cryptoProhard
Шайтан-алгоритм (Shaitan Algorithm)
hackerlab
Task: decrypt a flag encrypted with a custom block cipher given a known plaintext-ciphertext pair. Solution: reverse-engineer the cipher structure from a visual diagram (XOR + word permutation, 3 rounds), then use Z3 SAT solver to recover the 128-bit key.
$ ls tags/ techniques/
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]Rusty— spbctf
- [crypto][Pro]Кастом (Custom)— hackerlab
- [crypto][Pro]Permute — Permutation Cipher— spbctf
- [crypto][Pro]Enigma— hackerlab
- [reverse][Pro]Я работаю в криптовалюте (I work in cryptocurrency)— hackerlab