Skip to content

D1533/crypto-attacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

67 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Crypto Attacks

A collection of cryptographic attack implementations and proofs-of-concept in SageMath and Python.

Requirements

  • SageMath, Python 3
  • PyCryptodome

Structure and Contents

AES Attacks

Diffie-Hellman Attacks

Elliptic Curve Attacks

  • ECDSA Biased Nonces Attack – Recover private key when nonces are partially predictable (lattice attack).
  • ECDSA Nonce Reuse Attack – Recover private key when the same nonce is reused in two signatures.
  • Invalid Curve Attack - Exploits missing point validation to force scalar multiplication on other weak curves.
  • MOV Attack – Reduce elliptic curve discrete log to finite field discrete log using weil-pairing.
  • Smart Attack – Solve discrete log on anomalous curves (when #E = p).

LWE Attacks

  • Arora-Ge - Algebraic attack on LWE by solving polynomial systems (works for small noise).
  • Least-Squares Attack - Recover secret vector when modulus reduction is not applied.

RSA Attacks

References

  • Boneh, D. (1999). Twenty Years of Attacks on the RSA Cryptosystem.
  • Arora, S., & Ge, R. (2011). New algorithms for learning in presence of errors.
  • Menezes, A. J., & Wu, Y.-H. (1997). The Discrete Logarithm Problem in GL(n, q).
  • Pohlig, S. C., & Hellman, M. (1978). An Improved Algorithm for Computing Logarithms over GF(p).
  • Smart, N. P. (1999). The Discrete Logarithm Problem on Elliptic Curves of Trace One.
  • Menezes, A., Okamoto, T., & Vanstone, S. (1993). Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field.
  • Breitner, J., & Heninger, N. (2019). Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies.

About

Implementations and proofs-of-concepts of cryptographic attacks

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages