a proactive approach to security research on cryptographic protocols
some articles that inspire me
is a famous software used for circumventing the GFW. Recently, some security issues of Shadowsocks were exposed, due to the lack of security awareness of the developers when they use some cryptographic components.
This post begins with the analysis of the source code, based on which a practice of packet capturing is conducted. Finally, a security analysis of the vulnerability, as well as a reproduction is given,.
Solved 2 interesting challenegs in Real World CTF 2020/2021 (2021-01-09 10:00 +48h). And here is my writeup.
Some places where I went around, and some pictures that record these journeys.
Writeup for 3 crypto challenges in 2020 X-NUCA (2020-10-30 09:30 +36h).
Timeline of some coppersmith-related-attack research.