Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make marvin script able to output individual ciphertexts #8

Open
tomato42 opened this issue Dec 2, 2023 · 13 comments · May be fixed by #14
Open

Make marvin script able to output individual ciphertexts #8

tomato42 opened this issue Dec 2, 2023 · 13 comments · May be fixed by #14

Comments

@tomato42
Copy link
Owner

tomato42 commented Dec 2, 2023

For debugging it would be nice to be able to create one ciphertext per probe output, like what ./step2.sh does.

@gogo2464
Copy link

is it fixed by #7 ?

@tomato42
Copy link
Owner Author

no, #7 is a new harness, this is about generated test vectors

@gogo2464
Copy link

Then, could you assign me to the pr please?

@tomato42
Copy link
Owner Author

create a PR addressing it, and I'll do it

@gogo2464
Copy link

Nice

@gogo2464 gogo2464 linked a pull request Aug 24, 2024 that will close this issue
@gogo2464
Copy link

@tomato42 I started.

I am stuck because I do not know if I should change the type variable. I need to guess the arguments from the command line argument size.

@tomato42
Copy link
Owner Author

I told you multiple times already: until you understand how the Bleichenbacher attack works with reliable oracles, you have no reason to work on the timing variant of it

and #14 is not even editing the relevant file; this is issue is about step2-marvin.sh

@gogo2464
Copy link

Ghank you very much for the help. I am reading your comment carefully.

@gogo2464
Copy link

I need more time to read the paper. Can I start another pr on step2-marvin.sh the next week please?

@gogo2464
Copy link

gogo2464 commented Aug 28, 2024

@tomato42 I would like to understand Bleichenbacher attack. Do you know a place or links for exercices please? I only read the paper.

@tomato42
Copy link
Owner Author

See the ROBOT paper from Böck

@gogo2464
Copy link

I would like to code an exploit on the last ROBOT from Bock.

I am doing ctf and then I will come back.

Check out https://cryptopals.com/sets/6/challenges/47

see you soon.

@gogo2464
Copy link

I will start with https://cryptopals.com/sets/6/challenges/41

let me follow introduction to mathematical cryptography to continue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants