Practical Cryptography In Python
Home
Ch5 Message Integrity Signatures and Certificates
5.4 BRUTE FORCE FOUR-WORD PASSWORDS
Ch1 Cryptography More Than Secrecy
1.1 Shift Cipher Encoder
1.2 Automated Decoding
1.3 A strong substitution cipher
1.4 Count the dictionaries
1.5 Identifying the dictionary
1.6 Brute Force
Ch2 Hashing
2.1 Welcome to MD5
2.3 Observing Avalanche
2.4 MD5 of a File
2.5 THE POWER OF ONE
2.6 THE POWER OF ONE, BUT BIGGER!
2.7 PASSWORD LENGTH’S EFFECTS ON ATTACK TIME
2.8 MORE HASH, MORE TIME
2.9 PROOF OF WORK
Ch3 Symmetric Encryption
3.2 UPDATED TECHNOLOGY
3.3 HISTORY LESSON
3.4 OTHER CIPHERS
3.5 ALL NIST KATS
3.6 SENDING BOB A MESSAGE
3.7 SENDING BOB A FAKE MESSAGE
3.8 XOR EXERCISE
3.9 THE MASK OF XOR-0?
3.10 DETERMINISTIC OUTPUT
3.11 ENCRYPTING AN IMAGE
3.12 HAND-CRAFTED CBC
3.13 WRITE A SIMPLE COUNTER MODE
3.14 PARALLEL COUNTER MODE
3.15 RIDING THE KEYSTREAM
3.16 SIFTING THROUGH XOR
3.17 VISUALIZING CIPHERTEXT CHANGES
3.18 EMBRACING EVIL
3.19 RESISTANCE IS FUTILE
3.20 STATISTICS ARE ALSO FUTILE
3.21 PREDICTING TIME-BASED RANDOMNESS
Ch4 Asymmetric Encryption
4.1 SIMPLE RSA ENCRYPTION
4.2 WHO GOES THERE? BOB? IS THAT YOU?
4.3 WHAT’S THE ANSWER TO LIFE, THE UNIVERSE, AND EVERYTHING?
4.4 BRUTE-FORCE RSA
4.5 WAITING IS THE HARDEST PART
4.6 DICTIONARY ATTACKS
4.7 HOMOMORPHIC PROPERTY OF UNPADDED RSA
4.8 EVE’S PROTEGE
4.9 COMMON MODULUS ATTACK
4.10 COMMON MODULUS USE CASES
4.11 GETTING AN UPGRADE
4.12 RUN THE ATTACK!
4.13 TAKING THE TIME
4.14 STAYING UP TO DATE
4.15 FACTORING RSA KEYS
4.16 ROCA VULNERABLE KEYS
Ch5 Message Integrity Signatures and Certificates
5.1 TRUST BUT VERIFY
5.2 EVER EVIL EVE
5.3 BRUTE FORCE AGAIN
5.4 BRUTE FORCE FOUR-WORD PASSWORDS
5.5 TEST PYTHON’S HMAC
5.6 ENCRYPT THEN MAC
5.7 KNOW THY WEAKNESS
5.8 RSA RETURNS!
5.9 MD5 RETURNS!
5.10 DETECT FAKE CHARLIES
5.11 THE CHAINS WE FORGED IN LIFE
5.12 REPLAY IT AGAIN SAM!
Ch6 Combining Asymmetric and Symmetric Algorithms
6.1 BOB’S RECEIVER
6.2 RSA RACING!
6.3 COUNTERS VS. CHAINS!
6.4 MACS VS. SIGNATURES
6.5 ECDSA VS RSA SIGNING
6.6 OFF TO THE RACES!
6.7 RUDIMENTARY ECDH EXCHANGE
6.8 NETWORK ECDH EXCHANGE
6.9 ECDH LEFT TO THE READER
6.10 BECAUSE YOU LOVE TORTURE
6.11 EXPLOITING FULL-DUPLEX KEY REUSE
6.12 DERIVING ALL THE PIECES
6.13 PLAYING THE VILLAN
Ch7 Authenticated Encryption and Kerberos
7.1 TAG! YOU’RE IT!
7.2 CHUNKY GCM
7.3 SPEEDY CHACHA
7.4 WHAT’S IN A NAME?
7.5 KERBERIZE THE ECHO PROTOCOL
7.6 CONFOUNDER
7.7 PREVENTING SERVER REPLAY
Ch8 TLS Communications
8.1: WHAT’S IN WEB TRAFFIC?
8.2 CERTIFICATE PRACTICE
8.3 FANTASY CERTIFICATES
8.4 OPENSSL TO PYTHON AND BACK
8.5 CERTIFICIATE INTERCEPT IN THE MIDDLE
8.6 CERTIFICATE MODIFICATION IN THE MIDDLE
8.7 WHO GOES THERE?
8.8 CLIENT AUTHENTICATION RESEARCH
8.9 KEY EXERCISES
8.10 IMPLEMENT THE PRF
8.11 THE TLS 1.2 PIECES
8.12: WHAT’S BROKEN NOW?
8.13: MONITOR CERTIFICATE ROTATION
8.14 SOCIAL ENGINEERING
8.15 LEARN TO POKE AROUND
8.16 THREE CHEERS!
5.4 BRUTE FORCE FOUR-WORD PASSWORDS
If you understand 5.3, you can do 5.4.