The challenge description starts ‘My buddies Whitfield and Martin were trying to share a secret key’, so googling something like ‘Whitfield Martin cipher’ seems like a good place to begin. Immediately we get results for the Diffie–Hellman key exchange, which fortunately can be described in terms of A, B, p, g, and s (the value of the secret key we need).

Scripts to brute-force this secret key are easy to find on GitHub. We used this DHAttack.py script to get the flag utflag{53919}, although there are some much faster alternatives. Try this script to get the flag yourself:

#!/usr/bin/python3

# Based on github.com/DrMMZ/Attack-Diffie-Hellman

p = 69691
g = 1001
A = 17016
B = 47643

for x in range(1, p):  # or (g**x) % p == B
if (g**x) % p == A:
a = x

s = (B**a) % p  # or (A**b) % p

print(s)