githubEdit

CH01 - 500pts

Briefing

Download the files and find a way to retrieve the encrypted data. Contents: 1.pub, 2.pub, m1.enc, m2.enc

Challenge Files:

Solution

  1. Searching for "rsa two messages different exponents" finds this Crypto StackExchange answerarrow-up-right which links to this other Crypto StackExchange answerarrow-up-right which mentions a "common modulus attack."

  2. Mathematical Attacks on RSA Cryptosystemarrow-up-right states: "A Common Modulus attack can be used to recover the plaintext when the same message is encrypted to two RSA keys that use the same modulus. This algorithm works if and only if message sends with the same modulus and relatively prime encryption exponents." You can learn more by reading this article RSA Attacks: Common Modulusarrow-up-right.

  3. Searching for a Python script to conduct this attack finds HexPandaa/RSA-Common-Modulus-Attackarrow-up-right.

  4. We can run this tool using python3 rsa-cm.py -c1 ch01/m1.enc -c2 ch01/m2.enc -k1 ch01/1.pub -k2 ch01/2.pub to get the flag: Flag: shaRinGisCaRinG-010.

Flag

shaRinGisCaRinG-010

Last updated