xortool.py cry200.txt.enc -c 20This printed out a key of '\x96\xa4*\xc3\xc4:' which, when applied to the file gave me something close to an answer.
Cong (tula& ons!r hiler=he q' ck b &wn f=1 jum": ove ithe > ........I noticed that the only every 5th and 6th byte of this message was unintelligible, so I changed the 5th and 6th chars of the key manually in a python script until the message was correct. The script is below.
key = '\x96\xa4*\xc3\x96\x73' counter = 0 answer = '' for i in open('cry200.txt', 'rb').read(): answer += chr(ord(i)^ord(key[counter%6])) counter += 1 print answer
Answer: Congratulations! While the quick brown fox jumps over the lazy dog, the plain xor cipher is still very unsecure when the key is much shorter than the message. Your flag: Foxie Dogzie Crypto PwndAnd that's all there is to it!
-- suntzu_II
I've solved this task using hellman's xortool too :)
ReplyDelete