The security of message authentication codes relies on the unpredictability of its private keys. In this challenge, you will receive a MAC tag for the message "wire 100,000 dollars to Bob. -Alice"
. Additionally, you obtain Alice's personal information and know that Alice's MAC key is a password that combines some data from her information and some special characters. You will leverage these information to guess Alice's MAC key.
It is known that Alice's password is filled with 4 fields from info.txt
and 4 special characters from ! @ # $ % ^ & *
. They are arranged in the form of info1+char1+info2+char2+info3+char3+info4+char4
, where +
represents concatenation. An example is Alice!Alice!Alice!Alice!
. These private info fields and the characters may repeat.
The MAC scheme that Alice uses is HMAC and it's implemented using Python's hmac
interface and sha256
from hashlib
. Once you get a password, you can check its correctness using /challenge/solve
.