diff --git a/from-0-to-crypto-by-projects/episode-2-proof-demonstration/index.html b/from-0-to-crypto-by-projects/episode-2-proof-demonstration/index.html index 55b5735..e9de39b 100644 --- a/from-0-to-crypto-by-projects/episode-2-proof-demonstration/index.html +++ b/from-0-to-crypto-by-projects/episode-2-proof-demonstration/index.html @@ -2,11 +2,11 @@ According to the documentation and as it is mentionned that type 7 is an hashing algorithm. ">Episode 2: Reversing cryptography algorithm made to be unreversable (checksum). Method by mathematical proof: disproof :: CPE — CPE: the school that schools to send you to cpe!
-

Episode 2: Reversing cryptography algorithm made to be unreversable (checksum). Method by mathematical proof: disproof

I - Identify

In a previous article, I read the source code of a program from the executable. The goal of this new article is to audit the logic behind the math algorithm that supposed to avoid to make someone reverse the modification of the password. The password modification algorithm provided by the previous article work is available at this url.

According to the documentation and as it is mentionned that type 7 is an hashing algorithm.

A secure hash algorithm is an hash algorithm so that for any function hash that transform the original (plaintext) value $ hased = H(plain) $ there does not exist a function $ rev(hashed) $ so that $ rev(hashed) = plain $.

II - Notes:

I really definitely insist on this point: It is crucial for a cryptologist to PROOVE his statement. Not just calculating. If you only calculate, you could reach some proprietary algorithms such as this one but you will never ever be able to code CVE exploits on modern algorithms. I insist in the point you have to read book fo proof if you did not do it yet. It is to do theorem proving.

III - Analysis under mathematical thinking

The reverse engineering of the hash of vigenere cisco has permitted to deduct the method taken by this algorithm.

We could then guess that the researchers thanks then that:

image

The question is to proove that there exists a function $ rev(hashed) $ so that $ \forall plain [rev(H(plain)) = plain] $ then $ \forall x [x = H(plain)] $

IV/ 1- solving the theorem finding a way to proove the case.

There are a lot of different method to proove a theorem. You could pick the one you prefer or the one you find easier.

The big picture is to split the proof into several cases.

There a serveral various operations including:

  • splitting number between 0 and 256 to two differnt more little number (the shift: $ \ggg $ and the logical and: $ \land 0xf0 $ ). Reversable by mergingtwo numbers in a single one with same algortihm.
  • adding. You could simply substract to reverse.
  • doing an boolean exclusive logical or to a known password.
    • as each number exclusively logically set to logical or (xored) with itself has the final value of 0 and as 0 set to logical or with another number will return this number, image it follows that logically set to logical or to the hardcoded password one time will change the values but logically set to logical or a second time to the same hardcoded value will change it to the original value. See boolean algebra, and see this schems provided with the tool name cryptool-2.

All of these are equivalent to another operation.

Then I decide to choose a proof in the form:

as: $ \forall h \in N[(h = p + x) \implies (p = h - x)] $

and as: $ \forall h \in N[(h = p \oplus x) \implies (p = h \oplus x)] $

and as: +

Episode 2: Reversing cryptography algorithm made to be unreversable (checksum). Method by mathematical proof: disproof

I - Identify

In a previous article, I read the source code of a program from the executable. The goal of this new article is to audit the logic behind the math algorithm that supposed to avoid to make someone reverse the modification of the password. The password modification algorithm provided by the previous article work is available at this url.

According to the documentation and as it is mentionned that type 7 is an hashing algorithm.

A secure hash algorithm is an hash algorithm so that for any function hash that transform the original (plaintext) value $ hased = H(plain) $ there does not exist a function $ rev(hashed) $ so that $ rev(hashed) = plain $.

II - Notes:

I really definitely insist on this point: It is crucial for a cryptologist to PROOVE his statement. Not just calculating. If you only calculate, you could reach some proprietary algorithms such as this one but you will never ever be able to code CVE exploits on modern algorithms. I insist in the point you have to read book fo proof if you did not do it yet. It is to do theorem proving.

III - Analysis under mathematical thinking

The reverse engineering of the hash of vigenere cisco has permitted to deduct the method taken by this algorithm.

We could then guess that the researchers thanks then that:

image

The question is to proove that there exists a function $ rev(hashed) $ so that $ \forall plain [rev(H(plain)) = plain] $.

IV/ 1- solving the theorem finding a way to proove the case.

There are a lot of different method to proove a theorem. You could pick the one you prefer or the one you find easier.

The big picture is to split the proof into several cases.

There a serveral various operations including:

  • splitting number between 0 and 256 to two differnt more little number (the shift: $ \ggg $ and the logical and: $ \land 0xf0 $ ). Reversable by mergingtwo numbers in a single one with same algortihm.
  • adding. You could simply substract to reverse.
  • doing an boolean exclusive logical or to a known password.
    • as each number exclusively logically set to logical or (xored) with itself has the final value of 0 and as 0 set to logical or with another number will return this number, image it follows that logically set to logical or to the hardcoded password one time will change the values but logically set to logical or a second time to the same hardcoded value will change it to the original value. See boolean algebra, and see this schems provided with the tool name cryptool-2.

All of these are equivalent to another operation.

Then I decide to choose a proof in the form:

as: $ \forall h \in N[(h = p + x) \implies (p = h - x)] $

and as: $ \forall h \in N[(h = p \oplus x) \implies (p = h \oplus x)] $

and as: $ \forall h \in N[(h = p \ggg x) \implies (p = h \lll x)] $

then, for any h in N, $ p = (h - x_1 \oplus x_2 \lll x_3) $.

Let’s check it out that in this paper!


\ No newline at end of file