Cracking Encryption (Just a bit of fun)This page outlines some methods used to crack encryption, and is meant as a bit of fun, while outlining some of the weaknesses involved in RSA and private key encryption. On this page, Eve the Magician will perform some magic. PresentationHere Eve presents the magic tricks: With this crack on RSA, we get Bob to encrypt the same message with a slightly modified encryption key. RSA Crack (same message). RSA. This outlines the same message being encrypted with a modified e value. Fun article: here RSA Crack (Factorizing N)In RSA, we create (e,n), where N is created from N=pxq, where p and q are prime numbers. If we can factorise N then we crack RSA, as we can easily generate d. RSA Crack (factorization). RSA. This outlines the factorisation of the N value in the RSA method. Fun article: here RSA Crack (M^e less than N)In RSA, we can crack the method if the value of \(M^e\) is less than N (where N is \(p \times q\)): RSA Crack 2 (low e value). RSA. This outlines of the cracking of RSA when \(M^e\) is less than N. Fun article: here RSA Crack (Chinese Remainder Theory)RSA can be cracked if the intruder records enough cipher text messages which use the same e value. We will take three N values (modulus) and a message, and create three cipher messages. RSA Crack 3 (CRT). RSA. This outlines of the cracking of RSA with Chinese Remainder Theorem. Fun article: here RSA Crack (Homomorphic property)With RSA we can multiply two cipher values together and the decrypted result with be the two values multiplied together. RSA partially homomorphic cryptosystem. RSA. This outlines of the cracking of RSA using partially homomorphic property. Fun article: here AES Crack (Copy-and-paste)AES can be susceptible to a copy-and-paste attack if ECB (Electronic Code Book) is used. Enter a passphrase (to generate a key) and a secret word. THe secret word will then be ciphered with each character, and Eve can rebuild to provide a valid ciphertext string. AES Crack (Copy-and-paste). RSA. This outlines of the cracking of AES with copy-and-paste attacks. Fun article: here AES Crack (Brute force)AES can be susceptible to brute force when the encryption keys are generated by a password. In this case we cause an exception for an incorrect encryption key (or we create one which does not have plain text in the decrypted value. AES Crack (Brute force). RSA. This outlines of the cracking of AES with common passwords. Fun article: here Commutative encryption (SRA)If we select the same modulus (N) with RSA, it doesn't matter the order we decrypt. Commutative encryption (SRA). RSA. This outlines Commutative encryption (SRA). Fun article: here Diffie-Hellman Man-in-the-middleEve becomes the man-in-the-middle for a Diffie-Hellman key exchange. Diffie-Hellman (Man-in-the-middle). DH. This outlines the man-in-the-middle attack of Diffie-Hellman. Fun article: here RSA - chosen cipher attackEve cracks RSA with a chosen cipher attack. RSA chosen cipher attack. RSA Crack. This outlines an RSA attack with chosen cipher text Fun article: here AES Crack (Determistic random numbers)Eve cracks as she knows Bob's random numbers for the key generation. AES Crack. AES Crack. This outlines an AES crack related to non-random numbers. Fun article: here Eve cracks RSA with partial knowledgeEve cracks as she can search for p value which matches with q. RSA crack. RSA Crack. This outlines how Eve can guess the prime numbers if she has part of one of them. Fun article: here Eve The Magician Tricks A Server And Cracks An Uncrackable TunnelEve cracks using Bleichenbacher's attack. RSA crack. Eve The Magician Cracks A Tunnel - Bleichenbacher's attack. This outlines how Eve can guess the prime numbers if she has part of one of them. Fun article: here Additional tricksHere is the Commutative encryption trick: Here is the tunnel trick: Here is the chosen cipher attack trick: Here is the Bleichenbacher's attack: |