Skip to content

Hens and Roosters crypto/web chall from UMassCTF 2026#81

Open
FlyN-Nick wants to merge 6 commits intoCUCTF:mainfrom
FlyN-Nick:umassctf/HensandRoosters
Open

Hens and Roosters crypto/web chall from UMassCTF 2026#81
FlyN-Nick wants to merge 6 commits intoCUCTF:mainfrom
FlyN-Nick:umassctf/HensandRoosters

Conversation

@FlyN-Nick
Copy link
Copy Markdown

No description provided.

Copy link
Copy Markdown
Contributor

@IsaacTrost IsaacTrost left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, one minor fixup and I think it is good to merge. Also fix your inline latex.


where each target $t_i \in \{0, 1\}$ is a bit extracted from the message hash (via SHAKE-128).

**The weak parameterization.** In this implementation, the public key matrices are constructed such that all entries $(P_i)_{jk} \in \mathbb{F}_2 \subseteq \mathbb{F}_{2^7}$ — i.e., every coefficient is either 0 or 1. This is the root cause of the vulnerability.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Explain this a bit, why does this hold. Maybe point to the code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants