n = 549785700554963543393222974982211136067042846536450239199968863551137077564447156832697813202963334596948298760762991663065504535035143397250208506445202607659676332816610122258862787906629525548439909792727593939957178783466989816894454522630301104349317697612174888605090061231211194974337772507249418567229560145454791075929946332668360553910328900103264562348881791004831033587660163923517440406942993348972589262051083908075790422096042338651001937740085414301019827335549437397656318095919875053213333008551761167437683250592542156348138055482054331330609375930693247365749085041596578748797801601289693449629548744535914348450016287545136436964138806081283470239420969311905998245715160353982174880912315601876305613349276824998688275587308133069178764001924866079232824850209407236694426779262951463035278887804883917516580169051530590466082511045503107508117656821592538792566264160105940730326929474477787053681516844548383814388361089499629312831727731267796167205124844987064389097138747938870221504684958713047985374714612321540288239995935347905120710583169131356970267386562665138437631517802641426575996558648777831102462652517305151412695166331935115971277205305816897886952646432233312318756155702046584205507027737
# 已知两者n相同,e不同,共模攻击
import gmpy2
from Crypto.Util.number import isPrime, sieve_base as primes, long_to_bytes
def egcd(a, b):
if b == 0:
return a, 0;
else:
x, y = egcd(b, a % b)
return y, x - (a // b) * y # 扩展欧几里得算法
s = egcd(e1, e2)
s1 = s[0]
s2 = s[1]
print(s[0], s[1])
m = gmpy2.powmod(c1, s1, n) * gmpy2.powmod(c2, s2, n) % n
print(long_to_bytes(m))
#flag{baby_r3a_sierting_2023}
复制代码
EasyRSA
关注微信公众号“中学生CTF”,回复“开始游戏”
按要求回复相关内容分别获取公钥 密文 提示 私钥
公钥
-----BEGIN RSA PUBLIC KEY-----MIGJAoGBAKOSX8AR8/CsqasPfC7VL5aJzic8W9KFI1920SHhEhmcWd7yp5Dl9UfXgzLHIIZJExd7D1CwIxAMHANHV6qF/7FEedwEMHusBxbAWsjXQUGFeEMmzo+SUVbbRnDSw/jZwCNoofQfukVO7+5CBzV5S/N5WDTk+8bvwfrDDA9AHdW5AgMBAAE=-----END RSA PUBLIC KEY-----
c = "QhS9n7TkavmU8E4CFa872ZzqIq/NG/agtCkxQBzB0/E1PDZRv6otOYxBLsxwd/7h0fPkYYMCpPt4nXqYBGQ/n8/F3q3spV94+IFs7+CjyybUvAQg8MXLgSTzVt+ua0Ub0/et5/7Q1xAcgzT3/jWHwjklEAykdpSYMAqv5PQrhT4="
c = bytes_to_long(base64.b64decode(c))
m = pow(c,d,n)
print(long_to_bytes(m))
# flag{c2915ff0a0ca8ffd50af20cd27682ff2}
复制代码
ezPython
查看代码[code] import timefrom tqdm import tqdmfrom qsnctf import *flag = "flag{}"flag = caesar_encrypt(flag, 8)for i in tqdm(range(21)): flag = string_reverse(flag)flag = atbash_cipher(flag)for i in tqdm(range(20)): flag = base64_encode(flag)flag = base100_encode(flag)print(flag)# flag = "emoji emoji""""
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!