美文网首页
easyRSA5:共模攻击

easyRSA5:共模攻击

作者: 好好睡觉鸭 | 来源:发表于2020-12-05 17:22 被阅读0次

给出n1,n2,e1,e2,c1,c2,其中:
n1 = n2
e1 != e2,e1与e2互素

例题:

n: 9262301239516368689096260834916084043086781131015342151023772466662705697547083389653670083723144339786510554365528119133425341402250313392201627600355329
e: 195103693610432243979378102667076121713
c: 2180659822078075061965646574795380580996836367950522800445610727194087470390808771618813146076607874590171542024164863796768529598674191134581480949679274

n: 9262301239516368689096260834916084043086781131015342151023772466662705697547083389653670083723144339786510554365528119133425341402250313392201627600355329
e: 328153122420069787700455946254518672263
c: 69605536872002076635485508160948074819083416004775204561271394860632244108777285179012045689207647713675306838159730950355285462644656824181512511407633

解题脚本:

from libnum import n2s,s2n
from gmpy2 import invert
def egcd(a, b):
  if a == 0:
    return (b, 0, 1)
  else:
    g, y, x = egcd(b % a, a)
    return (g, x - (b // a) * y, y)

def main():
  n = 9262301239516368689096260834916084043086781131015342151023772466662705697547083389653670083723144339786510554365528119133425341402250313392201627600355329
  c1 = 2180659822078075061965646574795380580996836367950522800445610727194087470390808771618813146076607874590171542024164863796768529598674191134581480949679274
  c2 = 69605536872002076635485508160948074819083416004775204561271394860632244108777285179012045689207647713675306838159730950355285462644656824181512511407633
  e1 = 195103693610432243979378102667076121713
  e2 = 328153122420069787700455946254518672263
  s = egcd(e1, e2)
  s1 = s[1]
  s2 = s[2]
  if s1<0:
    s1 = - s1
    c1 = invert(c1, n)
  elif s2<0:
    s2 = - s2
    c2 = invert(c2, n)

  m = pow(c1,s1,n)*pow(c2,s2,n) % n
  a = hex(m)
  print a[2:].decode('hex')

if __name__ == '__main__':
  main()

解得flag:

flag{asdhkjahd-askghdkja-dashjdka}

相关文章

  • easyRSA5:共模攻击

    给出n1,n2,e1,e2,c1,c2,其中:n1 = n2e1 != e2,e1与e2互素 例题: 解题脚本: ...

  • CTF-CRYPTO-RSA #共模攻击

    巅峰极客——flag{4b0b4c8a-82f3-4d80-902b-8e7a5706f8fe} 描述 有两个公钥...

  • RSA 共模攻击 Isc2016——PhrackCTF

    原理引子假设有一家公司COMPANY,在员工通信系统中用RSA加密消息。COMPANY首先生成了两个大质数P,Q,...

  • 【转载】“第五空间”智能安全大赛部分WP

    目录 crypto rosb rsa共模攻击,网上找了个板子改了改 re nop main函数里存在三个需要nop...

  • 图解(差模干扰 共模干扰)

    张俊玲 19021210858 转载自:https://blog.csdn.net/guomutian911/ar...

  • jarvisoj-very hard RSA

    根据他的加密算法发现题目用了同一个N去加密同一个明文,所以可以想到共模攻击,用网上已有的脚本改改参数直接跑出来

  • 共模电感简介

    共模电感(CM0403CG)是一个以铁氧体为磁芯的共模干扰抑制器件,它由两个尺寸相同,匝数相同的线圈对称地绕制在同...

  • 关于运放

    共模输入电压和差模输入电压是针对差分放大电路而言的,设Vp为正向输入电压,Vn为反向输入电压,计算公式为:共模输入...

  • 共情+攻击→和谐

    我们的社交就像是掷球,情绪就是球,好的球就接着,不好的球就要扔给对方。我们处理好情绪就拥有更强气场,更好的拥有一...

  • 【心晴说育儿】与孩子相处的四种模式!

    Hello,你好! 这里是心晴的育儿说! 我们与他人之间的关系,一般可分为四种类别:被动模式、攻击模式、被动攻击模...

网友评论

      本文标题:easyRSA5:共模攻击

      本文链接:https://www.haomeiwen.com/subject/nvpgwktx.html