No Description

Michele Orrù 08d4db24e5 Compiled book. 10 years ago
book 08d4db24e5 Compiled book. 10 years ago
reports f3d30f1f0c Report 7. 10 years ago
src 6d4128b81e Revert "Setting upperbound limits to some questions." 10 years ago
.gitignore 45cdc70513 Removing primes.txt file, and applying some bash kung-fu to primes.sh 10 years ago
AUTHORS c1a604eab1 Autoconf/Automake! 10 years ago
COPYING fe40f2cca2 Selecting beer-ware licence. 10 years ago
ChangeLog c1a604eab1 Autoconf/Automake! 10 years ago
INSTALL c1a604eab1 Autoconf/Automake! 10 years ago
Makefile.am a515a5d047 Using a smaller dataset of primes, if not in cluster mode. 10 years ago
Makefile.in a515a5d047 Using a smaller dataset of primes, if not in cluster mode. 10 years ago
NEWS c1a604eab1 Autoconf/Automake! 10 years ago
README 2941a5d47b Adding README, containing a small description of the project. 10 years ago
aclocal.m4 49ad51cb35 Adding aclocal.m4 10 years ago
compile dcbc6ec916 Integrating autoreconf-generated files. 10 years ago
config.h.in f994afc7e1 Add by default Makefile.in 10 years ago
configure 7fb3fdca48 Poetry, steganography. 10 years ago
configure.ac 7fb3fdca48 Poetry, steganography. 10 years ago
depcomp dcbc6ec916 Integrating autoreconf-generated files. 10 years ago
install-sh dcbc6ec916 Integrating autoreconf-generated files. 10 years ago
missing dcbc6ec916 Integrating autoreconf-generated files. 10 years ago
run_despicable.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. 10 years ago
run_indiana.sh 2739eeff9d adding run_indiana.sh 10 years ago
run_stranamore.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. 10 years ago
sites.txt 673cf9c83f $ cut -d',' -f 2 top-1m.csv > sites.txt 10 years ago
test-driver dcbc6ec916 Integrating autoreconf-generated files. 10 years ago

README

The main purpose of this project is to implement some of the most common
mathematical attacks on the RSA cipher, and provide an executable capable of
measuring the level of security into a ssl conversation.

Given a website as input, the program should be able to download its
certificate, and probe it with different tools.

Examples of probes could be wrong information on the ssl certificate metadata,
a vulnerability with wiener's attack, factorization, dixon, etc.