当前位置:网站首页>Xctf attack and defense world crypto advanced area
Xctf attack and defense world crypto advanced area
2022-06-30 05:38:00 【l8947943】
0x01. Enter the environment , Download the attachment
Compressed package for topic , Contains a txt file , Pictured :
0x02. Problem analysis
0x02_1. Virgilian code
What is the virgilian code ? Virginia password is an encryption method based on Caesar password , It will all of Caesar's code 25 Sort the displacement into a table , Together with the original letter sequence 26 Line and 26 The alphabet of the column . in addition , The Virginia password must have a key , This key consists of letters , At least one , Up to the number of clear text letters .1
for example , We have the following information :
Plaintext :I’ve got it.
secret key :ok
You can get the ciphertext :
Ciphertext :W’fs qcd wd.
The operation is as follows , First look at a password form :
First , The length of the key should be the same as that of the plaintext , If less than the plaintext length , Then repeat the splicing until the same . In this case , The plaintext length is 8 Letters ( Non letters are ignored ), The key will be completed by the program as “okokokok”, Then the first letter of the plaintext is “I”, The first letter of the key is “o”, Find... In the table “I” Column and “o” Lines intersect , Letter “W” It's the first letter of the ciphertext ; Empathy ,“v” Column and “k” The line intersection letter is “F”;“e” Column and “o” The line intersection letter is “S”……
Be careful :
- The Virginia code encrypts only letters , Case insensitive , If non alphabetic characters appear in the text, they will be retained as they are .
- If you enter multiple lines of text , Each line is encrypted separately .
0x03. Problem analysis
0x03_1. Restore secret key
Here refer to the boss's wp, Get a lot of inspiration .https://blog.csdn.net/weixin_45530599/article/details/108112665
Pictured : You can see that there is such time data , And the characters and numbers should meet the corresponding length , It is easy to think of in English between…and… Usage of , And the character length just matches . that , Ciphertext frxnimp Corresponding to plaintext between, Check the password table , Find the column header by column ‘b’, Then find the encrypted character in the corresponding column ‘f’, Then you can find the ciphertext characters at the beginning of the line ‘e’, And so on , You can get encrypted ciphertext characters ‘enereicqvi’
https://www.qqxiuzi.cn/bianma/weijiniyamima.php ︎
边栏推荐
- After reading who moved my cheese
- 炒股用指南针开户交易安全吗?
- How to judge the quality of network transformer? What symptom is network filter transformer broken?
- Transfer the token on the matic-erc20 network to the matic polygon
- 声网,站在物联网的“土壤”里
- 抓取手机端变体组合思路设想
- How to create a CSR (certificate signing request) file?
- Super comprehensive summary | related improvement codes of orb-slam2 / orb-slam3!
- 网络变压器怎么判断好坏?网络滤波变压器坏了一般是什么症状?
- Rotation, translation and scaling of unity VR objects
猜你喜欢

14x1.5cm竖向标签有点难,VFP调用BarTender来打印

Solidity - 安全 - 重入攻击(Reentrancy)

Solitidy - fallback 回退函数 - 2种触发执行方式

Unityshader learning notes - Basic Attributes

旋转框目标检测mmrotate v0.3.1 训练DOTA数据集(二)

Digital signature——

Do you know how to show the health code in only 2 steps
![[chestnut sugar GIS] global mapper - how to assign the elevation value of the grid to the point](/img/bb/ea0e78065ba54ff253995faeeb6901.png)
[chestnut sugar GIS] global mapper - how to assign the elevation value of the grid to the point

Unity shader flat shadow

Who is promoting the new inflection point of audio and video industry in 2022?
随机推荐
Unity gets the resolution of the game view
What are membrane stress and membrane strain
【LeetCode】Easy | 232. Using stack to realize queue (pure C manual tearing stack)
Unity3d get screen width and height
Xiaosha's lunch
如何写论文
Database SQL language 06 single line function
14x1.5cm竖向标签有点难,VFP调用BarTender来打印
Revit二次開發---未打開項目使用面板功能
Shopping list--
Database SQL language 03 sorting and paging
网络变压器怎么判断好坏?网络滤波变压器坏了一般是什么症状?
14x1.5cm vertical label is a little difficult, VFP calls bartender to print
Remote sensing image /uda:curriculum style local to global adaptation for cross domain remote sensing image segmentation
How to prevent source code leakage in enterprises and institutions
2022年,谁在推动音视频产业的新拐点?
How to automatically renew a token after it expires?
Xi'an Jiaotong automation control theory test simulation question [standard answer]
token 过期后,如何自动续期?
《谁动了我的奶酪》读后感