-
## Issue
In this implementation, some test vectors have wrong inner key padding. This can be seen by looking at the decrypted data before unpadding, or even by inspecting the ciphertext (an example…
-
**Before you open an issue please check which version you are running and whether it is the latest in stable / dev branch**
I am running version testssl.sh 3.0.8 from https://testssl.sh/.
This i…
-
From: https://defuse.ca/audits/encfs.htm
Exploitability: **Unknown**
Security Impact: **High**
As reported in [[1](http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0316.html)], E…
-
Running the test code delivers wrong results.
Basically whatever is passed as plain text, the same cipher is returned.
The cipher changes only on changing the roundKeys.
mcfoi updated
3 weeks ago
-
Hello, to provide more information and details, from #11266, I am opening a new issue to ask why I can't find the explicit IV where I think it should be.
As mentioned in the other issue, according …
-
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf
```
NIST Test-Vektoren CBC-AES256.Encrypt
Key: 603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4
…
-
`gcm.Open` takes a nonce, but it's meant to be the value passed in at `Seal` time, not unique. From https://pkg.go.dev/crypto/cipher#NewGCM:
```go
// ... The nonce must be NonceSize()
//…
-
I get different results since upgrading to 5.0.2. The following test:
```dart
import 'package:encrypt/encrypt.dart';
import 'package:test/test.dart';
String encrypt(String decoded, String pass…
-
Hi! 👋
Firstly, thanks for your work on this project! 🙂
Today I used [patch-package](https://github.com/ds300/patch-package) to patch `cipher-base@1.0.4` for the project I'm working on.
…
-
Link: https://hackerone.com/reports/972043
Date: 2020-09-01 12:02:34 UTC
By: bishop
Weakness: Insufficiently Protected Credentials
Details:
This is awesome.
And we can write multiple …