cryptomedium

Neon Core

hackthebox

Task: decrypt a flag encrypted by a custom 4x4 matrix block cipher over GF(257) with structure C = K * S(M) * L + T. Solution: chosen-plaintext attack exploiting element-wise S-box before linear mixing; single-byte changes produce rank-1 ciphertext differences leaking columns of K and rows of L, recover keys with 8 oracle queries.

$ ls tags/ techniques/
chosen_plaintext_attackrank1_differentialmatrix_cipher_cryptanalysisGF257_arithmeticlinear_cryptanalysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]