2020 EUROPEAN CYBER SECURITY CHALLENGE

3-7 November 2020

Vienna, Austria

Crack crypto from source

How difficult did you find this challenge?

1 2 3 4 5
Easy Hard
Event ECSC2018
Tags Crypto Reverse engineering
Difficulty
Medium
Additional Info
Description

Even when a crypto system uses AES there can be flaws in it that can be exploited to decrypt
data. You have been supplied with the source of a program that generates keys, encrypts data
and decrypts data.
The key generation routine has been used to generate a key, and that key has been used to
encrypt some text data:


$ ./crypto keygen > key
$ cat message | ./crypto enc `cat key` > cipher

Other artefacts
Tasks

Task 1: Find the recovered key


Task 2: Find the decrypted message