Aucune description

Michele Orrù 08d4db24e5 Compiled book. il y a 10 ans
book 08d4db24e5 Compiled book. il y a 10 ans
reports f3d30f1f0c Report 7. il y a 11 ans
src 6d4128b81e Revert "Setting upperbound limits to some questions." il y a 10 ans
.gitignore 45cdc70513 Removing primes.txt file, and applying some bash kung-fu to primes.sh il y a 10 ans
AUTHORS c1a604eab1 Autoconf/Automake! il y a 11 ans
COPYING fe40f2cca2 Selecting beer-ware licence. il y a 11 ans
ChangeLog c1a604eab1 Autoconf/Automake! il y a 11 ans
INSTALL c1a604eab1 Autoconf/Automake! il y a 11 ans
Makefile.am a515a5d047 Using a smaller dataset of primes, if not in cluster mode. il y a 10 ans
Makefile.in a515a5d047 Using a smaller dataset of primes, if not in cluster mode. il y a 10 ans
NEWS c1a604eab1 Autoconf/Automake! il y a 11 ans
README 2941a5d47b Adding README, containing a small description of the project. il y a 11 ans
aclocal.m4 49ad51cb35 Adding aclocal.m4 il y a 10 ans
compile dcbc6ec916 Integrating autoreconf-generated files. il y a 11 ans
config.h.in f994afc7e1 Add by default Makefile.in il y a 10 ans
configure 7fb3fdca48 Poetry, steganography. il y a 10 ans
configure.ac 7fb3fdca48 Poetry, steganography. il y a 10 ans
depcomp dcbc6ec916 Integrating autoreconf-generated files. il y a 11 ans
install-sh dcbc6ec916 Integrating autoreconf-generated files. il y a 11 ans
missing dcbc6ec916 Integrating autoreconf-generated files. il y a 11 ans
run_despicable.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. il y a 10 ans
run_indiana.sh 2739eeff9d adding run_indiana.sh il y a 10 ans
run_stranamore.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. il y a 10 ans
sites.txt 673cf9c83f $ cut -d',' -f 2 top-1m.csv > sites.txt il y a 11 ans
test-driver dcbc6ec916 Integrating autoreconf-generated files. il y a 11 ans

README

The main purpose of this project is to implement some of the most common
mathematical attacks on the RSA cipher, and provide an executable capable of
measuring the level of security into a ssl conversation.

Given a website as input, the program should be able to download its
certificate, and probe it with different tools.

Examples of probes could be wrong information on the ssl certificate metadata,
a vulnerability with wiener's attack, factorization, dixon, etc.