Question: Static and Dynamic Analysis for Finding Cryptographic Asset ( Considering DH algorithm implementation ) Objective: Static Analysis of a cryptographic algorithm's implementation Dynamic Analysis of
Static and Dynamic Analysis for Finding Cryptographic Asset Considering DH algorithm implementation Objective: Static Analysis of a cryptographic algorithm's implementation Dynamic Analysis of a cryptographic algorithm's implementation Finding cryptographic asset by reversing a binary of a cryptographic algorithm implementation. What to do: You should download the binary from DHModifiedLast.exe and reverse it by using IDAPro disassembler. By reverse engineering and debugging the binary, find the following: Alice's random private key Bob's random Private key Alice's exchanged public parameter YA Bob's exchanged public parameter YB The corresponding generated session key between ALICE and BOB Write a report of your work providing the screen shots. Static analysis report: Analyze the implementation from static point of view what information is available without debugging the program o Eg can you find the keys or any cryptographic assets? o Any information available regarding the functions and the variables Dynamic analysis report: Analyze the implementation from dynamic point of view what information is available when you are debugging the program o Eg can you find the private keys o Can you find the public keys? o What is the ordering of the bytes within a multibyte number in memory mapping a bigendian ordering or a littleendian ordering
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
