• article Where To Begin
    • Introduction
    • Encoding
    • Encryption 101
    • Cryptosystem Classification
    • Bruteforce Attack
    • Introduction
    • Shift Cipher
    • Affine Cipher
    • Atbash Cipher
    • Playfair Cipher
    • Introduction
    • Caesar Cipher
    • Substitution Cipher
    • Char XOR
    • Repeated Key XOR
    • Transposition Cipher
    • Introduction
      • Introduction
      • Plaintext Recovery
      • Introduction
      • Lenght Extension
      • Mte Key Reuse
      • Etm Key Reuse
      • Eam Key Reuse
      • Padding Oracle
      • Iv Recovery
      • Bit Flipping
      • Introduction
      • Separator Oracle
      • Crime
      • Bit Flipping
    • Introduction
    • Wiener Attack
    • Stereotyped Message
    • Related Message
    • Partial Key Exposure
    • Non Co-prime Exponent
    • Nitaj CRT RSA
    • Manger
    • LSB Oracle
    • Low Exponent
    • Known D
    • Known CRT Exponents
    • Hastad Attack
    • Extended Wiener Attack
    • Desmedt Odlyzko
    • D Fault Attack
    • CRT Fault Attack
    • Common Modulus Attack
    • Cherkaoui Semmouni
    • Boneh Durfee
    • Bleichenbacher
    • Introduction
    • Introduction
    • Introduction
      • Introduction
      • Brute Force
      • Bsgs
      • Pollard Rho
      • Index Calculus
      • Pohling Hellman
    • Smart Attack
    • Singular Curve Attack
    • Mov Attack
    • Fr Reduction
    • Lattice Based Signing
    • Introduction
  • GitHub
  • Twitter / X
  • to navigate
  • to select
  • to close
    • Home
    • Block Cipher
    • CBC
    On this page
    article

    CBC DRAFT

    article DRAFT

    Introduction

    article DRAFT

    Lenght Extension

    article DRAFT

    Mte Key Reuse

    article DRAFT

    Etm Key Reuse

    article DRAFT

    Eam Key Reuse

    article DRAFT

    Padding Oracle

    article DRAFT

    Iv Recovery

    article DRAFT

    Bit Flipping


    © 2024 Lotus Labs. Built with Lotus Docs