Processing math: 100%

The Book of Gehn

I found 7 posts.


Follow up: Length Extension Attack on SHA-224

Tags: cryptography, matasano, cryptonita, hash, extension

April 9, 2023

In the previous post we reviewed why and how an extension length attack is possible on some hash function and how we can use it to break a prefix-keyed MAC.

Long story short: when the full internal state of the hashing is exposed, an extension attack is possibly.

So hash functions that don’t expose their internal state are okay, right?

Yes in general but the devil is in the details

SHA-224 does not expose its full state and it is one of those “safe” hash functions (sometimes it is found in the literature as such) but…

In this quick post we will see why SHA-224 is vulnerable to length extension attack even if its internal state is not fully exposed.


Keyed Hash Length Extension Attack

Tags: cryptography, matasano, cryptonita, hash, extension

April 5, 2023

How can we know if a message is authentic or not?

A trusted party with access to a private key k can compute an authentication code or MAC.

Compute the message authentication code (MAC) doing H(k ∥ m).

In theory only who knows the secret key k can create and verify those, but no, this schema es broken.

This post covers matasano challenges from 28 to 30 so spoiler alert.

A keyed hash prefixes the message with the key k and computes a hash like SHA-1. The resulting hash is the MAC for the given message.

Then, someone that knows also k can verify if a message is authentic or not computing the MAC and comparing it with the one provided with the message.

If the computed hash matches the one provided, the message is authentic, otherwise it is not.

Unfortunately this prefix-keyed hash for MAC is broken.

Some very well known hash functions expose their internal states that allows an adversary to append data to the message and continue the hash computation and generate a new valid MAC.

Hence the name “length extension attack”.


CTR Edit/Inject Plaintext Attacks

Tags: cryptography, matasano, cryptonita, CTR, counter, forgery

May 8, 2019

A CTR-mode cipher turns a block cipher into a stream cipher.

With this, a ciphertext can be edited in place generating enough of the key stream, decrypting and re-encrypting the edited portion.

– Spoiler Alert! –

One can replace part of the plaintext, extend it or even reduce it.

But this beautiful property of a CTR mode (and any other stream cipher) is actually a booby-trap.


Affine Cipher

Tags: cryptography, cryptonita, affine, differential attack

March 20, 2019

A linear cipher like the Hill Cipher is vulnerable to a known plaintext attack: just resolve a set of linear equations and get the secret key.

An affine cipher is a little harder to break, however it could be vulnerable to a differential attack.


Break Hill Cipher with a Known Plaintext Attack

Tags: cryptography, cryptonita, hill cipher

January 2, 2019

Given a matrix secret key K with shape n\textrm{x}n, the Hill cipher splits the plaintext into blocks of length n and for each block, computes the ciphertext block doing a linear transformation in module m

K p_i = c_i\quad(\textrm{mod } m)

For decrypting, we apply the inverse of K

p_i = [K]^{-1} c_i \quad(\textrm{mod } m)

To make sense, the secret key K must be chosen such as its inverse exists in module m.

Ready to break it?


Fixed Nonce CTR Attack

Tags: cryptography, matasano, cryptonita, CTR, counter nonce, PRG, chi-square, undistinguishable

December 4, 2018

The Counter mode, or just CTR mode, turns a block cipher into a stream cipher.

More specifically, it builds a pseudo random generator (PRG) from a block cipher and then generates a random string using the PRG to encrypt/decrypt the payload performing a simple xor.

The idea is to initialize the PRG with a different seed each time but if this does not happen, all the plaintexts will be encrypted with the same pseudo random key stream – totally insecure.

– Spoiler Alert! –

Ready to break it?


CBC Padding Oracle Attack

Tags: cryptography, matasano, cryptonita, CBC, cipher block chaining, padding oracle

October 28, 2018

AES and other ciphers work on blocks; if the plaintext length is not multiple of the block size a padding is added.

If during the decryption the pad is checked and returns an error, we can use this to build a padding oracle: a function that will tell us if an encrypted plaintext has a valid pad or not.

It may not sound too much exiting but armed with this padding oracle we can break CBC one byte at time.

– Spoiler Alert! –

Ready? Go!

- Martin Di Paola