当前位置:网站首页>Xctf attack and defense world crypto advanced area
Xctf attack and defense world crypto advanced area
2022-06-30 05:38:00 【l8947943】
0x01. Enter the environment , Download the attachment
Compressed package for topic , Contains a txt file , Pictured :
0x02. Problem analysis
0x02_1. Virgilian code
What is the virgilian code ? Virginia password is an encryption method based on Caesar password , It will all of Caesar's code 25 Sort the displacement into a table , Together with the original letter sequence 26 Line and 26 The alphabet of the column . in addition , The Virginia password must have a key , This key consists of letters , At least one , Up to the number of clear text letters .1
for example , We have the following information :
Plaintext :I’ve got it.
secret key :ok
You can get the ciphertext :
Ciphertext :W’fs qcd wd.
The operation is as follows , First look at a password form :
First , The length of the key should be the same as that of the plaintext , If less than the plaintext length , Then repeat the splicing until the same . In this case , The plaintext length is 8 Letters ( Non letters are ignored ), The key will be completed by the program as “okokokok”, Then the first letter of the plaintext is “I”, The first letter of the key is “o”, Find... In the table “I” Column and “o” Lines intersect , Letter “W” It's the first letter of the ciphertext ; Empathy ,“v” Column and “k” The line intersection letter is “F”;“e” Column and “o” The line intersection letter is “S”……
Be careful :
- The Virginia code encrypts only letters , Case insensitive , If non alphabetic characters appear in the text, they will be retained as they are .
- If you enter multiple lines of text , Each line is encrypted separately .
0x03. Problem analysis
0x03_1. Restore secret key
Here refer to the boss's wp, Get a lot of inspiration .https://blog.csdn.net/weixin_45530599/article/details/108112665
Pictured : You can see that there is such time data , And the characters and numbers should meet the corresponding length , It is easy to think of in English between…and… Usage of , And the character length just matches . that , Ciphertext frxnimp Corresponding to plaintext between, Check the password table , Find the column header by column ‘b’, Then find the encrypted character in the corresponding column ‘f’, Then you can find the ciphertext characters at the beginning of the line ‘e’, And so on , You can get encrypted ciphertext characters ‘enereicqvi’
https://www.qqxiuzi.cn/bianma/weijiniyamima.php ︎
边栏推荐
- Unity C trigonometric function, right triangle corner calculation
- Expansion method of unity scanning circle
- UML tools
- 抓取手机端变体组合思路设想
- pytorch中常用损失函数总结
- VFPBS在IIS下调用EXCEL遇到的Access is denied
- 【LeetCode】Easy | 225. Using queue to realize stack (pure C manual tearing queue)
- On line assignment of financial cost management in the 22nd spring of Western Polytechnic University [Full Score answer]
- Redistemplate common method summary
- Shopping list--
猜你喜欢

The minecraft server address cannot be refreshed.

遥感图像/UDA:Curriculum-Style Local-to-Global Adaptation for Cross-Domain Remote Sensing Image Segmentat

Sound net, debout dans le "sol" de l'IOT

Unity- the camera follows the player

Idea of capturing mobile terminal variant combination

How to judge the quality of network transformer? What symptom is network filter transformer broken?

How to automatically renew a token after it expires?

Learning about functions QAQ

Sword finger offer 18 Delete the node of the linked list

Introduction to mmcv common APIs
随机推荐
Redistemplate common method summary
Sword finger offer 18 Delete the node of the linked list
Xi'an Jiaotong 21st autumn "computerized accounting" online homework answer sheet (I) [standard answer]
Intellj idea generates jar packages for projects containing external lib to other projects. The method refers to the jar package written by itself
AI大模型落地大考,浪潮交出了怎样的答卷?
Super comprehensive summary | related improvement codes of orb-slam2 / orb-slam3!
Codeforces Round #390 (Div. 2) D. Fedor and coupons
86. 分隔链表
Remote sensing image /uda:curriculum style local to global adaptation for cross domain remote sensing image segmentation
After reading who moved my cheese
Unity publishing /build settings
9. naive Bayes
VFPBS上传EXCEL并保存MSSQL到数据库中
[Blue Bridge Road -- bug free code] analysis of AT24C02 storage code
86. separate linked list
SSL证书续费相关问题详解
What are membrane stress and membrane strain
旋转框目标检测mmrotate v0.3.1 学习配置
Rotating frame target detection mmrotate v0.3.1 training dota data set (II)
On line assignment of financial cost management in the 22nd spring of Western Polytechnic University [Full Score answer]