Cryptography with Python 5: Using insecure AES-ECB in Python

preview_player
Показать описание

⏰ Timestamps for content in this video ⏰

00:00 Recap of the AES block cipher and the ECB block cipher mode of operation
01:19 Using AES-ECB in Python
08:17 Demonstrating the insecurity of AES-ECB with Python

🔷🔷 About 🔷🔷

This Fundamental Cryptography in Theory and Python lesson presents, how AES-ECB can be used in Python and demonstrates, why ECB as a block cipher mode of operation is considered to be highly insecure.

All code demonstrated serves educational purposes only.

📝 Resources used and created for code lessons 📝

Рекомендации по теме
Комментарии
Автор

📝 All resources used and created for code lessons can be found here:

cyrillgossi
Автор

Your demonstration of the ECB design flaw is amazing. I had heard of that flaw, but I never saw it in a real life demonstration. It's really worrying that people didn't notice the flaw when they designed ECB mode though. I mean, I thought the algorithm was NSA-approved etc. I guess we can only hope that CTR and the other modes are safe...

julianmahler
Автор

I also implemented the encryption with ECB using my kitty image file as a more practical example.
Amazingly, the encrypted output seemed to be totally secure(actually NOT!!) for human eyes.
If the input image content is not so simple as this example, one can easily "misunderstand" the output were securely encrypted.

gyhsxlu
Автор

10:07 from where we can get how many bytes certain header of file / extension have?
I'm asking because I downloaded two .ppm files from Internet, both having different first 17 bytes and I'm not able to open it via MS Paint after encrypting :)

radosawberlinski
Автор

Hi, thanks for the video. I don't know to to find the header size of specific ppm image I downloaded. Would you please recommended any video or source for this? Thanks in advance.

aytacaliyeva
Автор

Hello, thank you for a great video. Do you have the code available online?

ihgnmah
Автор

Hi, could you share the ppm image you used? I tried to reproduce the result but failed since I couldn't find the image online.

ihgnmah