I've been given a challenge and it has to do with testing a friend's encryption process.
It's a Diffie-Hellman exchange process, and here are the known variables / constants:
P
,G
- my generated private key (variable)
- my generated public key(variable)
- the recipients public key (constant).
When looking at my private key - P
and G
are both within it. For example, the first 'x' bytes seem to have no relation to anything, then the next 'y' bytes are P
, the next two bytes are static, and the next 'z' bytes are G
, the remainder are variable.
The process is to encrypt a file, and send it to a device, which will in turn decrypt it - my ideas of attack are this:
try to duplicate the secret shared key. The problem here is that is fine as long as I know my generated private key, at which case - I don't for the files he's given me.
Try to find the recipients private key. Here, I could brute force my way in - but would take forever unless I had some sort of supercomputer.
Are there any other options to look at when trying to attack this?