logo
Red team
The raccoon’s secret recipes for digital mischief
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
          • Field notes from the bin-raider’s handbook
          • Where the raccoon picks the locks of logic
            • Old tricks, new treats: Unmasking classical ciphers
            • The raccoon’s secret recipes for digital mischief
              • AES: A symmetric block cipher
              • LFSR: Linear feedback shift registers
              • RSA: An asymmetric key exchange
            • The raccoon’s secret recipes for digital mischief
              • AES: A symmetric block cipher
              • LFSR: Linear feedback shift registers
              • RSA: An asymmetric key exchange
            • CBC Bit-flipping attack
            • AES Electronic code book
            • Initialisation vector
            • Riding the currents: Stream cipher exploits
            • Breaking the seal: Hash function vulnerabilities
            • Unlocking RSA: Asymmetric mischief
            • The Raccoon’s curiosity cabinet
            • Curves ahead: Navigating elliptic curve cryptography
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels

    The raccoon’s secret recipes for digital mischief¶

    Modern encryption is not magic—just cleverly disguised algebra. In this section, we code the arcane, one line at a time. Whether it’s spinning up RSA key pairs or poking around LFSRs, this is where we turn black-box mystique into paw-friendly logic.

    Modern ciphers @GitHub

    • AES: A symmetric block cipher
    • LFSR: Linear feedback shift registers
    • RSA: An asymmetric key exchange

    Last update: 2025-05-12 14:16
    Back to top
    Previous Enigma machine
    Next <no title>
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7