zoukankan      html  css  js  c++  java
  • cryptopals S1-6

    题目:

    https://cryptopals.com/sets/1/challenges/6

    思路:

    Here's how:

    1. Let KEYSIZE be the guessed length of the key; try values from 2 to (say) 40.
    2. Write a function to compute the edit distance/Hamming distance between two strings. The Hamming distance is just the number of differing bits. The distance between:
      this is a test
      and
      wokka wokka!!!
      is 37. Make sure your code agrees before you proceed.
    3. For each KEYSIZE, take the first KEYSIZE worth of bytes, and the second KEYSIZE worth of bytes, and find the edit distance between them. Normalize this result by dividing by KEYSIZE.
    4. The KEYSIZE with the smallest normalized edit distance is probably the key. You could proceed perhaps with the smallest 2-3 KEYSIZE values. Or take 4 KEYSIZE blocks instead of 2 and average the distances.
    5. Now that you probably know the KEYSIZE: break the ciphertext into blocks of KEYSIZE length.
    6. Now transpose the blocks: make a block that is the first byte of every block, and a block that is the second byte of every block, and so on.
    7. Solve each block as if it was single-character XOR. You already have code to do this.
    8. For each block, the single-byte XOR key that produces the best looking histogram is the repeating-key XOR key byte for that block. Put them together and you have the key.

    解:

    def mdecode(x, key):
        y = bytearray([ord(x[i]) ^ ord(key[i % len(key)]) for i in range(len(x))]).hex()
        return y
    
    
    def calc_bit_diff(s1, s2):
        def calc_bit_diff_sub(i1, i2):
            cnt = 0
            for i in range(8):
                if (1<<i) & (i1 ^ i2) != 0:
                    cnt += 1
            return cnt
        ans = 0
        for i in range(len(s1)):
            ans += calc_bit_diff_sub(ord(s1[i]), ord(s2[i]))
        return ans
    
    
    def calc_bit_diff2(s1, s2):
        def calc_bit_diff_sub(i1, i2):
            cnt = 0
            for i in range(8):
                if (1<<i) & (i1 ^ i2) != 0:
                    cnt += 1
            return cnt
        ans = 0
        for i in range(len(s1)):
            ans += calc_bit_diff_sub(s1[i], s2[i])
        return ans
        
    import base64
    with open("f:\6.txt") as fin:
        txt = "".join([line.strip() for line in fin.readlines()])
        bx = base64.b64decode(txt)
        
    for keysz in range(2, 40):
        print(keysz, calc_bit_diff2(bx[:keysz], bx[keysz: 2 * keysz]) * 1.0 / keysz, sum([calc_bit_diff2(bx[keysz * i:keysz * i + keysz], bx[: keysz]) for i in range(10)]) * 1.0 / keysz) 
        
    
    def try_solve(barr):
        legal_chars = "01234567890abcdefghijklmnopgrstuvwxyzABCDEFGHIGKLMNOPQRSTUVWXYZ ,.?!~'><@
    #
    +=-*`_^)(:;"[]{}\%$&|Jjq/"
        ans = []
        for i in range(256):
            y = [chr(i^sx) for sx in barr]
            if len([c for c in y if c in legal_chars]) > 0.99 * len(barr):
                ans.append((chr(i), len([c  for c in y if c == 'e'])))
        mx = max([a[1] for a in ans])
        ans.sort(key=lambda x:-x[1])
        print(ans)
        return [ans[i][0] for i in range(len(ans)) if ans[i][1] == mx][0]
    
    
    
    
    for keysz in range(29, 30):
        keyarr = []
        print('keysz', keysz)
        for keyi in range(keysz):
            subxt = [bx[i] for i in range(keyi, len(bx), keysz)]
            keyarr.append(try_solve(subxt))
        print(''.join(keyarr))
        
        
    

     

    感想:

    keysz=29,这个实际上是硬暴力来的

    其实还不完全,直接按照E的数目最多来拼是Terminator X: Br,ng thm noise

    但实际上应该是Bring the noise

  • 相关阅读:
    win10下查看进程,杀死进程
    Pycharm,debug调试时怎样带参数
    struts2,登录功能模块实现
    struts2处理.do后缀的请求
    struts2 修改action的后缀
    j2ee中如何拦截jsp页面?
    4个好用的JS联动选择插件
    css position:absolute 如何居中对齐
    使用jquery插件报错:TypeError:$.browser is undefined的解决方法
    phpcms v9后台多表查询分页代码
  • 原文地址:https://www.cnblogs.com/xuesu/p/12000373.html
Copyright © 2011-2022 走看看