<-- Prev

Public-Key Cryptography

Next -->
  • Parameter Injection
    60 pts · 3710 Solves · 18 Solutions
    You're in a position to not only intercept Alice and Bob's DH key exchange, but also rewrite their messages. Think about how you can play with the DH equation that they calculate, and therefore sidestep the need to crack any discrete logarithm problem.

    Use the script from "Deriving Symmetric Keys" to decrypt the flag once you've recovered the shared secret.

    Connect at socket.cryptohack.org 13371

    You must be logged in to submit your flag.


Level Up

level up icon

You are now level Current level