Skip to content

Latest commit

 

History

History

BabyRSA

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

BSides Delhi CTF 2019 : BabyRSA

category : crypto

points : 930

write-up

This is yet another RSA challenge
salt can be decrypt directly
Then, use wiener attack to factor n = p * q and get p1 * p2
Simply gcd p1 * p2 with n1 and n2 and get all the prime factors
Note that gcd(e1, (p1 - 1) * (q1 - 1)) != 1 and gcd(e2, (p2 - 1) * (q2 - 1)) != 1, we can't directly decrypt magic
Luckily, gcd(e1, q1 - 1) == 2 and gcd(e2, q2 - 1) == 2
We can get m ** 2 % q1 and m ** 2 % q2
Then use the same technique as in Rabin cryptosystem, which is modular square root and chinese remainder theorem

flag: bsides_delhi{JuG1iNg_WiTh_RS4}

other write-ups and resources