[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

[DDCTF 2019]Breaking LEM

 广告模块
ID: 13880
标题: [DDCTF 2019]Breaking LEM
描述: In this question, a Lorenz encryption machine is explained and a string is encrypted using the key. Please reverse the app and find the key of the encrypting algorithm, and input the string in the Android app. A Lorenz encryption machine uses 12 wheels, each with 23 ~ 61 lowered or raised cams, to randomly generate 12 binary numbers (chi1~chi5, mu37, mu61, psi1~psi5) with the respective length of 23 ~ 61 bits. For example, one random number (chi5) is of length 23: 0101 0000 0111 0101 0101 011. ( FYI: In the mechanical cipher, the lowered cam means 0 and the raised cam means 1. ) Then use the key e.g. XYZ to form the flag in the style of DDCTF{XYZ} 得到的flag使用NSSCTF{}格式提交。 该题flag未知,解出后请联系管理员更新。
类型: 逆向
网站: NSSCTF
题目链接: https://www.nssctf.cn/problem/1278
赛事: DDCTF
年度: 2019
Flag值: DDCTF{8位字符串}(具体字符串需通过文中描述的暴力破解过程获得,文中未直接给出完整flag)
writeup: https://juejin.cn/post/6844903844363632654
答案错误,我要更正