Neat! And great viz! Any tips what I can exploit, given *intentional* confusion of prime and composite? I can see the channel-less covert leak but I’ve got a few ways of doing that.
-
-
-
PAKEs are a good target - attacker impersonates server to client, sends bad DH params, and learns client pwd by solving easy discrete log problem. This is due to Bleichenbacher (so it is necessarily good!)
- Još 9 drugih odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.