diff --git a/python/foobar/three/hash_it_out.py b/python/foobar/three/hash_it_out.py index 78b2e2e..e5dd5e5 100644 --- a/python/foobar/three/hash_it_out.py +++ b/python/foobar/three/hash_it_out.py @@ -13,7 +13,7 @@ If memory serves, this locking mechanism relies on a horribly bad cryptographic To open these doors, you will need to reverse engineer the hash function it is using. You already managed to steal the details of the algorithm used, and with some quiet observation of the guards you find out the results of the hash (the digest). Now to break it. -The function takes a 16 byte input and gives a 16 byte output. It uses multiplication (*), bit-wise exclusive OR (XOR) and modulo (%) to calculate an element of the digest based on elements of the input message: +The function takes a 16 byte input and gives a 16 byte output. It uses multiplication (*), bit-wise exclusive OR (XOR) and modulo (%) to calculate an element of the digest based on elements of the input message: digest [i] = ( (129 * message[i]) XOR message[i-1]) % 256