Skip to content

Latest commit

 

History

History
42 lines (31 loc) · 2.79 KB

File metadata and controls

42 lines (31 loc) · 2.79 KB

C2: Flipping Bits

Author: Kaushik S Kalmady, Swathi S Bhat

ct1:  13981765388145083997703333682243956434148306954774120760845671024723583618341148528952063316653588928138430524040717841543528568326674293677228449651281422762216853098529425814740156575513620513245005576508982103360592761380293006244528169193632346512170599896471850340765607466109228426538780591853882736654
ct2:  79459949016924442856959059325390894723232586275925931898929445938338123216278271333902062872565058205136627757713051954083968874644581902371182266588247653857616029881453100387797111559677392017415298580136496204898016797180386402171968931958365160589774450964944023720256848731202333789801071962338635072065
e1:  13
e2:  15
modulus:  103109065902334620226101162008793963504256027939117020091876799039690801944735604259018655534860183205031069083254290258577291605287053538752280231959857465853228851714786887294961873006234153079187216285516823832102424110934062954272346111907571393964363630079343598511602013316604641904852018969178919051627

You have two captured ciphertexts. The public key is (e1, n). But,
due to a transient bit flip, the second ciphertext was encrypted with a faulty
public key: (e2, n). Recover the plaintexts.

(The algorithm is RSA.)


This one was fun and easy challenge. @SwathiSBhat found this post which explains the solution.

Here is the decryption script. (Check out rsasim :p)

from rsasim.gcd_utils import inverse
from Crypto.Util.number import long_to_bytes

n = 103109065902334620226101162008793963504256027939117020091876799039690801944735604259018655534860183205031069083254290258577291605287053538752280231959857465853228851714786887294961873006234153079187216285516823832102424110934062954272346111907571393964363630079343598511602013316604641904852018969178919051627
m13 = 13981765388145083997703333682243956434148306954774120760845671024723583618341148528952063316653588928138430524040717841543528568326674293677228449651281422762216853098529425814740156575513620513245005576508982103360592761380293006244528169193632346512170599896471850340765607466109228426538780591853882736654
m15 = 79459949016924442856959059325390894723232586275925931898929445938338123216278271333902062872565058205136627757713051954083968874644581902371182266588247653857616029881453100387797111559677392017415298580136496204898016797180386402171968931958365160589774450964944023720256848731202333789801071962338635072065

m2 = (m15 * inverse(m13, n)) % n
m11 = (m13 * inverse(m2, n)) % n
m4 = (m15 * inverse(m11, n)) % n
m9 = (m13 * inverse(m4, n)) % n
m5 = (m9 * inverse(m4, n)) % n
m = (m5 * inverse(m4, n)) % n

print long_to_bytes(m)

Flag

flag-54d3db5c1efcd7afa579c37bcb560ae