cryptopals

Matasano's cryptopals challenges (cryptopals.com).
Log | Files | Refs | README | LICENSE

commit 4c29eb21c741ada8593b5266d39b4561b25071b6
parent aa6ded6c8e43f148549baa8565a970b165767854
Author: Jared Tobin <jared@jtobin.io>
Date:   Sat, 12 Aug 2023 07:15:54 -0230

Couple of typo fixes.

Diffstat:
Mdocs/s4.md | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/docs/s4.md b/docs/s4.md @@ -339,7 +339,7 @@ whether the server takes appreciably longer to reject what we supply. If it does, then we probably know that we've matched the value for that byte, and so we move onto the next one, repeating the same procedure. -The server does what is expected of us. etc/crackhmac.sh is a +The server does what is expected of it. etc/crackhmac.sh is a particularly-hacky bash script that calls curl in the requisite loop, hammering the server with different MACs until it reports verification. @@ -362,7 +362,7 @@ So, boot up the server via 'node index.js' and elsewhere do: N.b., the script is sort of janky, so there are facilities for resuming the loop in case the next byte can't be found due to timing weirdness. Append as arguments the index we were working on, the time in seconds -the last comparison took, and the key we've extracted thus far, e.g.: +the last comparison took, and the MAC we've extracted thus far, e.g.: $ ./crackhmac.sh "secrets.csv" 20 "0.57" "b094e8b74021e638ca4a"