Auto Attack v2 supports single input above + batch lines for multi-sample attacks.
Untuk e=3 dengan 3 ciphertext berbeda dan modulus berbeda
Ketika 2 ciphertext pakai n sama tapi e berbeda (e1, e2 coprime)
RSA dengan lebih dari 2 prime factor
Recover p from known MSB/LSB bits. Brute small unknown bits, and generate Sage Coppersmith template for larger cases.
Curve: yยฒ = xยณ + ax + b (mod p). Computes S = k * point, then tries common XOR key derivations.
Solve d from Q = dG on small/weak curves with bounded search.
Recover k and private key x when two signatures share the same nonce (same r).
Recover private key x when some nonce bits are known. Brute-force for small unknown bits, with HNP/Sage template for larger cases.
Optional filter with second signature + known k2 bits.
Linear Congruential Generator: X_{n+1} = (a*X_n + c) mod m
Butuh 624 output berturut-turut untuk recover state
Linear Feedback Shift Register analysis
Paste hex ciphertext untuk detect mode
ECB mode encrypts identical blocks to identical ciphertext
Modify ciphertext to change plaintext after decryption
Manual helper after oracle phase: use recovered intermediate state to decrypt/forge blocks.
Same nonce + key reuses keystream. XOR ciphertexts to get XOR plaintexts.
One-block, no-AAD case: derive GHASH key H from (C1,T1) and (C2,T2) under same nonce.
| Mode | Vulnerability | Attack |
|---|---|---|
ECB |
Same plaintext โ same ciphertext | Block swapping, pattern analysis |
CBC |
IV reuse, bit-flipping | Padding oracle, bit-flip to modify plaintext |
CTR |
Nonce reuse | XOR ciphertexts to get XOR of plaintexts |
GCM |
Nonce reuse | Authentication bypass, forgery |
Untuk MD5, SHA1, SHA256 (Merkle-Damgรฅrd construction)