<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Symmetric Ciphers on Aditya Telange</title><link>https://adityatelange.in/writeups/cryptohack/aes/</link><description>Recent content in Symmetric Ciphers on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Fri, 20 May 2022 00:00:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/writeups/cryptohack/aes/index.xml" rel="self" type="application/rss+xml"/><item><title>Cryptohack - Keyed Permutations [5 pts]</title><link>https://adityatelange.in/writeups/cryptohack/aes/keyed-permutations/</link><pubDate>Fri, 20 May 2022 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/cryptohack/aes/keyed-permutations/</guid><description>&lt;blockquote&gt;
&lt;p&gt;The Solution is shared considering &lt;a href="https://cryptohack.org/faq/#solutions"&gt;CAN I SHARE MY SOLUTIONS?&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="problem"&gt;Problem&lt;/h2&gt;
&lt;p&gt;AES, like all good block ciphers, performs a &amp;ldquo;keyed permutation&amp;rdquo;. This means that it maps every possible input block to a unique output block, with a key determining which permutation to perform.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A &amp;ldquo;block&amp;rdquo; just refers to a fixed number of bits or bytes, which may represent any kind of data. AES processes a block and outputs another block. We&amp;rsquo;ll be specifically talking the variant of AES which works on 128 bit (16 byte) blocks and a 128 bit key, known as AES-128.&lt;/p&gt;</description></item><item><title>Cryptohack - Resisting Bruteforce [10 pts]</title><link>https://adityatelange.in/writeups/cryptohack/aes/resisting-bruteforce/</link><pubDate>Fri, 20 May 2022 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/cryptohack/aes/resisting-bruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;The Solution is shared considering &lt;a href="https://cryptohack.org/faq/#solutions"&gt;CAN I SHARE MY SOLUTIONS?&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="problem"&gt;Problem&lt;/h2&gt;
&lt;p&gt;If a block cipher is secure, there should be no way for an attacker to distinguish the output of AES from a &lt;a href="https://en.wikipedia.org/wiki/Pseudorandom_permutation"&gt;random permutation&lt;/a&gt; of bits. Furthermore, there should be no better way to undo the permutation than simply bruteforcing every possible key. That&amp;rsquo;s why academics consider a cipher theoretically &amp;ldquo;broken&amp;rdquo; if they can find an attack that takes fewer steps to perform than bruteforcing the key, even if that attack is practically infeasible.&lt;/p&gt;</description></item></channel></rss>