AES-CTR: Fixed nonce

Π˜ΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡ подстановки

Attack this cryptosystem piecemeal: guess letters, use expected English language frequence to validate guesses, catch common English trigrams, and so on.

ΠŸΡ€ΠΈΠΌΠ΅Ρ€: https://cryptopals.com/sets/3/challenges/19

БтатистичСскоС Ρ€Π΅ΡˆΠ΅Π½ΠΈΠ΅

Instead of making spot guesses at to known plaintext, treat the collection of ciphertexts the same way you would repeating-key XOR.

Obviously, CTR encryption appears different from repeated-key XOR, but with a fixed nonce they are effectively the same thing.

To exploit this: take your collection of ciphertexts and truncate them to a common length (the length of the smallest ciphertext will work).

Solve the resulting concatenation of ciphertexts as if for repeating- key XOR, with a key size of the length of the ciphertext you XOR'd.

ΠŸΡ€ΠΈΠΌΠ΅Ρ€: https://cryptopals.com/sets/3/challenges/20

Last updated