Question: Static and Dynamic Analysis for Finding Cryptographic Asset ( Considering DH algorithm implementation ) Objective: Static Analysis of a cryptographic algorithm's implementation Dynamic Analysis of

Static and Dynamic Analysis for Finding Cryptographic Asset (Considering DH algorithm implementation) Objective: Static Analysis of a cryptographic algorithm's implementation Dynamic Analysis of a cryptographic algorithm's implementation Finding cryptographic asset by reversing a binary of a cryptographic algorithm implementation. What to do: You should download the binary from (DH-Modified-Last.exe) and reverse it by using IDA-Pro disassembler. By reverse engineering and debugging the binary, find the following: 1) Alice's random private key 2) Bob's random Private key 3) Alice's exchanged public parameter (YA)4) Bob's exchanged public parameter (YB)5) The corresponding generated session key between ALICE and BOB Write a report of your work providing the screen shots. Static analysis report: Analyze the implementation from static point of view (what information is available without debugging the program) o E.g., can you find the keys or any cryptographic assets? o Any information available regarding the functions and the variables Dynamic analysis report: Analyze the implementation from dynamic point of view (what information is available when you are debugging the program) o E.g., can you find the private keys o Can you find the public keys? o What is the ordering of the bytes within a multi-byte number in memory mapping (a big-endian ordering or a little-endian ordering)?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!