Didactic Feedback Cipher Long 2

Discussion of challenges you have already solved
tails
Posts: 191
Joined: Tue Jun 10, 2008 7:51 pm
Location: Tokyo

Didactic Feedback Cipher Long 2

Post by tails »

Ah, little endian ... :)

My first try was like:
"01234567" => 0x01234567

And isn't there garbage at the end?
gfoot
Posts: 269
Joined: Wed Sep 05, 2007 11:34 pm
Location: Brighton, UK

Post by gfoot »

I got garbage all through, and not even at four-character intervals, but no doubt I got the key wrong or something. :)
User avatar
adum
Posts: 392
Joined: Thu Apr 19, 2007 12:49 pm
Contact:

Post by adum »

what values did you guys get for key and x?
gfoot
Posts: 269
Joined: Wed Sep 05, 2007 11:34 pm
Location: Brighton, UK

Post by gfoot »

I didn't keep the values, but it's easy enough to run through again. So these might not be the same as last time...

I didn't bother solving for k, but I got x = 0x13e8fe15. For k I just use 0.
gfoot
Posts: 269
Joined: Wed Sep 05, 2007 11:34 pm
Location: Brighton, UK

Post by gfoot »

Oh, I see, it's endianness again - I did it backwards, and the overflows were flowing the wrong way. I just did it again the other way around, and the text looks fine now (x=14fde914, k=0), but with junk at the start (expected) and end (not expected).
tails
Posts: 191
Joined: Tue Jun 10, 2008 7:51 pm
Location: Tokyo

Post by tails »

I went the very same way as gfoot did.
First, big endian, x=0x13e8fe15, k=0, the text results in a bit broken.
Next, little endian, x=14fde914, k=0, the text has 4 byte garbage at the end.
MerickOWA
Posts: 182
Joined: Mon Apr 07, 2008 5:54 pm
Location: HkRkoz al KuwaiT 2019 HaCkEr 101

Post by MerickOWA »

tails wrote:I went the very same way as gfoot did.
First, big endian, x=0x13e8fe15, k=0, the text results in a bit broken.
Next, little endian, x=14fde914, k=0, the text has 4 byte garbage at the end.
There isn't garbage at the end, the text is 3 bytes too short to make a full 32 bits. If you trim your answer to the same number of encrypted bytes the garbage goes away.

This one was a little tricker to solve than the others, but still not terribly difficult.

Using little endian, the first two bytes of X have to be 0xe914. The 3rd byte could be 0xfa to 0xfe, but only 0xfd made the string have less "unusual" symbols (those symbols in the 32-126 range)
and last byte could have been 0x14 or 0x15. 0x14 was an obvious sentence ;).
tails
Posts: 191
Joined: Tue Jun 10, 2008 7:51 pm
Location: Tokyo

Post by tails »

MerickOWA wrote:There isn't garbage at the end, the text is 3 bytes too short to make a full 32 bits. If you trim your answer to the same number of encrypted bytes the garbage goes away.
Ah that's right. I carelessly miscounted the length and felt sure it had no odd bytes. Thank you for pointing it out!
User avatar
adum
Posts: 392
Joined: Thu Apr 19, 2007 12:49 pm
Contact:

Post by adum »

hmmn, this cipher has the great property of working for any possible k if you have the right x -- you just lose the first four bytes. shows the danger of trying to make up new ciphers =)
MerickOWA
Posts: 182
Joined: Mon Apr 07, 2008 5:54 pm
Location: HkRkoz al KuwaiT 2019 HaCkEr 101

Post by MerickOWA »

adum wrote:hmmn, this cipher has the great property of working for any possible k if you have the right x -- you just lose the first four bytes. shows the danger of trying to make up new ciphers =)
All the of the latest xor challenges have been like that.

You either xor encrypted with encrypted[i-1] to figure out the value

or

guess "x" and xor encrypted with ( encrypted[i-1] + x ).

Makes it even easier to guess "x" if you assume that all values will be between 32 to 126, and if you get anything outside that range, then 'x' is wrong.
the_impaler
Posts: 61
Joined: Wed Apr 30, 2008 3:31 am

Post by the_impaler »

Well, just use original values instead of encoded like this :

for (i = 0; i < len(txt); i += 4)
c = (txt[i] -> txt[i + 3])
c_encoded = c ^ k
print c_encoded
k = (c + x) % 0x100000000
gfoot
Posts: 269
Joined: Wed Sep 05, 2007 11:34 pm
Location: Brighton, UK

Post by gfoot »

That's very vulnerable to a dictionary attack. Factoring in the previous key by addition would be hard though.
wrtlprnft
Posts: 28
Joined: Sun Nov 09, 2008 4:48 pm

Post by wrtlprnft »

Hmm, I probably used the wrong endianness. Here's what I got, without the first four chars (presumably “i ha”) and the last one (probably an exclamation point):
ve to admit, i don`t know how i`d solve this one nyself. not#tiat this is AEl nr amything. but still, gettinf nore!tricky. oh by the way, you!are lonhnng for penguinhcity, noble solver
Easy enough to guess, though, by just trying all chars that are close to “h” :-)
theStack
Posts: 72
Joined: Sun Nov 02, 2008 12:46 am

Post by theStack »

wrtlprnft wrote:Hmm, I probably used the wrong endianness. Here's what I got, without the first four chars (presumably “i ha”) and the last one (probably an exclamation point):
ve to admit, i don`t know how i`d solve this one nyself. not#tiat this is AEl nr amything. but still, gettinf nore!tricky. oh by the way, you!are lonhnng for penguinhcity, noble solver
Easy enough to guess, though, by just trying all chars that are close to “h” :-)
I got exactly the same text, with x = 21 | (254 << 8 ) | (232 << 16) | (19 << 24) = 0x13e8fe15
So we made the same mistake as many others here, choosing Big Endian instead of little endian :wink:
falcon2424
Posts: 30
Joined: Mon Apr 30, 2007 9:35 pm

Post by falcon2424 »

I also got the garbled text, though I'm not sure how endianess figures into this.

I basically broke the problem up into four sub-strings, and ran the cipher on each of those. The only trick was to make sure to carry a '1' where appropriate.
Post Reply