Posts
2024
In this post, I’ll present my write-ups for all the challenges listed in the crypto category, ordered by difficulty rating.
The challenges are:
- AdveRSArial Crypto (Baby)
- El Gamal Fait 1/2
- El Gamal Fait 2/2
- The pake is a lie
- AdveRSArial Crypto (Kiddo)
- Broadcastopol
- Salade de fruits
- Share a Saucisse
- Winternitz is coming
- Appellation d’Origine Protégée
- Secret SHenanigans
- Tight Schedule
2022
In this post, I’ll present my write-ups for some of the challenges listed in the crypto category, in no particular order.
The challenges are:
- Shuffled
- My Tailor is Rich
- T-Rex
- Gaston La Paffe
- Surface
- Hash-ish
- Kahl Hash
- Share It
- IZNOGOOD
- Millenium
I didn’t manage to solve two of them, but I will briefly give my thoughts on them.
2021
In this post, I’ll present my write-ups for all the challenges listed in the Crypto category, in the order I solved them during the competition.
The challenges are:
- Macaque
- RSA Destroyer
- Lost curve
- Hashy Parmentier
- Revaulting
- SmeaLog
- Trappy Skippy
2020
2019
In this post I want to share with you my way of solving reverse engineering (RE) tasks in CTFs involving simple cryptography without reading a single bit of assembly, purely by cryptanalysis.
Of course this can’t be applied on all RE tasks you’ll encounter that make use of cryptography, but sometimes it might save you a lot of pain trying to solve a difficult RE task. You might also have to do it simply because you don’t have access to the cryptographic code (Black Box), like in one of the parts of the Black Badge challenge for Le Hack 2019, which will serve as an example throughout this post.
It’s been a long time since part 3 of this series. So to quietly resume our journey in the beautiful world of mathematics I propose you 4 rather simple topics :
- Multi-prime RSA
- Brute force attack on small secret CRT-Exponents
- Fault attack on signatures
- Twin primes