-
In the CSI spec today, all secrets are stored on the CO side, and sent to the SP side at appropriate times. This covers use cases where the secrets are administrator-created (such as login credentials…
-
![dream_TradingCard (15)](https://github.com/prosyslab-classroom/cs348-information-security/assets/126472555/e7d1d9bb-15fc-459f-815b-317d98fedc58)
## Name: Jihwan Park
## Short Description
…
-
Counter values in Counter modes must not repeat when using the same block cipher key. Otherwise, the attacker can get some information about the underlying plaintext.
One scenario where counters can …
-
Both modes work indeed as stated by the NIST. Adding a counter mode would be _awesome_ since CBC can stil be used in BEAST and ECB is vulnerable to plaintext attacks.
-
Any application that deals with critically private information has this obvious feature of preventing application's state from being stored on disk, like during hibernation, suspension, sudden shutdow…
-
The [signature scheme](https://github.com/covert-encryption/covert/blob/a69437b24c391fe14e355501828c6e41ddb19b32/docs/Specification.md#signatures) (which is based on signing the Poly1305 tags) is brok…
-
Currently, whether we want the messages to be signed/authenticated or instead repudiable is not well specified or understood.
In the specification, we define the message `m` to be encrypted using s…
-
# Abstract
In recent years, the application of machine learning and deep learning to classical cryptanalysis is an active research field.
In this project, we perform quantum cryptanalysis that combi…
-
Hi.
I'm not sure if you're aware of this, but ZIP archive encryption is, well, shite. It suffers from the _known plaintext attack_.
**TL;DR:** Any TNoodle-generated password-protected zip file can be…
-
I have found this video about a Mailvelope security issue: https://www.youtube.com/watch?v=NnHOYSRrqS4
In there an attacker can get the private keys of Mailvelope, through a browser exploit, and be…