Created
July 19, 2021 05:07
-
-
Save mendel3/03ea764d4441de1e425a33b5e5ff016b to your computer and use it in GitHub Desktop.
Values from LITCTF 2021
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Solves multi prime rsa given n, e, and c. Need to factor n into primes first (recommend yafu) | |
# Reference https://crypto.stackexchange.com/questions/31109/rsa-enc-decryption-with-multiple-prime-modulus-using-crt | |
# From https://github.com/diogoaj/ctf-writeups/tree/master/2018/Timisoara/crypto/NotYourAverageRSA | |
# Params | |
e = 65537 | |
c = 5995952936037255929781924635247478684210608634033130708312547257115162490907542249878843535087479397093661825467058312432783733583919194527896596274111265902276347768535338414466405501311805051241244 | |
n = 10588750243470683238253385410274703579658358849388292003988652883382013203466393057371661939626562904071765474423122767301289214711332944602077015274586262780328721640431549232327069314664449442016399 | |
# primes are factored from n | |
primes = [2151055861, 2319991937, 2341310833, 2391906757, 2448497717, 2493514393, 2586983803, 2758321513, 2784469417, 2816940109, 2865965429, 3092165243, 3218701459, 3438516511, 3526137361, 3663803701, 3673658161, 3789550043, 3866428117, 3919632263, 4147385899] | |
def egcd(a, b): | |
if a == 0: | |
return (b, 0, 1) | |
else: | |
g, y, x = egcd(b % a, a) | |
return (g, x - (b // a) * y, y) | |
def modinv(a, m): | |
g, x, y = egcd(a, m) | |
if g != 1: | |
raise Exception('modular inverse does not exist') | |
else: | |
return x % m | |
ts = [] | |
xs = [] | |
ds = [] | |
for i in range(len(primes)): | |
ds.append(modinv(e, primes[i]-1)) | |
m = primes[0] | |
for i in range(1, len(primes)): | |
ts.append(modinv(m, primes[i])) | |
m = m * primes[i] | |
for i in range(len(primes)): | |
xs.append(pow((c%primes[i]), ds[i], primes[i])) | |
x = xs[0] | |
m = primes[0] | |
for i in range(1, len(primes)): | |
x = x + m * ((xs[i] - x % primes[i]) * (ts[i-1] % primes[i])) | |
m = m * primes[i] | |
print(hex(x%n)[2:-1]) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment