logo
Defence blues
AES challenges
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
      • Golem Trust Computing Ltd.
      • Department of Silent Stability
      • The Home for Bewildered Beasts of Legend
      • Stormforge training grounds
      • Blue team @SOC
      • Blue team for dev
      • Blue team @Home
      • Bulletproofing servers
      • Buffer overflows
      • Reverse engineering
      • Steganography
      • Cryptanalysis
        • Cryptanalysis notes
        • Root-me cryptanalysis challenges
          • Old tricks, new treats: Unmasking classical ciphers
          • AES challenges
            • AES Electronic code book
            • Initialisation vector
          • AES challenges
            • AES Electronic code book
            • Initialisation vector
          • Riding the currents: Stream cipher exploits
          • Unlocking RSA: Asymmetric mischief
          • Curves ahead: Navigating elliptic curve cryptography
          • The raccoon’s secret recipes for digital mischief
      • Evasion
      • Honeytech for humans

    AES challenges¶

    AES mode weaknesses.

    • AES Electronic code book
    • Initialisation vector
    2026-03-23 20:50
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7