Submit Search
Upload
Simple crypto
•
0 likes
•
1,696 views
思
思辰 林
Follow
20017 / 10 / 26 Simple crypto @NCTU BambooFox
Read less
Read more
Technology
Report
Share
Report
Share
1 of 42
Download now
Download to read offline
Recommended
Execution
Execution
Angel Boy
Binary exploitation - AIS3
Binary exploitation - AIS3
Angel Boy
Linux binary Exploitation - Basic knowledge
Linux binary Exploitation - Basic knowledge
Angel Boy
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Nullbyte Security Conference
台科逆向簡報
台科逆向簡報
耀德 蔡
ROP 輕鬆談
ROP 輕鬆談
hackstuff
Nat, List and Option Monoids -from scratch -Combining and Folding -an example
Nat, List and Option Monoids -from scratch -Combining and Folding -an example
Philip Schwarz
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
Peter Hlavaty
Recommended
Execution
Execution
Angel Boy
Binary exploitation - AIS3
Binary exploitation - AIS3
Angel Boy
Linux binary Exploitation - Basic knowledge
Linux binary Exploitation - Basic knowledge
Angel Boy
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Windows Internals: fuzzing, hijacking and weaponizing kernel objects
Nullbyte Security Conference
台科逆向簡報
台科逆向簡報
耀德 蔡
ROP 輕鬆談
ROP 輕鬆談
hackstuff
Nat, List and Option Monoids -from scratch -Combining and Folding -an example
Nat, List and Option Monoids -from scratch -Combining and Folding -an example
Philip Schwarz
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
Peter Hlavaty
Format string Attack
Format string Attack
icchy
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
祐司 伊藤
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
MinGeun Park
Klee and angr
Klee and angr
Wei-Bo Chen
DocuSign eSignature API Guide - SOAP
DocuSign eSignature API Guide - SOAP
Mike Borozdin
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CanSecWest
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
Esun Kim
Linux Binary Exploitation - Stack buffer overflow
Linux Binary Exploitation - Stack buffer overflow
Angel Boy
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
T. Suwa
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
Python twisted
Python twisted
Mahendra M
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
Chris Ohk
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
Akka actorを何故使うのか?
Akka actorを何故使うのか?
Nyle Inc.(ナイル株式会社)
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
devCAT Studio, NEXON
Python Virtual Environment.pptx
Python Virtual Environment.pptx
Abdullah al Mamun
Heap exploitation
Heap exploitation
Angel Boy
Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러
Heungsub Lee
MMOG Server-Side 충돌 및 이동처리 설계와 구현
MMOG Server-Side 충돌 및 이동처리 설계와 구현
YEONG-CHEON YOU
Vulkan 1.0 Quick Reference
Vulkan 1.0 Quick Reference
The Khronos Group Inc.
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
More Related Content
What's hot
Format string Attack
Format string Attack
icchy
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
祐司 伊藤
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
MinGeun Park
Klee and angr
Klee and angr
Wei-Bo Chen
DocuSign eSignature API Guide - SOAP
DocuSign eSignature API Guide - SOAP
Mike Borozdin
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CanSecWest
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
Esun Kim
Linux Binary Exploitation - Stack buffer overflow
Linux Binary Exploitation - Stack buffer overflow
Angel Boy
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
T. Suwa
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
Python twisted
Python twisted
Mahendra M
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
Chris Ohk
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
Akka actorを何故使うのか?
Akka actorを何故使うのか?
Nyle Inc.(ナイル株式会社)
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
devCAT Studio, NEXON
Python Virtual Environment.pptx
Python Virtual Environment.pptx
Abdullah al Mamun
Heap exploitation
Heap exploitation
Angel Boy
Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러
Heungsub Lee
MMOG Server-Side 충돌 및 이동처리 설계와 구현
MMOG Server-Side 충돌 및 이동처리 설계와 구현
YEONG-CHEON YOU
Vulkan 1.0 Quick Reference
Vulkan 1.0 Quick Reference
The Khronos Group Inc.
What's hot
(20)
Format string Attack
Format string Attack
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
emscriptenでC/C++プログラムをwebブラウザから使うまでの難所攻略
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
[0119 박민근] 기술 면접시 자주 나오는 문제들(ver 2013)
Klee and angr
Klee and angr
DocuSign eSignature API Guide - SOAP
DocuSign eSignature API Guide - SOAP
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
덤프 파일을 통한 사후 디버깅 실용 테크닉 NDC2012
Linux Binary Exploitation - Stack buffer overflow
Linux Binary Exploitation - Stack buffer overflow
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
静的型つき組版処理システムSATySFi @第61回プログラミング・シンポジウム
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Python twisted
Python twisted
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
고려대학교 컴퓨터학과 특강 - 대학생 때 알았더라면 좋았을 것들
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Akka actorを何故使うのか?
Akka actorを何故使うのか?
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
전형규, SilvervineUE4Lua: UE4에서 Lua 사용하기, NDC2019
Python Virtual Environment.pptx
Python Virtual Environment.pptx
Heap exploitation
Heap exploitation
Profiling - 실시간 대화식 프로파일러
Profiling - 실시간 대화식 프로파일러
MMOG Server-Side 충돌 및 이동처리 설계와 구현
MMOG Server-Side 충돌 및 이동처리 설계와 구현
Vulkan 1.0 Quick Reference
Vulkan 1.0 Quick Reference
Recently uploaded
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Recently uploaded
(20)
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Simple crypto
1.
Simple Crypto ss8651twtw
2.
$ whoami ● 林思辰 ●
資工系大三 ● BambooFox ● ss8651twtw / linsc04 ● ss8651twtw@gmail.com
3.
Outline ● Basis ● Classical
cipher ● eXclusive OR ● Hash ● Rivest Shamir Adleman
4.
Basis
5.
String transform ● ASCII ○
BambooFox ● Hex ○ 0x42616d626f6f466f78 ● Decimal ○ 1224505484489718656888 ● Binary ○ 1000010011000010110110101100010011011110110111101000110011 0111101111000
6.
String transform ● Python ○
'BambooFox'.encode("hex") ○ '42616d626f6f466f78'.decode("hex") ○ int('0x42616d626f6f466f78', 16) ○ int('10000100110000101101101011000100110111101101111010001100110111101111000', 2) ○ hex(1224505484489718656888) ○ bin(1224505484489718656888)
7.
String transform ● Practice ○
https://bamboofox.cs.nctu.edu.tw/admin/courses/4/challenges/73 ○ https://bamboofox.cs.nctu.edu.tw/admin/courses/4/challenges/74 ○ https://bamboofox.cs.nctu.edu.tw/admin/courses/4/challenges/75
8.
Base64
9.
Base64
10.
Base64
11.
● Online tool ○
https://www.base64encode.org/ ○ https://www.base64decode.org/ ● Practice ○ https://bamboofox.cs.nctu.edu.tw/admin/courses/4/challenges/76 Base64
12.
Classical cipher
13.
Caesar cipher
14.
Caesar cipher ● Encrypt ●
Decrypt
15.
Caesar cipher ● Online
tool ○ https://planetcalc.com/1434/
16.
Substitution cipher ● Plaintext ●
Ciphertext ● Random map ● 26! possibility
17.
Substitution cipher 1. Brute
force when secret keys are not too many 2. Use letter frequency analysis when ciphertext is long
18.
Substitution cipher ● Online
tool ○ https://quipqiup.com/
19.
Rail fence ● Plaintext ●
Ciphertext
20.
Rail fence ● Online
tool ○ http://rumkin.com/tools/cipher/railfence.php
21.
JSFuck ● Write javascript
ONLY with [ ] ( ) ! +
22.
JSFuck ● alert(1)
23.
JSFuck ● Online tool ○
http://www.jsfuck.com/
24.
BrainFuck
25.
BrainFuck ● Online tool ○
https://www.splitbrain.org/services/ook
26.
Something interesting
27.
eXclusive OR
28.
XOR ● Plaintext ^
Pattern = Ciphertext ● Ciphertext ^ Pattern = Plaintext
29.
XOR
30.
xortool ● Secret key
is short than message ● The most frequent character ○ file 0x00 ○ text 0x20 ● https://github.com/hellman/xortool
31.
Hash
32.
Hash
33.
Hash collision ● SHA1 ●
https://shattered.it/
34.
Rivest Shamir Adleman
35.
RSA 1. Generate primes
p, q and N = p * q 2. r = (p - 1) * (q - 1) 3. Choose e < r, gcd(e, r) = 1 4. e * d mod r = 1, find d ● Public key = (N, e) ● Private key = (N, d)
36.
RSA ● Encrypt ● Decrypt
37.
Factor ● N is
small ● Fact N to generate p and q ● https://factordb.com/
38.
Other
39.
Random seed
40.
Reference ● https://en.wikipedia.org/wiki/Base64 ● https://en.wikipedia.org/wiki/Caesar_cipher ●
https://en.wikipedia.org/wiki/Letter_frequency ● https://en.wikipedia.org/wiki/Brainfuck ● https://en.wikipedia.org/wiki/XOR_cipher ● https://en.wikipedia.org/wiki/Hash_function ● https://ctf-wiki.github.io/ctf-wiki/crypto/introduction.html ● https://2017game.picoctf.com
41.
Q & A
42.
Thanks for listening
Download now