网鼎杯you_raise_me_up wp

0x01题目:

题目很简单就七行代码。

#!/usr/bin/env python
# -*- coding: utf-8 -*-
from Crypto.Util.number import *
import random

n = 2 ** 512
m = random.randint(2, n-1) | 1
c = pow(m, bytes_to_long(flag), n)
print 'm = ' + str(m)
print 'c = ' + str(c)

# m = 391190709124527428959489662565274039318305952172936859403855079581402770986890308469084735451207885386318986881041563704825943945069343345307381099559075
# c = 6665851394203214245856789450723658632520816791621796775909766895233000234023642878786025644953797995373211308485605397024123180085924117610802485972584499

0x02 思路

要解决的是离散对数问题
c = m^flag mod n
这里m,n,c已知,可使用sagemath的 discrete_log(a,base,ord,operation)函数求解flag
discrete详解

0x03 exp:

sage: m = 3911907091245274289594896625652740393183059521729368594038550795814027709868903084690847354512078853863189
....: 86881041563704825943945069343345307381099559075
....: c = 6665851394203214245856789450723658632520816791621796775909766895233000234023642878786025644953797995373211
....: 308485605397024123180085924117610802485972584499
....: n = 2 ** 512
....: c = Mod(c,n)
....: m = Mod(m,n)
....: flag = discrete_log(c,m)
....: print(flag)
....:
56006392793405651552924479293096841126763872290794186417054288110043102953612574215902230811593957757
from Crypto.Util.number import *
d = 56006392793405651552924479293096841126763872290794186417054288110043102953612574215902230811593957757
print(long_to_bytes(d))

得到flag
在这里插入图片描述

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值