Cryptography


Fluffy’s Adventure.


Challenges

🔐 OTPwned: Déjà Vu

Deeper in the tar pit, Fluffy found a giant black metal vault; it has no seams and is as cold as night.

A brass plate on the door bragged, “Secured by the most secure algorithm known to humankind (and animal-kind).”

Amidst the darkness of the pit came a blinking terminal in the shadow of the vault, named The Encrypter™.

“Hello, user,” said the terminal
“What secret shall we encrypt today, user?”.
“Please enter your secret,” it prompted, its screen flickering in anticipation.

Intrigued by the terminal, Fluffy dilly‑dallied with it, encrypting all sorts of files. He quickly noticed that only the correct key could open its corresponding scrambled nonsense bytes.

But something felt off. The nonce-sense wasn’t always nonsense. It had a beat to it—a rhythm.

“Maybe it’s the moment the key was created, rather than just the math that makes it,” said Fluffy 🦊

Now Fluffy’s trying to rewind the moment—to find that one echo. Because if it worked once, it can work again.

“Open Sesame…” he whispers.

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score