coppersmith's_short_pad_attack

TSG Live CTF 10 | random_pair

#tsg_live_ctf_10 #!/usr/bin/python3 from Crypto.Util.number import getPrime, bytes_to_long import flag import secrets assert(len(flag.flag) == 33) p = getPrime(512) q = getPrime(512) N = p * q phi = (p - 1) * (q - 1) e = 3 assert(phi%e!=0)…

Chujowy CTF 2020 | grownup RSA

N = 7994357243619412096346425559023154359080581236053314383870017985493384535205504119550400345883826817342615519489342317081121882143293857751974750159008864626782238232216635048703034178108919145901836276953638225815237056415040851559962…

Defenit CTF 2020 | Double Message

RSA Coppersmith's Short Pad Attack + Franklin-Reiter Related Message Attack https://furutsuki.hatenablog.com/entry/2020/06/07/192729#Crypto-Double-Message

CrewCTF 2022 | Malleable Metal

#CrewCTF_2022 #uninterested_challenge_list from Crypto.PublicKey import RSA from Crypto.Util.number import bytes_to_long import random import binascii from secret import flag e = 3 BITSIZE = 8192 key = RSA.generate(BITSIZE) n = key.n flag …

ACSC 2021 | Two Rabin

#acsc2021 import random from Crypto.Util.number import * from Crypto.Util.Padding import pad from flag import flag p = getStrongPrime(512) q = getStrongPrime(512) n = p * q B = getStrongPrime(512) m = flag[0:len(flag)//2] print("flag1_len …

TSG LIVE CTF 10 | random duo

#tsg_live_ctf_10 #!/usr/bin/python3 from Crypto.Util.number import getPrime, bytes_to_long import flag import secrets assert(len(flag.flag) == 33) p = getPrime(512) q = getPrime(512) N = p * q phi = (p - 1) * (q - 1) e = 3 assert(phi%e!=0)…