Skip to content

Attack on CBC block mode with PKCS#5 padding, exploiting cryptographic vulnerabilities and recovering plaintext data.

Notifications You must be signed in to change notification settings

mabushelbaia/Padding-Oracle-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Padding Oracle Attack

🔗 | Lab Description
🔗 | Lab Report

docs/tty.gif

Project Structure

.
├── docs
│  ├── LaTeX
│  │  ├── assets
│  │  │  ├── d_diagram.png
│  │  │  ├── task1.png
│  │  │  ├── task2.png
│  │  │  ├── task3.1.png
│  │  │  ├── task3.2.png
│  │  │  └── task3.3.png
│  │  ├── cite.bib
│  │  ├── ieee.cls
│  │  ├── lix.sty
│  │  └── main.tex
│  ├── LAB.pdf
│  ├── Padding_Oracle_Attack.pdf
│  └── tty.gif
├── docker-compose.yml
├── Makefile
├── main.py
└── README.md

Installation and Running

clone the project using the following command:

git clone https://github.com/mabushelbaia/Padding-Oracle-Attack.git
cd Padding-Oracle-Attack

Task 1:

make: default run with 5, 10, 16 bytes.
make bytes n=i: where i is the number of bytes.

Task 2:

Skip this part its useless

Task 3:

build and run the docker container make sure you have docker-compose installed sudo apt install docker-compose

docker-compose build
docker-compise up -d  #d for detched

Then you can run the script to decrypt the secret message.

python3 main.py

About

Attack on CBC block mode with PKCS#5 padding, exploiting cryptographic vulnerabilities and recovering plaintext data.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages