From fab7557c5ba97ab423246fd1d4ba42159fc47bd3 Mon Sep 17 00:00:00 2001 From: Orien Vandenbergh Date: Tue, 30 Aug 2016 17:43:37 -0600 Subject: [PATCH] fix whitespace --- python/foobar/three/hash_it_out.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/python/foobar/three/hash_it_out.py b/python/foobar/three/hash_it_out.py index 78b2e2e..e5dd5e5 100644 --- a/python/foobar/three/hash_it_out.py +++ b/python/foobar/three/hash_it_out.py @@ -13,7 +13,7 @@ If memory serves, this locking mechanism relies on a horribly bad cryptographic To open these doors, you will need to reverse engineer the hash function it is using. You already managed to steal the details of the algorithm used, and with some quiet observation of the guards you find out the results of the hash (the digest). Now to break it. -The function takes a 16 byte input and gives a 16 byte output. It uses multiplication (*), bit-wise exclusive OR (XOR) and modulo (%) to calculate an element of the digest based on elements of the input message: +The function takes a 16 byte input and gives a 16 byte output. It uses multiplication (*), bit-wise exclusive OR (XOR) and modulo (%) to calculate an element of the digest based on elements of the input message: digest [i] = ( (129 * message[i]) XOR message[i-1]) % 256