Adversary

[★☆☆] Almost Classic

Description

We've captured communication of two adversaries. We need to decrypt it.

communication.txtarrow-up-right

Solution

X: Ovgh xlliwrmzgv gsv wilk klrmg.
Y: Ztivvw yfg dv szev gl yv xzivufo. Lfi xibkgltizksvih dzimvw fh zylfg gsrh nvgslw. Gsvb hzb rg dlmg slow uli olmt.
X: Dv wlmg szev grnv gl hvg fk zmbgsrmt yvggvi. Xlnv gl gsv fhfzo kozxv rm gsv Kvmgztlm, Hgzeyzihpz 42. Gsv yzigvmwvi droo trev blf gsv kzxpztv. 
Y: Urmv yfg ru dv tvg xlnkilnrhvw yvxzfhv lu gsv xrksvi blf szev gl wlfyov blfi hgzpvh. HP-XVIG{szev_blf_vevi_svziw_zylfg_z_yolxp_xrksvi???}

https://www.dcode.fr/cipher-identifierarrow-up-right -> https://www.dcode.fr/atbash-cipherarrow-up-right

C: Lets coordinate the drop point.
B: Agreed but we have to be careful. Our cryptographers warned us about this method. They say it wont hold for long.
C: We dont have time to set up anything better. Come to the usual place in the Pentagon, Stavbarska 42. The bartender will give you the package.
B: Fine but if we get compromised because of the cipher you have to double your stakes. SK-CERT{have_you_ever_heard_about_a_block_cipher???}
circle-check

[★☆☆] 3AES

Description

We have intercepted a ciphertext along with a presumed key exchange in plaintext. Our sources informed us that the adversary is using a custom-made cipher they call "3AES".

intercept.txtarrow-up-right

Solution

After some googling I come upon this website: https://www.devglan.com/online-tools/triple-des-encrypt-decryptarrow-up-right, but I couldn't enter 3 keys so had to write a script:

circle-check

[★☆☆] Key exchange

Description

The adversary started using a new algorithm for key exchange. We were able to get its schema from our source. We attach the communication where we suspect the adversary might be agreeing upon a key and then using the 3AES encryption we've seen previously.

exchange.pngarrow-up-right

messages.txtarrow-up-right

Solution

Key Exchange Steps:

  1. X sends S1⊕Key to Y.

  2. Y sends S2⊕S1⊕Key back to X.

  3. X sends S2⊕Key to Y.

  4. Y recovers the key by computing: Key = (S2⊕Key)⊕S2

Not that we recovered keys it's the same process as last challenge with 3DES (or 3AES..)

circle-check

Last updated