Soatok Dreamseeker on Nostr: For DEFCON last year, I wrote some code to generate one (ciphertext, tag) that could ...
For DEFCON last year, I wrote some code to generate one (ciphertext, tag) that could be decrypted by two different keys, using AES-GCM. This is also known as instance of the Invisible Salamanders attack.
https://github.com/soatok/gcm-exploitPublished at
2024-01-10 19:16:23Event JSON
{
"id": "1b97ad31072ae63b7c18de31d3033636bb79cf3eef56d2948f54476dbb4f6b1b",
"pubkey": "f708981a134a11a6a01d17d326290dfaa34d81ede20ae06ad20166815f416933",
"created_at": 1704914183,
"kind": 1,
"tags": [
[
"proxy",
"https://furry.engineer/users/soatok/statuses/111733255921046775",
"activitypub"
]
],
"content": "For DEFCON last year, I wrote some code to generate one (ciphertext, tag) that could be decrypted by two different keys, using AES-GCM. This is also known as instance of the Invisible Salamanders attack.\n\nhttps://github.com/soatok/gcm-exploit",
"sig": "18f7396c46338cf247dcbf8261b528f84601adb1bd1781f818bec537c39ca9215270acce35dd61cef91aaad2caf2a717a8ff86e6d5e8b86952d5020b1f091e07"
}