On finishing his exams, the author received a PDF containing a QR code for verification via the CycladesVérif app. Intrigued by the potential for reverse engineering, the author disassembled the app to explore how the QR code's data is encrypted and decrypted using RSA. Despite challenges and inherent flaws in the RSA key usage

13m read timeFrom obrhubr.org
Post cover image
Table of contents
My first naive AttemptsDiscovering the atrocities committed to create the QR codeDisassembling the AppDigging through Assembly CodeSo what’s the issue here?Can we break it then?

Sort: