Ti_moe_more Apr 2026

: Observe that the LSB of the keystream is directly tied to the LSB of the initial state. Bit-Stepping : Assume the first bits of the state are known. Simulate the T-function for the next bit (

The vulnerability in stems from the predictable bit-propagation within the T-function: Bit-by-Bit Leakage : Because the ti_moe_more

is a cryptographic challenge from the 2024 BuckeyeCTF , focusing on exploiting a flawed implementation of a Custom T-Function based stream cipher [1, 2]. Challenge Overview : Observe that the LSB of the keystream

: The state size or the complexity of the mixing function is insufficient to prevent a guess-and-determine attack or a simple breadth-first search on the bit transitions [3, 5]. Solution Strategy (Write-up) Challenge Overview : The state size or the

Compare the resulting bit with the observed ciphertext/keystream bit.

: Since there may be multiple candidates for a bit that satisfy the equation temporarily, use a recursive search or a queue-based approach to find the state that consistently produces the correct keystream for the entire length of the flag [3, 4].