Real Smooth
May 18, 2025Challenge Description:
Just do the dance, that's the solve
`nc smooth.chal.cyberjousting.com 1350`
real-smooth.py
Challenge Code:
| |
السلام عليكم ورحمة الله وبركاته
This challenge was a nice one and was intended to be solved by bit flipping but I just have solved a challenge on cryptohack on chacha20 called Dancing Queen the challenge used different IVs with the same key and the solution for the challenge is to reverse the initialization process of the key stream to get the key but here we have got two plaintexts encrypted with the same key and IV and here is the catch if we retrieved the key stream that encrypted the plaintexts and then encrypt the desired message with the extracted keystream and then get the flag.
Here I noticed that the desired message is longer than each of the encrypted messages so if I tried to retrieve the keystream of one of the encrypted messages I won’t get the flag. So, how to overcome that we get the the cipher texts of the encrypted messages then concatenate them then concatenate the plain texts of the encrypted then xor them to get the keystream then xor it with the desired message then send it the server to get the flag.
| |
then you get the flag byuctf{ch4ch4_sl1d3?...n0,ch4ch4_b1tfl1p}.
Thanks for reading hope you enjoyed it if you have any comments don’t hesitate to reach out.
