Diffie-Helman Key Exchange (PicoCTF 2022 #32 'diffie-helman')

  Рет қаралды 22,347

John Hammond

John Hammond

Күн бұрын

Пікірлер
@pike4978
@pike4978 2 жыл бұрын
I'm taking a cryptography class right now so this was fun for me. I actually decided to crack the message with pen and paper to test what I've learned, only took about 10 minutes. One thing I've learned about cybersecurity is that adversaries won't necessarily approach your security in the same way you designed it. In the case of a DH with p=13, there are only 12 possible shift values that Alice and Bob could have landed on. So if you wanted to approach this like a hacker then trying to decrypt their message through brute force would make it a lot easier.
@Lodinn
@Lodinn 2 жыл бұрын
If you wanted to approach it like a hacker, you wouldn't care about the shift value at all. Brute forcing 13 values is no different from brute forcing 35.
@OfficialSlippedHalo
@OfficialSlippedHalo 2 жыл бұрын
Just following along casually, reached the stuck part and I want to just write down my guess on the issue before he solves it: Im guessing the fault is that the cypher is relying on a single alphanumeric alphabet with a shift of 5, rather than separate alphabets for ascii and digits, i.e Z shifts to 0, 9 shifts to A etc Edit: feels nice that i was on the right track
@passerby184
@passerby184 2 жыл бұрын
this kinda feels like it'd be faster to broteforce Ciser ciper
@ecjb1969
@ecjb1969 2 жыл бұрын
If the rotation is letters and numbers, the rotation space is 26 + 10 or 36. Rotating by -5 would then be 31 I think. Maybe use ABC…Z01…9 or something similar to wrap around, not just A-Z 0-9?
@Lodinn
@Lodinn 2 жыл бұрын
That's what half of this video was spent on. Apparently for modern people rotating 26 and 10 separately is more intuitive than lumping them together :)
@allurbase
@allurbase 2 жыл бұрын
@seanvinsick
@seanvinsick 2 жыл бұрын
A deque (deck) is a double ended queue. You can search, push and pop from both sides.
@poprivest4715
@poprivest4715 2 жыл бұрын
Paused it at around 23:00 and did it by hand and quickly realized how the numbers were integrated to the rotation ;) (...X,Y,Z,1,...,9,A,B,C...)
@bladesvlogs4965
@bladesvlogs4965 2 жыл бұрын
So they ended up being 1 long string and shifted across? 👍 Glad it was you working it out 😂
@franckchiron9848
@franckchiron9848 2 жыл бұрын
Took me an awful lot of time to get that one. You shouldn't feel bad, though : I think it's kind of a tunnel effect. We are so used to work on alphabet and digits separately at ASCII level that considering them as a whole is counter-intuitive. I guess that was a good one to help up keep our brain elasticity :)
@Lodinn
@Lodinn 2 жыл бұрын
Funny how modern cryptography experts get puzzled by what people did historically ;)
@MorningStarChrist
@MorningStarChrist 2 жыл бұрын
You may be able to find the answer using letter frequency analysis. and some leetspeech permutations
@lordspacecake5565
@lordspacecake5565 2 жыл бұрын
Very informative video
@FunkadelicFeed
@FunkadelicFeed 2 жыл бұрын
Why can't I find this? After “buffer-overflow1" it shows “forbidden paths" as the next challenge for me :/
@verolyn8459
@verolyn8459 2 жыл бұрын
I literally did what you do when decrypting it.
@tylercoombs1
@tylercoombs1 2 жыл бұрын
Cyber Chef is a good place to tinker with encryption
@Joel-gf4zl
@Joel-gf4zl 2 жыл бұрын
Exactly what I was going to suggest. Cyber Chef is great.
@mahkhi7154
@mahkhi7154 2 жыл бұрын
Windows Mobile uses the Edge browser which uses Webkit/Blink.
@JackTheDev
@JackTheDev 2 жыл бұрын
i was just saying, no, no, when i saw only letters and no numbers in the shift :(
@mohamadyakteen8710
@mohamadyakteen8710 Жыл бұрын
At 9:40 , if you continued scrolling down to ROT31 you would have found the correct Flag...
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
How to management which one project
@adityavsx
@adityavsx 2 жыл бұрын
Smartie
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Other examples rock ,sys admin moor explain deep class
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Scissor cyber also in farming in the class what the video
@sandeepd6104
@sandeepd6104 2 жыл бұрын
Can you please make a video on RSA decryption with python
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Terminal open how to open
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
How to dissolution in the 🗝️
@mahkhi7154
@mahkhi7154 2 жыл бұрын
Android uses Chrome which uses Webkit/Blink.
@ShootingUtah
@ShootingUtah 2 жыл бұрын
Pretty sure they intended you to use a reference alphabet of a-z1-9 all as one. I haven't worked the problem personally but that's my idea while watching you struggle.
@flyingtiger123
@flyingtiger123 Жыл бұрын
the challenge has disappeared!!: (
@Noobiie23
@Noobiie23 2 жыл бұрын
Hey I just learned about DH on CBTnuggets
@ac1d8urn
@ac1d8urn 2 жыл бұрын
Literally shouting at the screen for 10 minutes ;-)
@mahkhi7154
@mahkhi7154 2 жыл бұрын
The Reason the PS5 Hack worked is because the Playstation Engineers thought We couldn't Unravel their Operating system Encryption. If they thought we Could Unravel their Operating System Encryption, then they would have Blocked the Webkit Exploit. That would have made Chrome Slower and not Work on Low Powered smartphones. The Windows / Internet explorer Guys gained More of Our Windows Architecture. Internet Explorer is Faster cause of this. Chrome is Faster because of the Unchecked buffer overflow vulnerability. If they Closed that Vulnerability, Chrome would have gone slower than Internet Explorer and Not work on low end Phones. They didn't Close the hole as they Thought We Couldn't Unravel their Operating System Encryption.
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Video rept explain. Cvr
@Colaholiker
@Colaholiker 2 жыл бұрын
Thumbs down for not using an f-string in the end! :-P (Just kidding, I would never do that)
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Password 🔑
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
Repeating repeating coming for you videos
@vdk996
@vdk996 2 жыл бұрын
WTF?????? are u a human ?
@MikeDSutton
@MikeDSutton 2 жыл бұрын
translate is your friend: key = string.ascii_uppercase + string.digits message = "H98A9W_H6UM8W_6A_9_D6C_5ZCI9C8I_D9FF6IFD" print(message.translate(string.maketrans(key, key[-5:] + key[:-5])))
@thepriyank121
@thepriyank121 Жыл бұрын
Really got an Idea need more learning i guess you are good in trouble shooting
Vigenere Cipher Cryptography (PicoCTF 2022 #29 'vigenere')
25:48
John Hammond
Рет қаралды 18 М.
Diffie-Hellman Key Exchange: How to Share a Secret
9:09
Spanning Tree
Рет қаралды 167 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Spying on Scammers
22:26
John Hammond
Рет қаралды 44 М.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Рет қаралды 988 М.
Format String printf Vulnerabilities (PicoCTF 2022 #46 'flag-leak')
19:44
Deobfuscating Python Code (PicoCTF 2022 #30 'bloat.py')
10:19
John Hammond
Рет қаралды 66 М.
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН