
    

    <?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://ocw.cs.pub.ro/courses/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://ocw.cs.pub.ro/courses/feed.php">
        <title>CS Open CourseWare ic:res</title>
        <description></description>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <image rdf:resource="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico" />
       <dc:date>2026-04-04T19:28:40+03:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ic/res/hw1?rev=1561668596&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ic/res/intro?rev=1561663380&amp;do=diff"/>
                <rdf:li rdf:resource="http://ocw.cs.pub.ro/courses/ic/res/tema1?rev=1573161598&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico">
        <title>CS Open CourseWare</title>
        <link>http://ocw.cs.pub.ro/courses/</link>
        <url>http://ocw.cs.pub.ro/courses/lib/tpl/arctic/images/favicon.ico</url>
    </image>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ic/res/hw1?rev=1561668596&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-06-27T23:49:56+03:00</dc:date>
        <title>CS294S - Homework 1</title>
        <link>http://ocw.cs.pub.ro/courses/ic/res/hw1?rev=1561668596&amp;do=diff</link>
        <description>CS294S - Homework 1



this


Exercise 1 (3p)

In this exercise we'll try to break a Linear Congruential Generator, that may be used to generate “poor” random numbers.
We implemented such weak RNG to generate a sequence of bytes and then encrypted a plaintext message.
The resulting ciphertext in hexadecimal is this:</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ic/res/intro?rev=1561663380&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-06-27T22:23:00+03:00</dc:date>
        <title>Python Crash Course</title>
        <link>http://ocw.cs.pub.ro/courses/ic/res/intro?rev=1561663380&amp;do=diff</link>
        <description>Python Crash Course

Python Interactive Mode

Python is an easy to learn interactive programming language. Throughout this lab, we'll be using Python 2.7.

You can run Python code in two ways:

	*  by writing a source file and running it (eventually, with some command line arguments)
	*  by entering commands in interactive mode</description>
    </item>
    <item rdf:about="http://ocw.cs.pub.ro/courses/ic/res/tema1?rev=1573161598&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-11-07T23:19:58+03:00</dc:date>
        <title>Homework - AES Byte at a Time ECB Decryption</title>
        <link>http://ocw.cs.pub.ro/courses/ic/res/tema1?rev=1573161598&amp;do=diff</link>
        <description>padding








	*  Random
	*  Unpredictable
	*  Not secret

[CBC encryption]
[CBC decryption]



Chosen plaintext attackBEAST paper 2011
[BEAST Attack]













#!/usr/bin/env python
# -*- coding: utf-8 -*-

'''
    TLS BEAST attack - PoC
    Implementation of the cryptographic path behind the attack
'''

import random
import binascii
import sys
from Crypto.Cipher import AES
from Crypto import Random

SECRET_COOKIE = &quot;ID=3ef729ccf0cc5&quot;

&quot;&quot;&quot;
    AES-CBC
    function encrypt, decrypt, pad, un…</description>
    </item>
</rdf:RDF>
