On finishing his exams, the author received a PDF containing a QR code for verification via the CycladesVérif app. Intrigued by the potential for reverse engineering, the author disassembled the app to explore how the QR code's data is encrypted and decrypted using RSA. Despite challenges and inherent flaws in the RSA key usage by the app, the author determined that breaking the security is impractical due to computational limitations.

13m read timeFrom obrhubr.org
Post cover image
Table of contents
My first naive AttemptsDiscovering the atrocities committed to create the QR codeDisassembling the AppDigging through Assembly CodeSo what’s the issue here?Can we break it then?

Sort: