CTF/Crypto

[TWCTF 2019] real-baby-rsa

BaaaaaaaaaaaaaaaaaaaaaaarkingDog 2019. 9. 2. 13:31

Really baby problem XD

 

problem.py

flag = 'TWCTF{CENSORED}'

# Public Parameters
N = 36239973541558932215768154398027510542999295460598793991863043974317503405132258743580804101986195705838099875086956063357178601077684772324064096356684008573295186622116931603804539480260180369510754948354952843990891989516977978839158915835381010468654190434058825525303974958222956513586121683284362090515808508044283236502801777575604829177236616682941566165356433922623572630453807517714014758581695760621278985339321003215237271785789328502527807304614754314937458797885837846005142762002103727753034387997014140695908371141458803486809615038309524628617159265412467046813293232560959236865127539835290549091
e = 65537

# Encrypt the flag!
for char in flag:
    print(pow(ord(char), e, N))

This RSA implementation encrypts every character. Since ord(char) has only 256 candidates, you can recover the plaintext by generates cipher table of $[0^e, 1^e, 2^e, 3^e, …, 255^e]$

 

table = [0]*256
N = 36239973541558932215768154398027510542999295460598793991863043974317503405132258743580804101986195705838099875086956063357178601077684772324064096356684008573295186622116931603804539480260180369510754948354952843990891989516977978839158915835381010468654190434058825525303974958222956513586121683284362090515808508044283236502801777575604829177236616682941566165356433922623572630453807517714014758581695760621278985339321003215237271785789328502527807304614754314937458797885837846005142762002103727753034387997014140695908371141458803486809615038309524628617159265412467046813293232560959236865127539835290549091
e = 65537
for i in range(256):
  table[i] = pow(i,e,N)

flag = ''
f = open('output')

lines = f.readlines()

for line in lines:
  xx = int(line.strip())
  for i in range(256):
    if xx == table[i]: flag += chr(i)

print(flag)