack Variant<\/a>&#8211; get value of decryption key exponent <code>d<\/code> when <code>d<\/code> is a few bits greater than N<sup>0.25<\/sup> or d &lt; N<sup>0.25<\/sup><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Wiener-variant\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Wiener-variant\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Wiener-variant\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Coppersmith\">Coppersmith&#8217;s Attack<\/a>&#8211; coppersmith&#8217;s theorem, attack on stereotyped messages and factoring <code>n<\/code> with high bits known<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Coppersmith\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Coppersmith\/exploit.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Coppersmith\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Franklin-Reiter\">Franklin Reiter Related Message Attack<\/a>&#8211; attack to retrieve related messages encrypted using the same modulus<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Franklin-Reiter\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Franklin-Reiter\/exploit.sage\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Franklin-Reiter\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Hastad-Broadcast\">Hastad&#8217;s Broadcast Attack- with extension<\/a>&#8211; attack to retrieve a message broadcasted among different people, encrypted using same exponent but different moduli<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Hastad-Broadcast\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Attack-Hastad-Broadcast\/exploit.py\">[link]- script needs to be fixed<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Attack-Hastad-Broadcast\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/PKCS1-v1.5-Padded-RSA\">PKCS1-v1.5-Padded-RSA-Encryption\/Decryption<\/a>&#8211; ASN1 encoding, padded RSA encryption (needs to be fixed)<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Intro-Challenges\">Intro-RSA-Challenges<\/a>&#8211; basic challenges in RSA related to Number Theory<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/RSA-encryption\/Intro-Challenges\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/RSA-encryption\/Intro-Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-3-message-authentication-codes-macs\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#3-message-authentication-codes-macs\" aria-hidden=\"true\"><\/a><strong>3. Message Authentication Codes (MACs)<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Message-Authentication-Code\">Message Authentication Code<\/a>&#8211; internals and security analysis of MACs<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Message-Authentication-Code\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Message-Authentication-Code\/CBC-MAC-Forgery\">CBC MAC Forgery<\/a>&#8211; generating two message <code>M1<\/code> and <code>M2<\/code> having the same CBC-MAC authentication tag<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Message-Authentication-Code\/CBC-MAC-Forgery\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Message-Authentication-Code\/CBC-MAC-Forgery\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Message-Authentication-Code\/Attack-Length-Extension-CBC-MAC\">Length Extension Attack on CBC-MAC<\/a>&#8211; generate a valid authentication tag of message M1 || M2 (concatenation) given MAC(M1)<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Message-Authentication-Code\/Attack-Length-Extension-CBC-MAC\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Message-Authentication-Code\/Attack-Length-Extension-CBC-MAC\/CBC-Length-Extension.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-4-discrete-logarithm-problem\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#4-discrete-logarithm-problem\" aria-hidden=\"true\"><\/a><strong>4. Discrete Logarithm Problem<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Discrete-Logarithm-Problem\">DLP<\/a>&#8211; cyclic groups, discrete logarithm problem, Baby-Step-Giant-Step algorithm<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Discrete-Logarithm-Problem\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Discrete-Logarithm-Problem\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Discrete-Logarithm-Problem\/Elliptic-Curve-DLP\">Elliptic Curve DLP<\/a>&#8211; defining identity element, inverse of a point, cyclic groups over points on an EC, Hasse&#8217;s theorem, ECDLP<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Discrete-Logarithm-Problem\/Elliptic-Curve-DLP\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-5-elgamal-encryption\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#5-elgamal-encryption\" aria-hidden=\"true\"><\/a><strong>5. ElGamal Encryption<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Elgamal-Encryption\">ElGamal Cryptosystem- Encryption\/Decryption<\/a>&#8211; key generation, encryption, decryption in ElGamal Cryptosystem<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Elgamal-Encryption\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Elgamal-Encryption\/example.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Elgamal-Encryption\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-6-authenticated-encryption-ae\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#6-authenticated-encryption-ae\" aria-hidden=\"true\"><\/a><strong>6. Authenticated Encryption (AE)<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption\">AE basics &amp; internals<\/a>&#8211; working of authenticated encryption<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Authenticated-Encryption\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption\/AE-with-MACs\">AE with MACs<\/a>&#8211; different techniques of implementing AE with MACs: Encrypt and MAC, MAC then encrypt and encrypt then MAC<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption#authenticated-encryption-using-macs\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption#authenticated-ciphers\">Authenticated Ciphers<\/a><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption#authenticated-ciphers\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption#authenticated-encryption-with-associated-data-aead\">AE with Associated Data<\/a><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption#authenticated-encryption-with-associated-data-aead\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption\/AES-GCM\">AES-GCM<\/a>&#8211; encryption in AES-GCM, Wegman-Carter MAC<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Authenticated-Encryption\/AES-GCM\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Authenticated-Encryption\/AES-GCM\/AES-GCM-implementation.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption\/AES-GCM\/Attack-Forbidden\">Forbidden Attack on AES-GCM<\/a>&#8211; attack on AES-GCM due to nonce-reuse<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Authenticated-Encryption\/AES-GCM\/Attack-Forbidden\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Authenticated-Encryption\/AES-GCM\/Attack-Forbidden\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-7-elliptic-curves\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#7-elliptic-curves\" aria-hidden=\"true\"><\/a><strong>7. Elliptic Curves<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Elliptic-Curves\">Elliptic Curve Internals<\/a>&#8211; defining Elliptic Curves, point addition, point doubling and scalar multiplication<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Elliptic-Curves\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"user-content-8-digital-signatures\" class=\"anchor\" href=\"https:\/\/github.com\/ashutosh1206\/Crypton#8-digital-signatures\" aria-hidden=\"true\"><\/a><strong>8. Digital Signatures<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<th>S.No.<\/th>\n<th style=\"text-align: center;\" align=\"center\">Topic<\/th>\n<th align=\"center\">Explanation<\/th>\n<th align=\"center\">Impl.\/Exploit<\/th>\n<th align=\"center\">Challenge#<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/ElGamal-Signatures\">ElGamal Signatures<\/a>&#8211; key generation, signature generation, signature verification and correctness of ElGamal Signature scheme<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/ElGamal-Signatures\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/ElGamal-Signatures\/example.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/ElGamal-Signatures\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/Elliptic-Curve-DSA\">Elliptic Curve DSA<\/a>&#8211; signature generation, signature verification and correctness of signature algorithm<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/Elliptic-Curve-DSA\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/Elliptic-Curve-DSA\/Attack-k-reuse\">Attack k-reuse ECDSA<\/a>&#8211; forging of ECDSA signatures due to reuse of <code>k<\/code><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/Elliptic-Curve-DSA\/Attack-k-reuse\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/Unpadded-RSA-Digital-Signatures\">Unpadded RSA Digital Signatures<\/a>&#8211; signature generation and verification in RSA digital signature scheme<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/Unpadded-RSA-Digital-Signatures\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/Unpadded-RSA-Digital-Signatures\/example.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/PKCS%231-v1.5-Padded-RSA-Digital-Signature\">PKCS1-v1.5 padded RSA Digital Signatures<\/a><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/PKCS%231-v1.5-Padded-RSA-Digital-Signature\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/PKCS%231-v1.5-Padded-RSA-Digital-Signature\/example.py\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" disabled=\"disabled\" type=\"checkbox\" \/><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td align=\"center\"><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/Attack-e%3D3-Bleichenbacher\">e=3 Bleichenbacher&#8217;s Attack<\/a><\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/blob\/master\/Digital-Signatures\/Attack-e%3D3-Bleichenbacher\/README.md\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Matasano-Crypto-Challenges\/tree\/master\/set6\/p42\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<td align=\"center\">\n<ul class=\"contains-task-list\">\n<li class=\"task-list-item\"><input id=\"\" class=\"task-list-item-checkbox\" checked=\"checked\" disabled=\"disabled\" type=\"checkbox\" \/> <a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\/tree\/master\/Digital-Signatures\/Attack-e%3D3-Bleichenbacher\/Challenges\">[link]<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>F<span class=\"SDZsVb\" tabindex=\"0\" role=\"link\" data-term-for-update=\"fuss\" data-ved=\"2ahUKEwjFqLKNrJDdAhXLwI8KHe2sCaUQ_SowAHoECAYQCA\">uss<\/span><\/strong><\/h2>\n<ul>\n<li><strong>RSA Encryption<\/strong>\n<ul>\n<li>Chosen Ciphertext Attack on RSA Cryptosystem- Byte by Byte decryption<\/li>\n<li>Padding Oracle Attack on PKCS1 padded RSA encryption systemat<\/li>\n<li>Fermat&#8217;s Factorisation\n<ul>\n<li>Sieve Improvement<\/li>\n<\/ul>\n<\/li>\n<li>Coppersmith&#8217;s Attack\n<ul>\n<li>Boneh Durfee Attack<\/li>\n<\/ul>\n<\/li>\n<li>Hastad&#8217;s Broadcast Attack\n<ul>\n<li>Implementation of HBA on padded messages<\/li>\n<\/ul>\n<\/li>\n<li>PKCS1-v1.5 Padded RSA encryption<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong>Crypton Disclaimer<\/strong><\/h2>\n<p>The author in no way guarantees that the code is secure. The library is only meant for educational purposes and the code should not be used for implementing in real world. All the example scripts in the library are <em>trivial<\/em> implementations.<\/p>\n<p><a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><strong>Credit : Ashutosh Ahelleya<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented with example challenges from &#8220;Capture [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[697,845,1050,1052,1475],"class_list":["post-2440","post","type-post","status-publish","format-standard","hentry","category-kali","tag-crypton","tag-digital-signatures","tag-encryption","tag-encryption-systems","tag-hashing-algorithms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm<\/title>\n<meta name=\"description\" content=\"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/crypton\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm\" \/>\n<meta property=\"og:description\" content=\"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/crypton\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-02T12:43:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Crypton &#8211; Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms\",\"datePublished\":\"2018-09-02T12:43:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/\"},\"wordCount\":1054,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\",\"keywords\":[\"Crypton\",\"Digital Signatures\",\"Encryption\",\"Encryption Systems\",\"Hashing Algorithms\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/crypton\/\",\"name\":\"Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\",\"datePublished\":\"2018-09-02T12:43:52+00:00\",\"description\":\"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/crypton\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm","description":"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/crypton\/","og_locale":"en_US","og_type":"article","og_title":"Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm","og_description":"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation","og_url":"https:\/\/kalilinuxtutorials.com\/crypton\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-09-02T12:43:52+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/crypton\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/crypton\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Crypton &#8211; Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms","datePublished":"2018-09-02T12:43:52+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/crypton\/"},"wordCount":1054,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png","keywords":["Crypton","Digital Signatures","Encryption","Encryption Systems","Hashing Algorithms"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/crypton\/","url":"https:\/\/kalilinuxtutorials.com\/crypton\/","name":"Crypton-Attacks Encryption Systems, Digital Signatures, Hashing Algorithm","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png","datePublished":"2018-09-02T12:43:52+00:00","description":"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/crypton\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/crypton\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2461,"url":"https:\/\/kalilinuxtutorials.com\/spykeyboard-keylogger-sends-data-gmail\/","url_meta":{"origin":2440,"position":0},"title":"Spykeyboard &#8211; Keylogger Which Sends Us The Data To Our Gmail","author":"R K","date":"September 3, 2018","format":false,"excerpt":"Spykeyboard is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Screen1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Screen1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Screen1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Screen1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Screen1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2480,"url":"https:\/\/kalilinuxtutorials.com\/darling-mac-os-linux\/","url_meta":{"origin":2440,"position":1},"title":"Darling &#8211; Darwin\/Mac OS Emulation Layer For Linux","author":"R K","date":"September 4, 2018","format":false,"excerpt":"Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git submodules, so a plain clone will not do. git clone --recurse-submodules https:\/\/github.com\/darlinghq\/darling.git Updating sources: git pull git submodule init git submodule update Prefixes Darling\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/darling.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1223,"url":"https:\/\/kalilinuxtutorials.com\/libsodium\/","url_meta":{"origin":2440,"position":2},"title":"Libsodium &#8211; Easy To Use Software Library","author":"R K","date":"May 8, 2018","format":false,"excerpt":"Libsodium is a modern, portable, easy to use crypto library.\u00a0Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":37407,"url":"https:\/\/kalilinuxtutorials.com\/cybersecurity\/","url_meta":{"origin":2440,"position":3},"title":"Cybersecurity &#8211; Tools And Their Function","author":"Varshini","date":"March 31, 2025","format":false,"excerpt":"Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious threats. These tools are designed to address specific security challenges, ranging from monitoring network activity to identifying vulnerabilities. Below is an overview of key cybersecurity tools and their functions: 1. Network Security Monitoring Tools These\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Cybersecurity-Content.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":25799,"url":"https:\/\/kalilinuxtutorials.com\/introduction-to-cryptography\/","url_meta":{"origin":2440,"position":4},"title":"Introduction to Cryptography","author":"Kaladmin","date":"June 10, 2022","format":false,"excerpt":"What is Cryptography? A closer look at the etymology of the word \"cypher\" reveals that the word originated in ancient Greek. The word Kryptos, which means \"hidden\" or \"secret,\" and the code derived from the word \"write\" literally means writing something secret. Simply put, encryption provides a secure method of\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg06kWqE3HFaGelKSMUCQFEDwz9MqRVuH20-hO145KXaLC0o_3Ejdpw71S9dneTg2xCtPdY2R-3StJFBW7n3nujKxTD6G-xvg_LRCRUfxd729MpHC93LKVf17fzpdLcciI256zvLYrHvLwIrCCocxJaJeAh-8wAa5yV_mhOl3-iAc_ynGlQofAjfeIw4g\/s16000\/SNSO.PNG?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg06kWqE3HFaGelKSMUCQFEDwz9MqRVuH20-hO145KXaLC0o_3Ejdpw71S9dneTg2xCtPdY2R-3StJFBW7n3nujKxTD6G-xvg_LRCRUfxd729MpHC93LKVf17fzpdLcciI256zvLYrHvLwIrCCocxJaJeAh-8wAa5yV_mhOl3-iAc_ynGlQofAjfeIw4g\/s16000\/SNSO.PNG?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg06kWqE3HFaGelKSMUCQFEDwz9MqRVuH20-hO145KXaLC0o_3Ejdpw71S9dneTg2xCtPdY2R-3StJFBW7n3nujKxTD6G-xvg_LRCRUfxd729MpHC93LKVf17fzpdLcciI256zvLYrHvLwIrCCocxJaJeAh-8wAa5yV_mhOl3-iAc_ynGlQofAjfeIw4g\/s16000\/SNSO.PNG?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg06kWqE3HFaGelKSMUCQFEDwz9MqRVuH20-hO145KXaLC0o_3Ejdpw71S9dneTg2xCtPdY2R-3StJFBW7n3nujKxTD6G-xvg_LRCRUfxd729MpHC93LKVf17fzpdLcciI256zvLYrHvLwIrCCocxJaJeAh-8wAa5yV_mhOl3-iAc_ynGlQofAjfeIw4g\/s16000\/SNSO.PNG?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35689,"url":"https:\/\/kalilinuxtutorials.com\/litterbox\/","url_meta":{"origin":2440,"position":5},"title":"LitterBox : The Ultimate Sandbox Environment For Malware Testing And Red Team Operations","author":"Varshini","date":"January 13, 2025","format":false,"excerpt":"Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox environment designed specifically for malware development and payload testing. This Web Application enables red teamers to validate evasion techniques, assess detection signatures, and test implant behavior before deployment in the field. Think of it as\u2026","rel":"","context":"In &quot;Malware&quot;","block_context":{"text":"Malware","link":"https:\/\/kalilinuxtutorials.com\/category\/malware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LitterBox-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=2440"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2440\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=2440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=2440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=2440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}