Welcome to the new CVORG homepage! Here you will find information about our research group, work, and members. Please feel free to click around and send us any feedback you have!

Start of My Journey Into Ciphers

So I have been reading The Code Book by Simon Singh, and let me tell you I have loved every page.  It has sparked a growing interest in different ciphers and their stories.  The evolution of the creation of codes and then the breaking of them is simply intriguing.  Both sides have had the advantage over time, which has provided them a strong advantage over their enemies, allowing for acquisition of invaluable intelligence.  I strongly recommend it to anyone interested in ciphers and cryptography.

The book has inspired me to start understanding the strengths and weaknesses of different techniques and algorithms.  What better way for me to do this than code it up right?  So I am beginning to code different ciphers (pretty straight forward), and then attempt to implement the cryptanalysis techniques in code (probably much more difficult).  The ciphers will just be implementing well documented algorithms, while the cryptanalysis tends to be more of an art that seems to be hard to capture in code (but we’ll see how far I get).  I am hoping to have fully automated cryptanalysis solutions, but will be happy with useful tools to facilitate the breaking of the codes.

Any ways as long as I learn in the process and am able to share useful information with other people along the way, I will have accomplished my goal.

I will post a blog soon on the Caesar and Vigenere Ciphers along with some simple cryptanalysis techniques soon.  All my current code can be found by following the “Code Repository” to the right.

If anyone has some good resources or interesting ciphers and techniques along this journey I would love to hear about them.

Blinky Lights is out for fab!

Well I'm really excited to say the least.  For the last month I've been working on designing a system for my PCB class that Dr Kiamilev is teaching.  Working with my team (Erin McAuliffe and Burke Cates), we decided to create a small audioreactive board that would be used to create ad-hoc light shows based on the music being played.  Sound pretty cool right?  Or maybe you have no clue what that means...  Either way read on and I will explain.

Personal Thoughts and Observations on Hardware Security

I would first like to say the view points stated are my own and should not reflect upon the Univeristy, this research group, or my advisor.

CVORG Drupal Site

I just want to throw a pointer to CVORG’s new Drupal site.  It will hold information about the projects CVORG is working on officially and what the members are working on in their spare time.  It’s a place where CVORG members will post blogs about their work.  So far myself and janansky are the only one’s active, but we are hoping that changes.  All of my blogs there will also be found here.

Check it out when you get a chance: http://cvorg.ece.udel.edu/drupal/

Security, Technology, and Miscellaneous Podcasts

A couple of people have asked me what podcasts I listen to, so I’m going to post them.  Now I am a graduate student and need to be listening to something to block out what’s going on around me and I can’t stand absolute silence.  I am almost always listening to something.  I am not recommending anyone keeps up with all of these podcasts, but I usually get through 4 hours of podcasts a day, more on good days.  The number of podcasts I keep up with will probably shrink when I graduate.

John The Ripper Scripts

In my password research I came across the John the Ripper mailer script.  First off John the Ripper is a password cracker for those of you that don’t know.  You can find more information about it at http://www.openwall.com/john/.  The mailer script is supposed to mail the users whose passwords have been cracked.  It makes it easy for the system administrator to inform those with weak passwords.  When I saw this I realized this could be a good tool to automate the checking if passwords have been cracked.  I altered the mailer script to email me when a password has been cracked, that way I don’t have to check different hosts to see their status.  The mailer script can be found in /usr/sbin/mailer.

Scanning the subnets

Recently I've been working on a project to scan the UDel IP range and do a statistical profiling of the open ports.  For more info on the project please visit here.  In order to get this done I've used the Perl Nmap::Parser library to get my tasks done.  I've used it because it allows for me to both automate the process of scanning but also the process of parsing the output.  Since the example code is slightly sparse I decided to release my script (as poorly written as it may be) to show it in a real application.  Below you'll find my code with sparing comments.  I'll try to write a followup post where I'll explain things as they go along...

Passwords From Twitter

The reason I decided to port the script for downloading all of a users tweets is for some password research I have been doing.  I have been cracking passwords for a bout a year now.  I find it very intriguing to see what people will pick as their passwords.  Some tend to be very personal like a spouses or child’s name.  Some are just things people like such as baseball20.  And then there are others the are random or look like random characters to meet the password restrictions.

Download Tweets For A User

I was looking for a way to download all of some one’s tweets (which I will go over in a later post), when I ran across this blog http://frankkoehl.com/2009/08/archive-entire-twitter-timeline/. The author had an implementation of what I needed in php.  I’m more comfortable with something like a Perl script, so I decided to port that implementation to perl.

Syndicate content