— The attack works because the program was able to read the source of randomness used in AES
— Meaning that it could effectively predict how the key changed
— "hey, implementing it is really hard and even the most extensively tested libaries have bugs""let's rewrite it from scratch, by myself"
Message permanent page
>"hey, implementing it is really hard and even the most extensively tested libaries have bugs"thats not what I said, wtf?
— Anyway, you are holding me up from workg
— No, that's what comes out from the discussion
— If you can't even agree on that, that you are living in your magical world of delusion and I won't try to get you of it :)
— The start key is what you provide as 'password' (and it can be passed as input of a key derivation function)
— It is exactly what you said
— /ban Srijan channel ad.
— Another one bites the dust...!Banned Srijan.Reason:channel ad.
— No! They do a statistical analysis on the access pattern on the precomputed lookup tables. Please _read_ the stuff you share and quote.
— Guys I have downloaded codeblocks but facing problem with it
— It's quite new to me