Crypto
加解密
「已注销」
这个作者很懒,什么都没留下…
展开
-
SUCTF2019 MT
from Crypto.Random import randomfrom Crypto.Util import numberdef convert(m): m = m ^ m >> 13 m = m ^ m << 9 & 2029229568 m = m ^ m << 17 & 2245263360 m = m ^ m >> 19 return mdef transform(message):原创 2020-08-02 22:09:56 · 459 阅读 · 0 评论 -
GKCTF2020 小学生的密码学
import gmpy2import stringimport base64m = gmpy2.invert(11,26)table = string.ascii_lowercaseprint tablesecrt = "welcylk"plain = ''for i in secrt: x = table.index(i) j = (x-6)*m%26 print j plain += table[j]print plainprint base64原创 2020-06-22 20:41:59 · 1055 阅读 · 0 评论 -
MRCTF2020 babyRSA
import sympyimport gmpy2Q_1= 103766439849465588084625049495793857634556517064563488433148224524638105971161051763127718438062862548184814747601299494052813662851459740127499557785398714481909461631996020048315790167967699932967974484481209879664173009原创 2020-05-21 19:47:34 · 369 阅读 · 0 评论 -
WUSTCTF2020 大数计算
42 =(-80538738812075974)³+ 80435758145817515³+ 12602123297335631³ 生命、宇宙、万物的终极答案是42from sympy import *x = symbols('x')print(integrate(2*x, (x, 0, 22)))sum = 1for i in range(1,2021): sum = sum*iprint hex(int(str(sum)[:8],10))[2:]print hex(int(st原创 2020-05-19 22:25:09 · 610 阅读 · 0 评论 -
buuoj RSA & what
RSA公模攻击+Base64隐写:import gmpy2from Crypto.Util.number import *n = 78509541971826828686650821430481698544707729376681939872804641116691781082048475931429102897649822366122939500947406317370516262703761099353961775190544303927822758350460480825193108381890原创 2020-05-16 12:49:08 · 1116 阅读 · 0 评论 -
RoarCTF2019 RSA
A=(((y%x)**5)%(x%y))**2019+y**316+(y+1)/xp=next_prime(z*x*y)q=next_prime(z)A = 26833491826787145242474695127934760098610147810049249054841274803081613777681928680615618865770486464323821289608814874634274141761144868858306939594049897432291035169244325原创 2020-05-16 09:18:34 · 1214 阅读 · 0 评论 -
buuoj EasyProgram
flag = open('file.txt','rb').readline()S=[]T=[]for i in range(256): S.append(i)key = "whoami"for i in range(256): T.append(ord(key[i%len(key)]))j = 0for i in range(256): j = (j+S[i]+T[i])%256 S[i],S[j] = S[j],S[i]i = 0j = 0x =原创 2020-05-12 20:42:09 · 227 阅读 · 0 评论 -
buuoj 坏蛋是雷宾
老牌刺客之王混进了女王的住所。一天,女王得到了一个匿名举报,说她的侍卫里有一个刺客,叫做Rabin,而他的信息就在一份文件里,文件中有附带一个Pk,是523798549,密文是162853095,校验码二进制值是110001,根据说明是放在明文后一起加密的,明文与密文长度相同。加密算法和这位老牌刺客同名。根据题意为Rabin算法,解码如下:import gmpy2 c = 1628530...原创 2020-05-01 23:43:07 · 769 阅读 · 1 评论 -
GWCTF 2019 BabyRSA
题目:import hashlibimport sympyfrom Crypto.Util.number import *flag = 'GWHT{******}'secret = '******'assert(len(flag) == 38)half = len(flag) / 2flag1 = flag[:half]flag2 = flag[half:]sec...原创 2020-05-01 21:28:39 · 1345 阅读 · 3 评论 -
MRCTF2020 天干地支+甲子
得到得字符串用MRCTF{}包裹一天Eki收到了一封来自Sndav的信,但是他有点迷希望您来解决一下甲戌 11甲寅 51甲寅 51癸卯 40己酉 46甲寅 51辛丑 38为天干地支60年轮回的,脚本如下:a= [11, 51,51,40,46,51,38]print ''.join(chr(i+60) for i in a)...原创 2020-05-01 13:02:49 · 1233 阅读 · 0 评论 -
ACTF新生赛2020 crypto-classic1
哇,这里有压缩包的密码哦,于是我低下了头,看向了我的双手,试图从中找到某些规律xdfv ujko98 edft54 xdfv pok,.; wsdr43键盘码,得到的密码为circle密文为:SRLU{LZPL_S_UASHKXUPD_NXYTFTJT}SRLU未加密前应为ACTF,编写脚本如下:#破解keys='ABCDEFGHIJKLMNOPQRSTUVWXYZ' s1...原创 2020-04-30 21:42:27 · 2481 阅读 · 3 评论 -
DCICHF 2020 GM
该算法为RSA Goldwasser–Micali cryptosystem算法,sage解法如下:n=943345166174941322591941459524332131176290203790885095479970339608386371864113650305321599557655800317124919296997286484079529878473055321041798371...原创 2020-04-19 21:58:41 · 148 阅读 · 0 评论 -
buuoj INSHack2019 Yet Another RSA Challenge - Part 1
题目:import subprocessp = subprocess.check_output('openssl prime -generate -bits 2048 -hex')q = subprocess.check_output('openssl prime -generate -bits 2048 -hex')flag = int('INSA{REDACTED}'.encode('...原创 2020-03-31 12:23:18 · 343 阅读 · 0 评论 -
buuoj BJDCTF 2nd rsa1
e=12563813p2+q2=212364140166849615900345386827373855409339975015067104662427876599237913584644325298351035312142873679076322952156014899039684112869213110216339149927308917382659025088961162906104834...原创 2020-03-26 00:16:01 · 990 阅读 · 0 评论