I honestly just wanted to test the emojis 😈 :bowtie: 💜

This commit is contained in:
Mari Wahl 2015-01-08 20:38:05 -05:00
parent 85fa8069ca
commit 6eec870dd5

View File

@ -88,7 +88,7 @@ for a, b, c, d, e, f in itertools.product(ch, ch, ch, ch, ch, ch):
- [Vigenere Cipher breaker](http://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx) and [here](http://smurfoncrack.com/pygenere/index.php).
### In the command line
### In the terminal...
```sh
$ VAR=$(cat data.txt)
@ -96,7 +96,7 @@ $ echo "$VAR"
$ alias rot13="tr A-Za-z N-ZA-Mn-za-m"
$ echo "$VAR" | rot13
```
### In Python
### In Python...
In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#codec-base-classes):
@ -180,7 +180,7 @@ babaaaabaaababaababaaaabbabbababbaaaabaaaabbbaabaabaaaaaabaaabaaabaaabaaabbaabaa
#### [Base64]:
Base64 is a non-readable encoding that encodes arbritary 8-bit input using 6-bit alphabet of case sensitive alphanumerics, "+", "/". Every 3 bytes of input map to 4 bytes of output. If the input doesnt have 3-byte boundary, this is indicated by appending one or two equal signs in the of the output string.
Base64 is a non-readable encoding that encodes arbitrary 8-bit input using 6-bit alphabet of case sensitive alphanumerics, "+", "/". Every 3 bytes of input map to 4 bytes of output. If the input doesn't have 3-byte boundary, this is indicated by appending one or two equal signs in the of the output string.
- [Base64 Decoder](http://www.base64decode.org)
@ -277,7 +277,7 @@ $ ./openssl s_client --no_tls1 --no_ssl3 --connect <WEBSITE>:443
* Electronic code book (ECB) mode.
* Simplest and default block cipher mode.
* Message is split into blocks and each is encrypted separately.
* Disavantage: identical plaintext block encrypts to identical cipher text block (for example, figures).
* Disadvantage: identical plaintext block encrypts to identical cipher text block (for example, figures).
### Attacking Randomness
@ -292,7 +292,7 @@ $ ./openssl s_client --no_tls1 --no_ssl3 --connect <WEBSITE>:443
* Seed race condition attacks:
- System clock often used to seed PRNG
- Submit 10's or 100's of rquests at a time. Seed a PRNG with the same system clock and the output will be the same.
- Submit 10's or 100's of requests at a time. Seed a PRNG with the same system clock and the output will be the same.