- This topic has 90 replies, 8 voices, and was last updated 3 years, 7 months ago by F6exb.
-
AuthorPosts
-
8th February 2021 at 9:58 am #53209MadnessParticipant
@Mattyrat2027, you might have to write your own PEM parser. Or use OpenSSL?
8th February 2021 at 9:59 am #53210MadnessParticipantPerhaps the problem is that the forum editor replaces multiple hyphens with dashes.
-----BEGIN SECRET STUFF----- MIGRDHFUbyByZWFkIHRoZSBjbHVlLCBtdWx0aXBseSB0aGUgdGhyZWUgaW50ZWdl cnMgdG9nZXRoZXIgYW5kIGNvbnZlcnQgdGhlIHJlc3VsdCB0byBiYXNlIDM2ICh1 c2luZyBkaWdpdHMgMC4uOUEuLlopLgIBKQIEARXjjwITQ3u2k4zcfcCSrIUQnUQY W9DV0Q== -----END SECRET STUFF-----
8th February 2021 at 2:43 pm #53221Mattyrat2027Participant@Madness thanks, but I don’t think I have the right software for that coding, and I couldn’t work out how to use OpenSSL. I am beginning to wonder if this format is all a red herring, or if I am missing something key. is the Base64 the correct decryption or are you throwing us off to make it “interesting”?
8th February 2021 at 2:57 pm #53223MadnessParticipantOK, so maybe I used PEM because *I* thought it would be interesting.
openssl asn1parse -in secret.pem 0:d=0 hl=3 l= 145 cons: SEQUENCE 3:d=1 hl=2 l= 113 prim: UTF8STRING :To read the clue, multiply the three integers together and convert the result to base 36 (using digits 0..9A..Z). 118:d=1 hl=2 l= 1 prim: INTEGER :29 121:d=1 hl=2 l= 4 prim: INTEGER :0115E38F 127:d=1 hl=2 l= 19 prim: INTEGER :437BB6938CDC7DC092AC85109D44185BD0D5D1
8th February 2021 at 3:25 pm #53224Mattyrat2027Participant@Madness So sorry, I might have to give this hint a miss. I can’t seem to get it to work. Is that the code for a PEM decoder I see above? I tried it on an online Python but it cam out with a load of syntax errors.
8th February 2021 at 4:57 pm #53225MadnessParticipantA miss? I de-PEM-ed it for you.
8th February 2021 at 4:57 pm #53226CribbageParticipant@Mattyrat2027 Madness’ most recent post actually gives the 3 numbers that you need, but they are not in Base 10. Convert them to Base 10, multiply them together and then convert to Base 36.
9th February 2021 at 9:12 am #53227F6exbParticipantI have something in base 36 that begins with CO and ends with O4.
Is that correct ?9th February 2021 at 9:12 am #53228The-letter-wrigglerParticipantWell that’s a really big help NOT!
I have been trying with that since day one, after all you would not use it as the 8A keyword without reason and the black ‘holes’ confirmed it.
Still haven’t made any progress, I don’t yet know how it relates with the cipher.9th February 2021 at 9:13 am #53229F6exbParticipantI deciphered your hint, but sadly for me, I have it from the begining: it is deeply hidden in the coda.
9th February 2021 at 11:04 am #53233Mattyrat2027Participant@Madness @Cribbage I can see the de-PEM-ed hint, but I still can’t make sense of some of it. It is probably staring me right in the face, but I am still stuck 🙁 .
Can you confirm that the 3 numbers next to :INTEGER are the 3 I need? I then need t work out what base they are in, and then convert to base 10, then multiply, then convert to base 36 (with the end result being the clue)?
Sorry for inconvenience, but I am still relatively new to this area of encoding.
9th February 2021 at 1:44 pm #53234F6exbParticipant@Mattyrat2027.
Yes, the base they are in is evident and the same for the 3 numbers.
You can convert the first 2 with calc.exe in Windows (program mode), but not the third which is too long. You must search on the net, and also search a program in line to multiply these very long numbers. (55 digits for the result).
After that search for another program to convert from base 10 to base 36.
Good luck.9th February 2021 at 3:30 pm #53235Ace661ParticipantThis is no longer relevant, but the original clue might also be described as ASN.1 encoded data (data which has been ASN.1 encoded, then PEM encoded). As well as openssl, there are some online ASN.1 decoders which can do that conversion.
9th February 2021 at 4:47 pm #53236F6exbParticipantYou can use this one:
https://lapo.it/asn1js/9th February 2021 at 8:18 pm #53238CribbageParticipantI also spotted the keyword to 8A on day one, but I still found Madness’ clue very helpful …
-
AuthorPosts
- You must be logged in to reply to this topic.