cryptopals

Matasano's cryptopals challenges (cryptopals.com).
Log | Files | Refs | README | LICENSE

commit 2f63beb628c1e8dc050041820073036ce78d54c2
parent 3dfa8248c0b4c714e6c10041f00cb6c651a7eace
Author: Jared Tobin <jared@jtobin.io>
Date:   Fri, 28 Jul 2023 16:23:46 -0230

Fix typo.

Diffstat:
Mdocs/s3.md | 2+-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/s3.md b/docs/s3.md @@ -5,7 +5,7 @@ This one took me some fiddling to get right. As stated in the challenge text itself, it's easy to get hung up on the idea of decrypting padding bytes themselves. But the idea is to choose ciphertext byte values so as -to *force* valid padding in a "phantom" plaintext, then using the added +to *force* valid padding in a "phantom" plaintext, then use the added information to recover the actual plaintext bytes (padding bytes or no). From the 2.16 answer text, CBC-mode decryption proceeds as follows: