From 95239c34fe675e77c59b59ad0b55c4a7846afdb4 Mon Sep 17 00:00:00 2001 From: wh1te_r0s3 Date: Thu, 24 Apr 2025 01:05:14 +0330 Subject: [PATCH] Blake3 has been added, profile has been updated --- docs/crypto/mindmap/index.md | 2 +- docs/crypto/wiki/CRT/chinese-remainder-theorem.md | 2 +- docs/crypto/wiki/dhke/diffie-hellman-key-exchange.md | 2 +- docs/crypto/wiki/euclidean-algorithm/euclidean-algorithm.md | 2 +- docs/crypto/wiki/fermat-little-theorem/fermat-little-theorem.md | 2 +- docs/crypto/wiki/modular-binomials/modular-binomials.md | 2 +- docs/crypto/wiki/quadratic-residues/quadratic-residues.md | 2 +- docs/crypto/wiki/rsa/rsa.md | 2 +- docs/crypto/wiki/tonelli-shanks/tonelli-shanks.md | 2 +- docs/crypto/writeups/2024/0xL4ughCTF/RSA-GCD.md | 2 +- docs/crypto/writeups/2024/BYUCTF/AreSA.md | 2 +- docs/crypto/writeups/2024/BYUCTF/Austen-Supremacy.md | 2 +- docs/crypto/writeups/2024/BYUCTF/Times.md | 2 +- docs/crypto/writeups/2024/IdekCTF/GoldenTicket.md | 2 +- docs/crypto/writeups/2024/LITCTF/SymmetricRSA.md | 2 +- docs/crypto/writeups/2024/SDCTF/ComplexProblem.md | 2 +- docs/crypto/writeups/2024/Urmia-CTF/Karaball.md | 2 +- 17 files changed, 17 insertions(+), 17 deletions(-) diff --git a/docs/crypto/mindmap/index.md b/docs/crypto/mindmap/index.md index d6cf8d442..f5d4ca509 100644 --- a/docs/crypto/mindmap/index.md +++ b/docs/crypto/mindmap/index.md @@ -33,7 +33,7 @@ tags: (getOptions || markmap.deriveOptions)(jsonOptions), root2 ); - })(() => window.markmap,null,{"content":"Cryptography","children":[{"content":"
Classical Cryptography
","children":[{"content":"
Permutation Ciphers
","children":[{"content":"\n
Scytale
","children":[],"payload":{"lines":"6,8"}},{"content":"\n
Rail Fence
","children":[],"payload":{"lines":"8,10"}},{"content":"\n
Columnar Transposition
","children":[],"payload":{"lines":"10,12"}},{"content":"\n
Myszkowski
","children":[],"payload":{"lines":"12,14"}}],"payload":{"lines":"4,5"}},{"content":"
Substitution Ciphers
","children":[{"content":"\n
Monoalphabetic
","children":[{"content":"\n
Caesar
","children":[],"payload":{"lines":"18,20"}},{"content":"\n
Playfair
","children":[],"payload":{"lines":"20,22"}},{"content":"\n
Atbash
","children":[],"payload":{"lines":"22,25"}}],"payload":{"lines":"16,25"}},{"content":"\n
Polyalphabetic
","children":[{"content":"\n
Vigenère
","children":[],"payload":{"lines":"27,29"}},{"content":"\n
Beaufort
","children":[],"payload":{"lines":"29,31"}},{"content":"\n
Hill
","children":[],"payload":{"lines":"31,33"}},{"content":"\n
Enigma machine
","children":[],"payload":{"lines":"33,36"}}],"payload":{"lines":"25,36"}}],"payload":{"lines":"14,15"}},{"content":"
Hybrid Ciphers
","children":[{"content":"\n
ADFGX
","children":[],"payload":{"lines":"38,40"}},{"content":"\n
ADFGVX
","children":[],"payload":{"lines":"40,42"}},{"content":"\n
Bifid
","children":[],"payload":{"lines":"42,45"}}],"payload":{"lines":"36,37"}}],"payload":{"lines":"2,3"}},{"content":"
Modern Cryptography
","children":[{"content":"
Symmetric Cryptography
","children":[{"content":"\n
Stream Ciphers
","children":[{"content":"\n
ChaCha20
","children":[],"payload":{"lines":"52,54"}},{"content":"\n
Salsa20
","children":[],"payload":{"lines":"54,56"}},{"content":"\n
RC4
","children":[],"payload":{"lines":"56,59"}}],"payload":{"lines":"50,59"}},{"content":"\n
Block Ciphers
","children":[{"content":"\n
Feistel
","children":[],"payload":{"lines":"61,63"}},{"content":"\n
DES
","children":[],"payload":{"lines":"63,65"}},{"content":"\n
DES3
","children":[],"payload":{"lines":"65,67"}},{"content":"\n
AES
","children":[],"payload":{"lines":"67,69"}},{"content":"\n
Blowfish
","children":[],"payload":{"lines":"69,71"}},{"content":"\n
Twofish
","children":[],"payload":{"lines":"71,74"}}],"payload":{"lines":"59,74"}},{"content":"\n
Modes of Operation
","children":[{"content":"\n
ECB
","children":[],"payload":{"lines":"76,78"}},{"content":"\n
CBC
","children":[],"payload":{"lines":"78,79"}},{"content":"\n
CFB
","children":[],"payload":{"lines":"79,81"}},{"content":"\n
OFB
","children":[],"payload":{"lines":"81,83"}},{"content":"\n
CTR
","children":[],"payload":{"lines":"83,86"}}],"payload":{"lines":"74,86"}}],"payload":{"lines":"48,49"}},{"content":"
Asymmetric Cryptography
","children":[{"content":"\n
Encryption
","children":[{"content":"\n
RSA
","children":[],"payload":{"lines":"90,92"}},{"content":"\n
Merkle–Hellman knapsack
","children":[],"payload":{"lines":"92,94"}},{"content":"\n
ElGamal
","children":[],"payload":{"lines":"94,96"}},{"content":"\n
ECC
","children":[{"content":"\n
Curve25519
","children":[],"payload":{"lines":"98,100"}},{"content":"\n
P-256
","children":[],"payload":{"lines":"100,102"}}],"payload":{"lines":"96,102"}}],"payload":{"lines":"88,102"}},{"content":"\n
Key Exchange
","children":[{"content":"\n
DH
","children":[],"payload":{"lines":"104,106"}},{"content":"\n
ECDH
","children":[],"payload":{"lines":"106,108"}}],"payload":{"lines":"102,108"}},{"content":"\n
Signature
","children":[{"content":"\n
RSA
","children":[],"payload":{"lines":"110,112"}},{"content":"\n
ElGamal
","children":[],"payload":{"lines":"112,114"}},{"content":"\n
DSA
","children":[],"payload":{"lines":"114,116"}},{"content":"\n
ECDSA
","children":[],"payload":{"lines":"116,118"}},{"content":"\n
Schnorr
","children":[],"payload":{"lines":"118,121"}}],"payload":{"lines":"108,121"}}],"payload":{"lines":"86,87"}}],"payload":{"lines":"45,46"}},{"content":"
Post-quantum Cryptography
","children":[{"content":"
Lattice-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"\n
NTRUEncrypt
","children":[],"payload":{"lines":"127,129"}},{"content":"\n
Kyber
","children":[],"payload":{"lines":"129,131"}},{"content":"\n

FrodoKEM

","children":[],"payload":{"lines":"131,132"}}],"payload":{"lines":"125,132"}},{"content":"\n

Signature

","children":[{"content":"Dilithium","children":[],"payload":{"lines":"133,134"}},{"content":"Falcon","children":[],"payload":{"lines":"134,136"}}],"payload":{"lines":"132,136"}}],"payload":{"lines":"123,124"}},{"content":"
Code-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"Niederreiter","children":[],"payload":{"lines":"140,141"}},{"content":"Classic McEliece","children":[],"payload":{"lines":"141,142"}},{"content":"Bike","children":[],"payload":{"lines":"142,143"}}],"payload":{"lines":"138,143"}},{"content":"\n

Signature

","children":[{"content":"Niederreiter","children":[],"payload":{"lines":"144,146"}}],"payload":{"lines":"143,146"}}],"payload":{"lines":"136,137"}},{"content":"
Hash-based Signatures
","children":[{"content":"XMSS","children":[],"payload":{"lines":"148,149"}},{"content":"Sphincs+","children":[],"payload":{"lines":"149,151"}}],"payload":{"lines":"146,147"}},{"content":"
Multivariate-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"Matsumoto-Imai","children":[],"payload":{"lines":"156,157"}},{"content":"HFE","children":[],"payload":{"lines":"157,158"}}],"payload":{"lines":"154,158"}},{"content":"\n

Signature

","children":[{"content":"Matsumoto-Imai","children":[],"payload":{"lines":"159,160"}},{"content":"Rainbow","children":[],"payload":{"lines":"160,162"}}],"payload":{"lines":"158,162"}}],"payload":{"lines":"151,152"}},{"content":"
Isogeny-based
","children":[{"content":"Sike","children":[],"payload":{"lines":"164,167"}}],"payload":{"lines":"162,163"}}],"payload":{"lines":"121,122"}},{"content":"
Hash Functions
","children":[{"content":"MD5","children":[],"payload":{"lines":"169,170"}},{"content":"SHA-1","children":[],"payload":{"lines":"170,171"}},{"content":"SHA-2 (SHA-256, SHA-512)","children":[],"payload":{"lines":"171,172"}},{"content":"SHA-3 (Keccak)","children":[],"payload":{"lines":"172,173"}},{"content":"HMAC (Hash-based Message Authentication Code)","children":[],"payload":{"lines":"173,174"}},{"content":"BLAKE2","children":[],"payload":{"lines":"174,175"}},{"content":"PBKDF2 (Password-Based Key Derivation Function 2)","children":[],"payload":{"lines":"175,176"}},{"content":"bcrypt","children":[],"payload":{"lines":"176,177"}},{"content":"Argon2","children":[],"payload":{"lines":"177,180"}}],"payload":{"lines":"167,168"}},{"content":"
Main Threats
","children":[{"content":"\n

Brute Force Attack

","children":[],"payload":{"lines":"183,185"}},{"content":"\n

Frequency Analysis (Classical Ciphers)

","children":[],"payload":{"lines":"185,187"}},{"content":"\n

Known-plaintext Attack

","children":[],"payload":{"lines":"187,189"}},{"content":"\n

Chosen-plaintext Attack

","children":[],"payload":{"lines":"189,191"}},{"content":"\n

Chosen-ciphertext Attack

","children":[],"payload":{"lines":"191,193"}},{"content":"\n

Meet-in-the-Middle Attack

","children":[],"payload":{"lines":"193,195"}},{"content":"\n

Side-Channel Attacks

","children":[{"content":"\n

Timing Attacks

","children":[],"payload":{"lines":"196,198"}},{"content":"\n

Power Analysis

","children":[],"payload":{"lines":"198,200"}}],"payload":{"lines":"195,200"}},{"content":"\n

Differential Cryptanalysis

","children":[],"payload":{"lines":"200,202"}},{"content":"\n

Linear Cryptanalysis

","children":[],"payload":{"lines":"202,204"}},{"content":"\n

Padding Oracle Attacks

","children":[],"payload":{"lines":"204,206"}},{"content":"\n

Quantum computing

","children":[{"content":"Shor's Algorithm","children":[],"payload":{"lines":"207,208"}},{"content":"Grover's Algorithm","children":[],"payload":{"lines":"208,210"}}],"payload":{"lines":"206,210"}}],"payload":{"lines":"180,181","fold":1}},{"content":"
Misc Algorithms
","children":[{"content":"\n

Homomorphic Encryption

","children":[{"content":"\n

Partial Homomorphic (PHE)

","children":[{"content":"RSA","children":[],"payload":{"lines":"214,215"}},{"content":"Paillier","children":[],"payload":{"lines":"215,217"}}],"payload":{"lines":"213,217"}},{"content":"\n

Fully Homomorphic (FHE)

","children":[{"content":"CKKS","children":[],"payload":{"lines":"218,219"}},{"content":"BVG","children":[],"payload":{"lines":"219,220"}}],"payload":{"lines":"217,220"}}],"payload":{"lines":"211,220"}},{"content":"\n

Secret Sharing

","children":[],"payload":{"lines":"220,221"}},{"content":"\n

Linear Feedback Shift Register (LFSR)

","children":[],"payload":{"lines":"221,222"}},{"content":"\n

Commitment scheme

","children":[{"content":"Pedersen Commitment","children":[],"payload":{"lines":"223,227"}}],"payload":{"lines":"222,227"}}],"payload":{"lines":"210,211","fold":1}}],"payload":{"lines":"0,1"}},{"colorFreezeLevel":3,"initialExpandLevel":3}) + })(() => window.markmap,null,{"content":"Cryptography","children":[{"content":"
Classical Cryptography
","children":[{"content":"
Permutation Ciphers
","children":[{"content":"\n
Scytale
","children":[],"payload":{"lines":"6,8"}},{"content":"\n
Rail Fence
","children":[],"payload":{"lines":"8,10"}},{"content":"\n
Columnar Transposition
","children":[],"payload":{"lines":"10,12"}},{"content":"\n
Myszkowski
","children":[],"payload":{"lines":"12,14"}}],"payload":{"lines":"4,5"}},{"content":"
Substitution Ciphers
","children":[{"content":"\n
Monoalphabetic
","children":[{"content":"\n
Caesar
","children":[],"payload":{"lines":"18,20"}},{"content":"\n
Playfair
","children":[],"payload":{"lines":"20,22"}},{"content":"\n
Atbash
","children":[],"payload":{"lines":"22,25"}}],"payload":{"lines":"16,25"}},{"content":"\n
Polyalphabetic
","children":[{"content":"\n
Vigenère
","children":[],"payload":{"lines":"27,29"}},{"content":"\n
Beaufort
","children":[],"payload":{"lines":"29,31"}},{"content":"\n
Hill
","children":[],"payload":{"lines":"31,33"}},{"content":"\n
Enigma machine
","children":[],"payload":{"lines":"33,36"}}],"payload":{"lines":"25,36"}}],"payload":{"lines":"14,15"}},{"content":"
Hybrid Ciphers
","children":[{"content":"\n
ADFGX
","children":[],"payload":{"lines":"38,40"}},{"content":"\n
ADFGVX
","children":[],"payload":{"lines":"40,42"}},{"content":"\n
Bifid
","children":[],"payload":{"lines":"42,45"}}],"payload":{"lines":"36,37"}}],"payload":{"lines":"2,3"}},{"content":"
Modern Cryptography
","children":[{"content":"
Symmetric Cryptography
","children":[{"content":"\n
Stream Ciphers
","children":[{"content":"\n
ChaCha20
","children":[],"payload":{"lines":"52,54"}},{"content":"\n
Salsa20
","children":[],"payload":{"lines":"54,56"}},{"content":"\n
RC4
","children":[],"payload":{"lines":"56,59"}}],"payload":{"lines":"50,59"}},{"content":"\n
Block Ciphers
","children":[{"content":"\n
Feistel
","children":[],"payload":{"lines":"61,63"}},{"content":"\n
DES
","children":[],"payload":{"lines":"63,65"}},{"content":"\n
DES3
","children":[],"payload":{"lines":"65,67"}},{"content":"\n
AES
","children":[],"payload":{"lines":"67,69"}},{"content":"\n
Blowfish
","children":[],"payload":{"lines":"69,71"}},{"content":"\n
Twofish
","children":[],"payload":{"lines":"71,74"}}],"payload":{"lines":"59,74"}},{"content":"\n
Modes of Operation
","children":[{"content":"\n
ECB
","children":[],"payload":{"lines":"76,78"}},{"content":"\n
CBC
","children":[],"payload":{"lines":"78,79"}},{"content":"\n
CFB
","children":[],"payload":{"lines":"79,81"}},{"content":"\n
OFB
","children":[],"payload":{"lines":"81,83"}},{"content":"\n
CTR
","children":[],"payload":{"lines":"83,86"}}],"payload":{"lines":"74,86"}}],"payload":{"lines":"48,49"}},{"content":"
Asymmetric Cryptography
","children":[{"content":"\n
Encryption
","children":[{"content":"\n
RSA
","children":[],"payload":{"lines":"90,92"}},{"content":"\n
Merkle–Hellman knapsack
","children":[],"payload":{"lines":"92,94"}},{"content":"\n
ElGamal
","children":[],"payload":{"lines":"94,96"}},{"content":"\n
ECC
","children":[{"content":"\n
Curve25519
","children":[],"payload":{"lines":"98,100"}},{"content":"\n
P-256
","children":[],"payload":{"lines":"100,102"}}],"payload":{"lines":"96,102"}}],"payload":{"lines":"88,102"}},{"content":"\n
Key Exchange
","children":[{"content":"\n
DH
","children":[],"payload":{"lines":"104,106"}},{"content":"\n
ECDH
","children":[],"payload":{"lines":"106,108"}}],"payload":{"lines":"102,108"}},{"content":"\n
Signature
","children":[{"content":"\n
RSA
","children":[],"payload":{"lines":"110,112"}},{"content":"\n
ElGamal
","children":[],"payload":{"lines":"112,114"}},{"content":"\n
DSA
","children":[],"payload":{"lines":"114,116"}},{"content":"\n
ECDSA
","children":[],"payload":{"lines":"116,118"}},{"content":"\n
Schnorr
","children":[],"payload":{"lines":"118,121"}}],"payload":{"lines":"108,121"}}],"payload":{"lines":"86,87"}}],"payload":{"lines":"45,46"}},{"content":"
Post-quantum Cryptography
","children":[{"content":"
Lattice-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"\n
NTRUEncrypt
","children":[],"payload":{"lines":"127,129"}},{"content":"\n
Kyber
","children":[],"payload":{"lines":"129,131"}},{"content":"\n

FrodoKEM

","children":[],"payload":{"lines":"131,132"}}],"payload":{"lines":"125,132"}},{"content":"\n

Signature

","children":[{"content":"Dilithium","children":[],"payload":{"lines":"133,134"}},{"content":"Falcon","children":[],"payload":{"lines":"134,136"}}],"payload":{"lines":"132,136"}}],"payload":{"lines":"123,124"}},{"content":"
Code-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"Niederreiter","children":[],"payload":{"lines":"140,141"}},{"content":"Classic McEliece","children":[],"payload":{"lines":"141,142"}},{"content":"Bike","children":[],"payload":{"lines":"142,143"}}],"payload":{"lines":"138,143"}},{"content":"\n

Signature

","children":[{"content":"Niederreiter","children":[],"payload":{"lines":"144,146"}}],"payload":{"lines":"143,146"}}],"payload":{"lines":"136,137"}},{"content":"
Hash-based Signatures
","children":[{"content":"XMSS","children":[],"payload":{"lines":"148,149"}},{"content":"Sphincs+","children":[],"payload":{"lines":"149,151"}}],"payload":{"lines":"146,147"}},{"content":"
Multivariate-based
","children":[{"content":"\n
Key Encapsulation
","children":[{"content":"Matsumoto-Imai","children":[],"payload":{"lines":"156,157"}},{"content":"HFE","children":[],"payload":{"lines":"157,158"}}],"payload":{"lines":"154,158"}},{"content":"\n

Signature

","children":[{"content":"Matsumoto-Imai","children":[],"payload":{"lines":"159,160"}},{"content":"Rainbow","children":[],"payload":{"lines":"160,162"}}],"payload":{"lines":"158,162"}}],"payload":{"lines":"151,152"}},{"content":"
Isogeny-based
","children":[{"content":"Sike","children":[],"payload":{"lines":"164,167"}}],"payload":{"lines":"162,163"}}],"payload":{"lines":"121,122"}},{"content":"
Hash Functions
","children":[{"content":"MD5","children":[],"payload":{"lines":"169,170"}},{"content":"SHA-1","children":[],"payload":{"lines":"170,171"}},{"content":"SHA-2 (SHA-256, SHA-512)","children":[],"payload":{"lines":"171,172"}},{"content":"SHA-3 (Keccak)","children":[],"payload":{"lines":"172,173"}},{"content":"HMAC (Hash-based Message Authentication Code)","children":[],"payload":{"lines":"173,174"}},{"content":"BLAKE2, BLAKE3","children":[],"payload":{"lines":"174,175"}},{"content":"PBKDF2 (Password-Based Key Derivation Function 2)","children":[],"payload":{"lines":"175,176"}},{"content":"bcrypt","children":[],"payload":{"lines":"176,177"}},{"content":"Argon2","children":[],"payload":{"lines":"177,180"}}],"payload":{"lines":"167,168"}},{"content":"
Main Threats
","children":[{"content":"\n

Brute Force Attack

","children":[],"payload":{"lines":"183,185"}},{"content":"\n

Frequency Analysis (Classical Ciphers)

","children":[],"payload":{"lines":"185,187"}},{"content":"\n

Known-plaintext Attack

","children":[],"payload":{"lines":"187,189"}},{"content":"\n

Chosen-plaintext Attack

","children":[],"payload":{"lines":"189,191"}},{"content":"\n

Chosen-ciphertext Attack

","children":[],"payload":{"lines":"191,193"}},{"content":"\n

Meet-in-the-Middle Attack

","children":[],"payload":{"lines":"193,195"}},{"content":"\n

Side-Channel Attacks

","children":[{"content":"\n

Timing Attacks

","children":[],"payload":{"lines":"196,198"}},{"content":"\n

Power Analysis

","children":[],"payload":{"lines":"198,200"}}],"payload":{"lines":"195,200"}},{"content":"\n

Differential Cryptanalysis

","children":[],"payload":{"lines":"200,202"}},{"content":"\n

Linear Cryptanalysis

","children":[],"payload":{"lines":"202,204"}},{"content":"\n

Padding Oracle Attacks

","children":[],"payload":{"lines":"204,206"}},{"content":"\n

Quantum computing

","children":[{"content":"Shor's Algorithm","children":[],"payload":{"lines":"207,208"}},{"content":"Grover's Algorithm","children":[],"payload":{"lines":"208,210"}}],"payload":{"lines":"206,210"}}],"payload":{"lines":"180,181","fold":1}},{"content":"
Misc Algorithms
","children":[{"content":"\n

Homomorphic Encryption

","children":[{"content":"\n

Partial Homomorphic (PHE)

","children":[{"content":"RSA","children":[],"payload":{"lines":"214,215"}},{"content":"Paillier","children":[],"payload":{"lines":"215,217"}}],"payload":{"lines":"213,217"}},{"content":"\n

Fully Homomorphic (FHE)

","children":[{"content":"CKKS","children":[],"payload":{"lines":"218,219"}},{"content":"BVG","children":[],"payload":{"lines":"219,220"}}],"payload":{"lines":"217,220"}}],"payload":{"lines":"211,220"}},{"content":"\n

Secret Sharing

","children":[],"payload":{"lines":"220,221"}},{"content":"\n

Linear Feedback Shift Register (LFSR)

","children":[],"payload":{"lines":"221,222"}},{"content":"\n

Commitment scheme

","children":[{"content":"Pedersen Commitment","children":[],"payload":{"lines":"223,227"}}],"payload":{"lines":"222,227"}}],"payload":{"lines":"210,211","fold":1}}],"payload":{"lines":"0,1"}},{"colorFreezeLevel":3,"initialExpandLevel":3}) --- diff --git a/docs/crypto/wiki/CRT/chinese-remainder-theorem.md b/docs/crypto/wiki/CRT/chinese-remainder-theorem.md index 542399226..6b2ac0af0 100644 --- a/docs/crypto/wiki/CRT/chinese-remainder-theorem.md +++ b/docs/crypto/wiki/CRT/chinese-remainder-theorem.md @@ -50,4 +50,4 @@ x = CRT(b_list, n_list) --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/dhke/diffie-hellman-key-exchange.md b/docs/crypto/wiki/dhke/diffie-hellman-key-exchange.md index d2d21e5c3..74878b9e4 100644 --- a/docs/crypto/wiki/dhke/diffie-hellman-key-exchange.md +++ b/docs/crypto/wiki/dhke/diffie-hellman-key-exchange.md @@ -49,4 +49,4 @@ txgK: --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/euclidean-algorithm/euclidean-algorithm.md b/docs/crypto/wiki/euclidean-algorithm/euclidean-algorithm.md index 3c90a7721..d58709ef5 100644 --- a/docs/crypto/wiki/euclidean-algorithm/euclidean-algorithm.md +++ b/docs/crypto/wiki/euclidean-algorithm/euclidean-algorithm.md @@ -146,4 +146,4 @@ _,x,y = xgcd(252, 105) --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/fermat-little-theorem/fermat-little-theorem.md b/docs/crypto/wiki/fermat-little-theorem/fermat-little-theorem.md index 091754145..64fb75033 100644 --- a/docs/crypto/wiki/fermat-little-theorem/fermat-little-theorem.md +++ b/docs/crypto/wiki/fermat-little-theorem/fermat-little-theorem.md @@ -36,4 +36,4 @@ $$2^{7} - 2\equiv 126 \equiv 7 \times 18 \equiv 0 \pmod{7}$$ --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/modular-binomials/modular-binomials.md b/docs/crypto/wiki/modular-binomials/modular-binomials.md index 9297a7cbc..5da22d9cf 100644 --- a/docs/crypto/wiki/modular-binomials/modular-binomials.md +++ b/docs/crypto/wiki/modular-binomials/modular-binomials.md @@ -88,4 +88,4 @@ $$ --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/quadratic-residues/quadratic-residues.md b/docs/crypto/wiki/quadratic-residues/quadratic-residues.md index 1a3b4ffc2..aa36d07f5 100644 --- a/docs/crypto/wiki/quadratic-residues/quadratic-residues.md +++ b/docs/crypto/wiki/quadratic-residues/quadratic-residues.md @@ -53,4 +53,4 @@ $$6^{2} \equiv 36 \equiv 1 \pmod{7}$$ --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/rsa/rsa.md b/docs/crypto/wiki/rsa/rsa.md index e25593c78..b8088bc3e 100644 --- a/docs/crypto/wiki/rsa/rsa.md +++ b/docs/crypto/wiki/rsa/rsa.md @@ -83,4 +83,4 @@ $$M \equiv C^d \equiv 2790^{2753} \equiv 65 \pmod{N}$$ --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/wiki/tonelli-shanks/tonelli-shanks.md b/docs/crypto/wiki/tonelli-shanks/tonelli-shanks.md index fbc0d7417..1017cba9a 100644 --- a/docs/crypto/wiki/tonelli-shanks/tonelli-shanks.md +++ b/docs/crypto/wiki/tonelli-shanks/tonelli-shanks.md @@ -66,4 +66,4 @@ print("roots : %d, %d" % (r, p - r)) --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/writeups/2024/0xL4ughCTF/RSA-GCD.md b/docs/crypto/writeups/2024/0xL4ughCTF/RSA-GCD.md index 2958c08ab..2dd609a40 100644 --- a/docs/crypto/writeups/2024/0xL4ughCTF/RSA-GCD.md +++ b/docs/crypto/writeups/2024/0xL4ughCTF/RSA-GCD.md @@ -211,5 +211,5 @@ print(long_to_bytes(pow(c, d, n))) !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li) diff --git a/docs/crypto/writeups/2024/BYUCTF/AreSA.md b/docs/crypto/writeups/2024/BYUCTF/AreSA.md index 0e35d62e4..d01dfe9df 100644 --- a/docs/crypto/writeups/2024/BYUCTF/AreSA.md +++ b/docs/crypto/writeups/2024/BYUCTF/AreSA.md @@ -50,5 +50,5 @@ long_to_bytes(pow(c, d, n)) !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li) diff --git a/docs/crypto/writeups/2024/BYUCTF/Austen-Supremacy.md b/docs/crypto/writeups/2024/BYUCTF/Austen-Supremacy.md index 075e8f195..08708bb2e 100644 --- a/docs/crypto/writeups/2024/BYUCTF/Austen-Supremacy.md +++ b/docs/crypto/writeups/2024/BYUCTF/Austen-Supremacy.md @@ -36,6 +36,6 @@ Chapter.Paragraph.Character !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3), + [MohamadAli](https://github.com/w0h4w4d4li), [HIGHer](https://twitter.com/HIGH01012) diff --git a/docs/crypto/writeups/2024/BYUCTF/Times.md b/docs/crypto/writeups/2024/BYUCTF/Times.md index 56fa38a1c..d0bb8c605 100644 --- a/docs/crypto/writeups/2024/BYUCTF/Times.md +++ b/docs/crypto/writeups/2024/BYUCTF/Times.md @@ -154,5 +154,5 @@ decrypt_flag(shared_secret, ciphertext_dict) !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li) diff --git a/docs/crypto/writeups/2024/IdekCTF/GoldenTicket.md b/docs/crypto/writeups/2024/IdekCTF/GoldenTicket.md index 182cdad24..68154cea4 100644 --- a/docs/crypto/writeups/2024/IdekCTF/GoldenTicket.md +++ b/docs/crypto/writeups/2024/IdekCTF/GoldenTicket.md @@ -123,4 +123,4 @@ long_to_bytes(m) --- !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) \ No newline at end of file + [MohamadAli](https://github.com/w0h4w4d4li) \ No newline at end of file diff --git a/docs/crypto/writeups/2024/LITCTF/SymmetricRSA.md b/docs/crypto/writeups/2024/LITCTF/SymmetricRSA.md index 021380fe6..018964e92 100644 --- a/docs/crypto/writeups/2024/LITCTF/SymmetricRSA.md +++ b/docs/crypto/writeups/2024/LITCTF/SymmetricRSA.md @@ -147,5 +147,5 @@ print(long_to_bytes(flag)) !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li) diff --git a/docs/crypto/writeups/2024/SDCTF/ComplexProblem.md b/docs/crypto/writeups/2024/SDCTF/ComplexProblem.md index bbd3fac4b..80fd8f42e 100644 --- a/docs/crypto/writeups/2024/SDCTF/ComplexProblem.md +++ b/docs/crypto/writeups/2024/SDCTF/ComplexProblem.md @@ -235,5 +235,5 @@ $$ !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li) diff --git a/docs/crypto/writeups/2024/Urmia-CTF/Karaball.md b/docs/crypto/writeups/2024/Urmia-CTF/Karaball.md index 1125181ba..e1868cdb9 100644 --- a/docs/crypto/writeups/2024/Urmia-CTF/Karaball.md +++ b/docs/crypto/writeups/2024/Urmia-CTF/Karaball.md @@ -250,5 +250,5 @@ Gprime = ZZ(kprimeinv) * Q !!! نویسنده - [MohamadAli](https://github.com/wh1te-r0s3) + [MohamadAli](https://github.com/w0h4w4d4li)