![](https://img-blog.csdnimg.cn/20201014180756913.png?x-oss-process=image/resize,m_fixed,h_64,w_64)
Crypto
文章平均质量分 68
Crypto
H3rmesk1t
记录一下平时遇到的问题和学习的东西
展开
-
红帽杯2021 Cryptography
红帽杯2021 Cryptographyprimegamehpcurveprimegame这道题搬了一道原题:原题链接采用的方法为低密度攻击的扩展题目代码:from decimal import *import mathimport randomimport structfrom flag import flagassert (len(flag) == 48)msg1 = flag[:24]msg2 = flag[24:] pri原创 2021-05-10 20:17:09 · 532 阅读 · 3 评论 -
基于RSA解题时yafu的使用
yafu安装使用方法以及mismatched parens解决方法1. windows安装下载链接2. linux安装由于yafu的elf文件是静态编译的,在一些系统上想要使用yafu就得重新编译。这里参考一下大佬的链接apt-get updateapt-get install gcc m4 zlib1g-dev make -ymkdir -p $HOME/src# install gmpcd $HOME/srcv=6.1.2wget https://gmplib.org/dow原创 2020-11-29 21:28:56 · 12983 阅读 · 9 评论 -
BUUCTF RSA4 ==> 中国剩余定理
题目地址解题代码:import gmpy2import binasciin1 = int(str(33131032421200003002021431224423222240014241042341310444114020300324300210433321420203120221240340022003120214232243410414310424424121420444444332300024413012202242231020110441104403011330232301410133原创 2020-12-02 14:50:35 · 855 阅读 · 0 评论 -
共模攻击题目
题目地址{2105833933735428784753410754461360530501544109050892409419881669121910339952680011280241638308899525390885746026672692561582689530337780161482936403462447519585999794314630558831593913077745048519629076624961234005435462251620768154297375625767738809原创 2020-12-01 22:24:32 · 495 阅读 · 0 评论 -
[HDCTF2019]bbbbbbrsa
题目地址题目给的两个文件:from base64 import b64encode as b32encodefrom gmpy2 import invert,gcd,irootfrom Crypto.Util.number import *from binascii import a2b_hex,b2a_heximport randomflag = "******************************"nbit = 128p = getPrime(nbit)q = get原创 2020-12-01 22:05:01 · 1027 阅读 · 0 评论 -
[BJDCTF2020]RSA ==>低加密指数攻击
题目地址task.py内容如下:from Crypto.Util.number import getPrime,bytes_to_longflag=open("flag","rb").read()p=getPrime(1024)q=getPrime(1024)assert(e<100000)n=p*qm=bytes_to_long(flag)c=pow(m,e,n)print c,nprint pow(294,e,n)p=getPrime(1024)n=p*qm=by原创 2020-12-01 21:33:01 · 777 阅读 · 1 评论