Playing around with MQTT Protocol

Recently, I happened to come across MQTT Protocol while doing background work for a project as a part of IoT course offered at the University. I liked it due to reasons which I will justify, hence this blog post! I spent some time yesterday looking at the working and specifications of MQTT v3.1.1 from the blog post by teserakt and through the documentation: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.html, since I enjoy reading about the protocols and their implementation....

November 4, 2018 · Ashutosh Ahelleya

Announcing Crypton v1.0

In this blog post, I will be talking about my new library Crypton, my journey of building this library, future plans and much more! Check out the library on GitHub: https://github.com/ashutosh1206/Crypton Introduction This library is an attempt by the author to help provide a platform to learn and practice Offensive and Defensive cryptography for people interested in this field . With the increasing number of attacks on implementations of cryptographic protocols every year, it has become essential that we give as much importance to secure implementation of these protocols as we give to internals of the protocol itself....

August 12, 2018 · Ashutosh Ahelleya

Finite Fields - Number Theory

This blog post covers one of the most important Mathematical Structures for Cryptography- Fields. It is used in both Symmetric and Asymmetric key Cryptography. This blog post gives a basic introduction to Finite Fields and arithmetic operations on it, but I hope the purpose of it is served- to make people, who don’t have basic knowledge about this, understand a few upcoming CTF write-ups, that are based on Finite Fields....

November 28, 2017 · Ashutosh Ahelleya

Blinding Attack on RSA Signatures

This blog primarily focuses on Blinding Attack- an elementary vulnerability in unpadded RSA digital signature algorithm that can be exploited to forge signatures. The working and properties of Digital Signatures will be described before directly jumping onto the attack. In the end, we discuss ways to prevent this attack. Unpadded Digital Signatures using RSA RSA is a kind of Trapdoor One-way Function. Wikipedia describes a one-way function as a function that is easy to compute on every input, but hard to invert given the image of a random input....

July 10, 2017 · Ashutosh Ahelleya

Polynomial Interpolation

I have been reading the paper – “How to Share a Secret” in detail for the past few weeks, a revolutionary research paper written by Adi Shamir. This paper, applies some of the concepts of Number Theory and Algebra, one of which is polynomial interpolation, and has been used to construct a secure and reliable key management system. The theorem is simple and easy to understand, and has been applied in the best way one ever could....

May 31, 2017 · Ashutosh Ahelleya