rsa
文章平均质量分 53
「已注销」
这个作者很懒,什么都没留下…
展开
-
[watevrCTF 2019]Swedish RSA
[watevrCTF 2019]Swedish RSA附件:polynomial_rsa.sage:flag = bytearray(raw_input())flag = list(flag)length = len(flag)bits = 16## Prime for Finite Field.p = random_prime(2^bits-1, False, 2^(bits-1))file_out = open("downloads/polynomial_rsa.txt", "w原创 2021-08-01 21:59:19 · 682 阅读 · 0 评论 -
[NPUCTF2020]共 模 攻 击
[NPUCTF2020]共 模 攻 击附件:hint.py:from gmpy2 import *from Crypto.Util.number import *from secret import hintm = bytes_to_long(hint)p = getPrime(256)c = pow(m, 256, p)print(p)p, q = getPrime(256), getPrime(256)n = p * qe1, e2 = getPrime(32), getP原创 2021-08-01 21:55:06 · 953 阅读 · 0 评论 -
[NPUCTF2020]认清形势,建立信心
[NPUCTF2020]认清形势,建立信心附件task.py:from Crypto.Util.number import *from gmpy2 import *from secret import flagp = getPrime(25)e = # Hiddenq = getPrime(25)n = p * qm = bytes_to_long(flag.strip(b"npuctf{").strip(b"}"))c = pow(m, e, n)print(c)print(p原创 2021-08-01 21:47:46 · 563 阅读 · 0 评论 -
[QCTF2018]Xman-RSA
[QCTF2018]Xman-RSA附件:ciphertext:1240198b148089290e375b999569f0d53c32d356b2e95f5acee070f016b3bef243d0b5e46d9ad7aa7dfe2f21bda920d0ac7ce7b1e48f22b2de410c6f391ce7c4347c65ffc9704ecb3068005e9f35cbbb7b27e0f7a18f4f42ae572d77aaa3ee189418d6a07bab7d93beaa365c9834原创 2021-08-01 21:46:52 · 411 阅读 · 0 评论 -
[INSHack2019]Yet Another RSA Challenge - Part 1
[INSHack2019]Yet Another RSA Challenge - Part 1附件:description.mdBuy an encrypted flag, get a (almost intact) prime factor for free !You can find a harder version of this challenge in the Programming category.output.txt71957974565330311902587309.原创 2021-07-26 21:37:25 · 386 阅读 · 0 评论 -
[INSHack2017]rsa16m
[INSHack2017]rsa16m附件:description.mdChallenge description:When you need really secure communications, you use RSA with a 4096 bit key. <br>I want really really really secure communications to transmit the nuclear launch codes (yeah IoT is ever原创 2021-07-25 13:38:52 · 305 阅读 · 0 评论 -
[De1CTF2019]babyrsa
[De1CTF2019]babyrsa附件import binasciifrom data import e1,e2,p,q1p,q1q,hint,flagn = [2012961535249176549934011294318831718054876159786130084730582714151046561967053684463455824643923037165883692810306343287024570718035590719428486151090607126535240957原创 2021-07-25 13:37:14 · 443 阅读 · 0 评论 -
[MRCTF2020]Easy_RSA
[MRCTF2020]Easy_RSA附件:import sympyfrom gmpy2 import gcd, invertfrom random import randintfrom Crypto.Util.number import getPrime, isPrime, getRandomNBitInteger, bytes_to_long, long_to_bytesimport base64from zlib import *flag = b"MRCTF{XXXX}"base原创 2021-07-25 13:26:00 · 955 阅读 · 2 评论 -
[NPUCTF2020]EzRSA
[NPUCTF2020]EzRSA附件:from gmpy2 import lcm , powmod , invert , gcd , mpzfrom Crypto.Util.number import getPrimefrom sympy import nextprimefrom random import randintp = getPrime(1024)q = getPrime(1024)n = p * qgift = lcm(p - 1 , q - 1)e = 54722fla原创 2021-07-25 13:25:20 · 506 阅读 · 0 评论 -
[GWCTF 2019]BabyRSA
[GWCTF 2019]BabyRSA查看题目secretN=636585149594574746909030160182690866222909256464847291783000651837227921337237899651287943597773270944384034858925295744880727101606841413640006527614873110651410155893776548737823152943797884729130149758279127430044739254转载 2021-05-29 13:18:22 · 730 阅读 · 0 评论