Description
The geopolitical scene has taken a turn for the worse for us recently.
One of our allies seems to have modified the communications equipment we initially supplied.
Indeed, for several days now, our exchanges have been interrupted.
However, one of our agents in the field has intercepted one of their broadcasts (flag.wav.enc
).
According to our information, it is of tactical importance.
One of our cryptographers told us that the encryption algorithm is used in a classic stream cipher mode and that we know that the clear data are WAV files.
His team has also managed to obtain a known plaintext (known.wav
/known.wav.enc
) for which we know the following:
IV = 0x000dcf18
;eck = 0x1119EB502F815EB502F8
(eck
, Encryption Cipher Key).
Furthermore, for the encrypted message flag.wav.enc
intercepted, operational analyses indicate that the value of the IV should be 0x0026b328
.
Note :
the flag is in FCSC{diffusion_content}
format.
The content is in English.
Its transcription in the flag is in lower case and between each word there is a _
.
Example: if I hear “You made good today”, the flag is: FCSC{you_made_good_today}
.
Files
-
flag.wav.enc
282.04 KiB – 39a3d4568c2896014b6d68cbc023f8de67ac8b1e42d994825a8d4e06c7c8a544 -
known.wav
761.95 KiB – fede74ef91954b1931d2cbd97df025dd54499006121e603320a8674aefb18bed -
known.wav.enc
761.95 KiB – 6ef82944d7a59c4e36f0014addfd1a376e604162cc5bb21d2ace1bc1daa27376
Author
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.
Writeups
There are no public solutions for this challenge yet, but you can submit yours after getting the flag.