Skip to content

Attack on CBC block mode with PKCS#5 padding, exploiting cryptographic vulnerabilities and recovering plaintext data.

Notifications You must be signed in to change notification settings

mabushelbaia/Padding-Oracle-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Padding Oracle Attack

πŸ”— | Lab Description
πŸ”— | Lab Report

docs/tty.gif

Project Structure

.
β”œβ”€β”€ docs
β”‚  β”œβ”€β”€ LaTeX
β”‚  β”‚  β”œβ”€β”€ assets
β”‚  β”‚  β”‚  β”œβ”€β”€ d_diagram.png
β”‚  β”‚  β”‚  β”œβ”€β”€ task1.png
β”‚  β”‚  β”‚  β”œβ”€β”€ task2.png
β”‚  β”‚  β”‚  β”œβ”€β”€ task3.1.png
β”‚  β”‚  β”‚  β”œβ”€β”€ task3.2.png
β”‚  β”‚  β”‚  └── task3.3.png
β”‚  β”‚  β”œβ”€β”€ cite.bib
β”‚  β”‚  β”œβ”€β”€ ieee.cls
β”‚  β”‚  β”œβ”€β”€ lix.sty
β”‚  β”‚  └── main.tex
β”‚  β”œβ”€β”€ LAB.pdf
β”‚  β”œβ”€β”€ Padding_Oracle_Attack.pdf
β”‚  └── tty.gif
β”œβ”€β”€ docker-compose.yml
β”œβ”€β”€ Makefile
β”œβ”€β”€ main.py
└── README.md

Installation and Running

clone the project using the following command:

git clone https://github.com/mabushelbaia/Padding-Oracle-Attack.git
cd Padding-Oracle-Attack

Task 1:

make: default run with 5, 10, 16 bytes.
make bytes n=i: where i is the number of bytes.

Task 2:

Skip this part its useless

Task 3:

build and run the docker container make sure you have docker-compose installed sudo apt install docker-compose

docker-compose build
docker-compise up -d  #d for detched

Then you can run the script to decrypt the secret message.

python3 main.py

About

Attack on CBC block mode with PKCS#5 padding, exploiting cryptographic vulnerabilities and recovering plaintext data.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published