## Cracking Encryption (Just a bit of fun)[Back] This page outlines some methods used to crack encryption, and is meant as a bit of fun, while outlining some of the weaknesses involved in RSA and private key encryption. On this page, Eve the Magician will perform some magic. ## PresentationHere Eve presents the magic tricks: With this crack on RSA, we get Bob to encrypt the same message with a slightly modified encryption key.
Fun article: here ## RSA Crack (Factorizing N)In RSA, we create (e,n), where N is created from N=pxq, where p and q are prime numbers. If we can factorise N then we crack RSA, as we can easily generate d.
Fun article: here ## RSA Crack (M^e less than N)In RSA, we can crack the method if the value of \(M^e\) is less than N (where N is \(p \times q\)):
Fun article: here ## RSA Crack (Chinese Remainder Theory)RSA can be cracked if the intruder records enough cipher text messages which use the same e value. We will take three N values (modulus) and a message, and create three cipher messages.
Fun article: here ## RSA Crack (Homomorphic property)With RSA we can multiply two cipher values together and the decrypted result with be the two values multiplied together.
Fun article: here ## AES Crack (Copy-and-paste)AES can be susceptible to a copy-and-paste attack if ECB (Electronic Code Book) is used. Enter a passphrase (to generate a key) and a secret word. THe secret word will then be ciphered with each character, and Eve can rebuild to provide a valid ciphertext string.
Fun article: here ## AES Crack (Brute force)AES can be susceptible to brute force when the encryption keys are generated by a password. In this case we cause an exception for an incorrect encryption key (or we create one which does not have plain text in the decrypted value.
Fun article: here ## Commutative encryption (SRA)If we select the same modulus (N) with RSA, it doesn't matter the order we decrypt.
Fun article: here ## Diffie-Hellman Man-in-the-middleEve becomes the man-in-the-middle for a Diffie-Hellman key exchange.
Fun article: here ## RSA - chosen cipher attackEve cracks RSA with a chosen cipher attack.
Fun article: here ## AES Crack (Determistic random numbers)Eve cracks as she knows Bob's random numbers for the key generation.
Fun article: here ## Eve cracks RSA with partial knowledgeEve cracks as she can search for p value which matches with q.
Fun article: here ## Eve The Magician Tricks A Server And Cracks An Uncrackable TunnelEve cracks using Bleichenbacher's attack.
Fun article: here ## Additional tricksHere is the Commutative encryption trick: Here is the tunnel trick: Here is the chosen cipher attack trick: Here is the Bleichenbacher's attack: |