Cryptanalysis

Sunday 18 November 2018, 04:40  #1
Cryptanalysis - Code Pseudo Random Number Generator
PwnMyWife
  • 5 posts

Hello everyone,
I’m stucking in a point on the challenge because of seed (time parameter).

In practice I noted that the key is generated by

[MODERATED]

The problem is that I don’t get a bz2 file, so the key is wrong... Am I on wrong way? Is the key wrong? Can I use the crypt.c program to decrypt the encrypted file since the program performs the XOR between the bytes of input file and the key (in decrypting case I must perform encrypted bytes XOR key?

Sunday 18 November 2018, 10:02  #2
Cryptanalysis - Code Pseudo Random Number Generator
NonStandardModel
  • 42 posts

Too much spoil in this post!!!!
(btw..did you try few second before/after)

Sunday 18 November 2018, 18:04  #3
Cryptanalysis - Code Pseudo Random Number Generator
PwnMyWife
  • 5 posts

Thank you for the answer.
Yes, I did.
[MODERATED]
Then I get also other file formats as MS-DOS Executables, zlib compress data, Dyalog APL Transfer, and so on...

Where I wrong? Why does the seed at [MODERATED] and near seeds are wrong?"