Nessuna descrizione

Michele Orrù 08d4db24e5 Compiled book. 10 anni fa
book 08d4db24e5 Compiled book. 10 anni fa
reports f3d30f1f0c Report 7. 11 anni fa
src 6d4128b81e Revert "Setting upperbound limits to some questions." 10 anni fa
.gitignore 45cdc70513 Removing primes.txt file, and applying some bash kung-fu to primes.sh 10 anni fa
AUTHORS c1a604eab1 Autoconf/Automake! 11 anni fa
COPYING fe40f2cca2 Selecting beer-ware licence. 11 anni fa
ChangeLog c1a604eab1 Autoconf/Automake! 11 anni fa
INSTALL c1a604eab1 Autoconf/Automake! 11 anni fa
Makefile.am a515a5d047 Using a smaller dataset of primes, if not in cluster mode. 10 anni fa
Makefile.in a515a5d047 Using a smaller dataset of primes, if not in cluster mode. 10 anni fa
NEWS c1a604eab1 Autoconf/Automake! 11 anni fa
README 2941a5d47b Adding README, containing a small description of the project. 11 anni fa
aclocal.m4 49ad51cb35 Adding aclocal.m4 10 anni fa
compile dcbc6ec916 Integrating autoreconf-generated files. 11 anni fa
config.h.in f994afc7e1 Add by default Makefile.in 10 anni fa
configure 7fb3fdca48 Poetry, steganography. 10 anni fa
configure.ac 7fb3fdca48 Poetry, steganography. 10 anni fa
depcomp dcbc6ec916 Integrating autoreconf-generated files. 11 anni fa
install-sh dcbc6ec916 Integrating autoreconf-generated files. 11 anni fa
missing dcbc6ec916 Integrating autoreconf-generated files. 11 anni fa
run_despicable.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. 10 anni fa
run_indiana.sh 2739eeff9d adding run_indiana.sh 10 anni fa
run_stranamore.sh be9157b6c0 Updating despicable.c with the changes made on the cluster. 10 anni fa
sites.txt 673cf9c83f $ cut -d',' -f 2 top-1m.csv > sites.txt 11 anni fa
test-driver dcbc6ec916 Integrating autoreconf-generated files. 11 anni fa

README

The main purpose of this project is to implement some of the most common
mathematical attacks on the RSA cipher, and provide an executable capable of
measuring the level of security into a ssl conversation.

Given a website as input, the program should be able to download its
certificate, and probe it with different tools.

Examples of probes could be wrong information on the ssl certificate metadata,
a vulnerability with wiener's attack, factorization, dixon, etc.