diff options
author | cyfraeviolae <cyfraeviolae> | 2022-08-28 03:30:17 -0400 |
---|---|---|
committer | cyfraeviolae <cyfraeviolae> | 2022-08-28 03:30:17 -0400 |
commit | 323051cdf9ad7f70a77085977270fb969d5b733a (patch) | |
tree | 54d59f70f9fe881c07eaa29afd94e7d62895e61c | |
parent | e557c17a57720158f314151839eb56fab2b1d75a (diff) |
specify gcm
-rw-r--r-- | templates/index.html | 4 | ||||
-rw-r--r-- | templates/key-commitment.html | 4 | ||||
-rw-r--r-- | templates/mac-truncation.html | 2 |
3 files changed, 5 insertions, 5 deletions
diff --git a/templates/index.html b/templates/index.html index 89ae0e1..c6d978d 100644 --- a/templates/index.html +++ b/templates/index.html @@ -38,7 +38,7 @@ <strong><a href="/forbidden-salamanders/key-commitment">Key commitment</a>.</strong> One of our agents has infiltrated Roseacrucis’ inner circle, but all secret keys are required to be surrendered to the - counterintelligence authority. Help her send ciphertexts back to + counterintelligence authority. Help her send AES-GCM ciphertexts back to the Library that decrypt to confidential information under one key, but innocuous banter under another. </p> @@ -51,7 +51,7 @@ <p> <strong><a href="/forbidden-salamanders/mac-truncation">MAC truncation</a>.</strong> The sorcerer aims to conserve - bandwidth by truncating MACs. Use the enemy as a decryption + bandwidth by truncating AES-GCM MACs. Use the enemy as a decryption oracle to once again, recover the authentication key and forge arbitrary ciphertext. </p> diff --git a/templates/key-commitment.html b/templates/key-commitment.html index 026d6ae..a2b1b33 100644 --- a/templates/key-commitment.html +++ b/templates/key-commitment.html @@ -29,7 +29,7 @@ <strong>Key commitment.</strong> One of our agents has infiltrated Roseacrucis’ inner circle, but all secret keys are required to be surrendered to the - counterintelligence authority. Help her send ciphertexts back to + counterintelligence authority. Help her send AES-GCM ciphertexts back to the Library that decrypt to confidential information under one key, but innocuous banter under another. </p> @@ -74,7 +74,7 @@ <br><div><em> The agent now computes two keys, a nonce and constructs a single - ciphertext. When decrypted under the first key, it will look + AES-GCM ciphertext. When decrypted under the first key, it will look identical to the JPEG file; when decrypted under the second key, it will look identical to the BMP file. </em></div> diff --git a/templates/mac-truncation.html b/templates/mac-truncation.html index 7dfb906..24d4889 100644 --- a/templates/mac-truncation.html +++ b/templates/mac-truncation.html @@ -27,7 +27,7 @@ </div> <p> <strong>MAC truncation.</strong> The sorcerer aims to conserve - bandwidth by truncating MACs. Use the enemy as a decryption + bandwidth by truncating AES-GCM MACs. Use the enemy as a decryption oracle to once again, recover the authentication key and forge arbitrary ciphertext. </p> |