cryptomedium
Neon Core
hackthebox
Task: decrypt a flag encrypted by a custom 4x4 matrix block cipher over GF(257) with structure C = K * S(M) * L + T. Solution: chosen-plaintext attack exploiting element-wise S-box before linear mixing; single-byte changes produce rank-1 ciphertext differences leaking columns of K and rows of L, recover keys with 8 oracle queries.
$ ls tags/ techniques/
chosen_plaintext_attackrank1_differentialmatrix_cipher_cryptanalysisGF257_arithmeticlinear_cryptanalysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]