Crack crypto from source
How difficult did you find this challenge?
Even when a crypto system uses AES there can be flaws in it that can be exploited to decrypt
data. You have been supplied with the source of a program that generates keys, encrypts data
and decrypts data.
The key generation routine has been used to generate a key, and that key has been used to
encrypt some text data:
$ ./crypto keygen > key
$ cat message | ./crypto enc `cat key` > cipher
Task 1: Find the recovered key
Task 2: Find the decrypted message