| ||Help me understand this ECB attack|
9 points by king_mob on June 28, 2014 | hide | past | web | favorite | 2 comments |
|It's pretty old i guess now (2012) but i'd still like to able to understand the adaptive chosen plaintext attack on AES-ECB. Specifically, how it's explained in this video from Thomas Ptacek's talk on crypto: https://vimeo.com/41116595|
I can understand how we identify where our block boundaries are, but repeatedly injecting known plaintext (32 or 64 A's for example) and then appending another known string, but this time with a different value (another letter in the alphabet). From this, build up a dictionary of ciphertext that we know the plaintext for.
My problem is i cant understand how the attack gets implemented practically, for example in the video it's suggested to include a pipe character | (thats @ 45 minutes in or so) but i cant see how this would lead to a decryption?
| Apply to YC