mersenne_twister

Zh3r0 CTF V2 | Twist and Shout

#zh3ro_CTF_2021 from secret import flag import os import random state_len = 624*4 right_pad = random.randint(0,state_len-len(flag)) left_pad = state_len-len(flag)-right_pad state_bytes = os.urandom(left_pad)+flag+os.urandom(right_pad) stat…

Zh3r0 CTF V2 | import numpy as MT

#zh3ro_CTF_2021 #good_challenges_2021 import os from numpy import random from Crypto.Cipher import AES from Crypto.Util.Padding import pad from secret import flag def rand_32(): return int.from_bytes(os.urandom(4),'big') flag = pad(flag,16…

SECCON CTF 2022 Quals | janken vs kurenaif

#SECCON_CTF_2022_Quals import os import signal import random import secrets FLAG = os.getenv("FLAG", "fake{cast a special spell}") def janken(a, b): return (a - b + 3) % 3 signal.alarm(1000) print("kurenaif: Hi, I'm a crypto witch. Let's a…

Zh3r0 CTF V2 | Real Mersenne

#zh3ro_CTF_2021 import random from secret import flag from fractions import Fraction def score(a,b): if abs(a-b)<1/2**10: # capping score to 1024 so you dont get extra lucky return Fraction(2**10) return Fraction(2**53,int(2**53*a)-int(2**…

RaRCTF 2021 | randompad

#rarctf2021 from random import getrandbits from Crypto.Util.number import getPrime, long_to_bytes, bytes_to_long def keygen(): # normal rsa key generation primes = [] e = 3 for _ in range(2): while True: p = getPrime(1024) if (p - 1) % 3: …

InCTF 2020 | FaultyLFSR

#inctf2020 #LFSR from random import Random from flag import flag ,seeds from Crypto.Cipher import AES from hashlib import sha256 SECRET = 14810031 #assert seeds[3]%seeds[1] == 0 CLUE-1 def generate() : masks = [43, 578, 22079, 142962] for …

N1CTF 2020 | VSS

#Mersenne_Twister #!/usr/bin/python3 import qrcode # https://github.com/lincolnloop/python-qrcode import random import os from PIL import Image from flag import FLAG def vss22_gen(img): m, n = img.size share1, share2 = Image.new("L", (2*m,…