24 Apr 2021
### Challenge Description:

```
Description:
nc challs.m0lecon.it 11000
```

**Foreword**

CryptoGolf was the first challenge of a series of very fun and *interesting* cryptography challenges that my teammates and I solved in m0leconCTF World Quals where we placed 5th globally in the Open Division, qualifying for the Grand Finals in Turin, Italy.

**Continue Reading »**

16 Aug 2020
This is a proof of Euler’s Identity using the Taylor Series.

We can write $ie^{i\phi}$ as the Taylor Series expansion.

Let’s visualize this sum. It helps to write out all your terms because you know that the powers of `i`

are going to alternate between `1`

,`-1`

,`i`

,and `-i`

.

**Continue Reading »**

15 Aug 2020
This is a quick proof of Euler’s formula without the use of the Taylor Series.

Even with the imaginary number `i`

, this equation is differentiable, so we can take the derivative of :

**Continue Reading »**

17 Jul 2020
This is a writeup for a crypto challenge in RACTF 2020, where we placed 6th.

### Challenge Description:

```
Challenge instance ready at 95.216.233.106:57735
We found a strange service, it looks like you can generate an access token for the network service, but you shouldn't be able to read the flag... We think.
```

### Solving :

We are given access.py. Lets take a look the server file to see what the program does.

From the top, we see that `get_flag`

:

**Continue Reading »**

16 Jul 2020
### Challenge Description:

```
Man, oracles are weird.
nc challenges1.hexionteam.com 5000
```

**Solving :**

Really Smart Acronym, of course, is RSA. Looking at the code, it uses PyCrypto to generate a RSA key to encrypt the flag. You also get one encryption and 1024 decrypts, but you only get the last bit of the decrypts. At first we thought it could be Franklin-Reiter related-message attack, but there is not enough information for that.

**Continue Reading »**