crypto-明文攻击

 

一下代码解密

def decrypt(data, key):
assert len(data) result = ""
for i in range(len(data)):
if data[i].isupper():
result += chr((ord(data[i]) - ord('A') - key[i] + 26) % 26 + ord('A'))
elif data[i].islower():
result += chr((ord(data[i]) - ord('a') - key[i] + 26) % 26 + ord('a'))
else:
result += data[i]
return result

m = 'Xiwoihp, Gaeasrvd jsf Sliuwe kkqpd ryix hh gkbh Omxnn ezxbi lvaqxxt nrflh, gpv pt yxx iw nls qioeds li qin bds vnef rts ghe ljez fu iywy vbm bwbe. Eke jvytzjn njps uag fh iujt qxehqqp rvseepu djdmg cep nmooryqzyav uu j gcr, nhag cybl kzvx aqsvvdvujy vm lhk Rmooeqfn eaww pthlowyav btng cpy yhpsnyael ov tae xbbf ufzfpbszk, oshfucs ql pma jol po lcp ysywc. Aa jgz heu vcdzf cmqy oufk pmag umt kcss ljml Fniejxqf'
c = 'However, Benjamin and Clover could only be with Boxer after working hours, and it was in the middle of the day when the van came to take him away. The animals were all at work weeding turnips under the supervision of a pig, when they were astonished to see Benjamin come galloping from the direction of the farm buildings, braying at the top of his voice. It was the first time that they had ever seen Benjamin'
k = []
for i in range(len(m)):
t = ord(m[i]) - ord(c[i])
k.append(t)

c = "xaawr{B0_d0l_cs0m_'Pp0mn-odn1vpabt_deqzcq'?}"
t = decrypt(c, k)
print(t)

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
收录论文 3.1 An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation……………………………………………………………………9 3.2 Anole A Highly Efficient Dynamically Reconfigurable Crypto - Processor for Symmetric-Key Algorithms …««««««……………………………20 3.3 Side-channel evaluation on true random number generators………………34 3.4 基于深度学习的安全芯片侧信道安全分析方法研究……………………46 3.5 A Fully Digital Physical Unclonable Function based Temperature Sensor for Secure Remote Sensing……………………………………………………52 3.6 一种基于亚稳态原理的真随机数发生器……………………….………60 3.7 An Area-Efficient Large-Number Multiplier for FHE……………………..65 3.8 Side-channel attacks for the authentication……………………….......……69 3.9 Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4……………………............ …….....……88 3.10 批标准化算法在深度学习侧信道分析中的应用…………………………92 3.11 CTR-RSA 算法的选择明文联合攻击……………………………………103 3.12 Pushing the limit of LR-based profiling…………………………………110 3.13 基于振荡电路的硬件木马检测方法……………………………………129 3.14 针对真实 RFID 标签的侧信道攻击 密码学芯片会议投稿……………138 3.15 Efficient High-Order Low-Entropy Masking Schemes (LEMS) for S-boxes Using Look-Up-Table Based Addition-Chain……………………………147 3.16 A Deep Learning Modeling Attack Method for MISR-APUF Protection Structure………………………………………………………………..154 3.17 机器学习与侧信道攻击结合理论分析…………………………………159 3.18 基于忆阻器的模加器设计………………………………………………165 3.19 一种抗功耗攻击的高安全 AES IP 核设计………………………………172 3.20 基于电磁泄漏信号的硬件木马检测方法………………………………177 3.21 硬件木马研究综述…………………………….…………………………185 3.22 快速素数生成方法………………………………………………………194 3.23 一种针对 SM4 密码算法联合攻击方法………………………………….202

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值