Update README.md

This commit is contained in:
Bill Buchanan
2023-02-27 21:56:29 +00:00
committed by GitHub
parent 21ab72e02a
commit 721a9411b3

View File

@@ -4,16 +4,16 @@ These are a collection of CTFs related to encryption.
Bob has encrypted this RSA key pair with 128-bit AES. But he can't remember the password he applied. All he can remember is that it might have been his favouriate colour. Can you determine the two prime numbers (in hex) which make up the modulus?
```
-----BEGIN ENCRYPTED PRIVATE KEY-----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MIIBvTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIzZS/FkAl8o8CAggA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-----END ENCRYPTED PRIVATE KEY-----
```
The method is defined [https://asecuritysite.com/openssl/rsa_keygen2](https://asecuritysite.com/openssl/rsa_keygen2).
@@ -23,48 +23,48 @@ For this we can basically try with a batch file, and substitute colours. This on
% cat 1.key | openssl rsa -passin pass:blue -text
Private-Key: (512 bit, 2 primes)
modulus:
00:c3:da:b8:08:4e:88:5e:23:11:52:e0:b8:25:42:
52:40:40:22:58:5d:80:f7:34:2b:f6:ff:5d:1f:7e:
e3:1d:29:9f:65:77:6d:71:76:97:57:5f:f8:d7:4d:
b8:9c:0a:4f:7e:93:ff:f5:46:8f:e8:c1:89:b5:b1:
a2:1e:64:23:71
00:eb:3a:72:f0:05:d5:3f:de:f9:5e:7f:77:0a:86:
f0:a4:bd:ca:51:d1:ac:a7:6a:a7:1d:af:9b:dd:cc:
a1:37:c5:12:0c:59:57:4d:59:d8:d4:b8:fa:7c:34:
d8:8b:ab:e6:5b:5e:2e:f1:85:48:27:89:45:bc:cc:
3a:1f:71:ee:31
publicExponent: 65537 (0x10001)
privateExponent:
14:31:67:ca:0b:76:c9:e5:e9:b2:56:d3:05:9c:69:
e8:8f:f4:3a:92:21:6a:db:69:31:05:31:2f:bf:20:
61:70:2b:ef:1e:b4:a8:40:23:6b:1c:fd:58:0e:66:
aa:0c:d4:e1:3c:47:a2:8b:08:f2:a6:5a:c2:1e:7d:
76:d4:bd:f5
00:b4:bc:85:21:9d:29:bb:d8:a3:fc:12:ae:31:9d:
7a:fa:e9:84:b1:97:0c:34:da:82:ab:11:8a:0e:42:
b3:40:b8:26:c5:9e:8a:4e:a9:9d:a2:df:a9:e6:e4:
89:fa:6b:f1:5e:b4:14:12:60:e4:0f:89:45:b9:db:
6c:ba:eb:45:1d
prime1:
00:ec:14:d3:2a:06:c3:bf:0d:68:e0:83:3f:7c:7f:
ec:87:16:30:dd:9a:bc:57:0d:e7:0b:db:39:16:5b:
12:4c:df
00:f8:07:29:8d:3e:20:d4:ee:1d:0d:fd:36:cd:26:
36:d2:15:5d:f2:3e:6b:fd:ee:2c:29:01:98:4f:a8:
68:6f:63
prime2:
00:d4:61:05:b7:59:ff:93:ee:91:33:56:fb:87:86:
68:4e:fa:82:8c:10:68:85:b3:70:9e:f2:c8:e1:a3:
ca:49:af
00:f2:c9:f7:bf:f2:50:e7:2a:02:8c:74:04:e0:c0:
b2:d5:9d:b9:fb:d8:d4:eb:5b:33:53:87:ae:86:c8:
7b:32:5b
exponent1:
74:62:ab:db:bb:2c:03:63:24:02:13:12:58:59:64:
8d:10:56:94:d9:74:e2:61:fb:36:b0:23:cb:ae:a8:
2d:f7
5b:d0:2a:ed:82:06:1d:4c:57:ad:0a:02:f3:46:26:
1c:f6:93:e4:4c:7f:25:6c:b9:24:24:d7:01:05:d2:
43:09
exponent2:
00:9e:cf:da:85:6c:20:49:0f:d9:b6:69:71:f7:bb:
13:5f:13:c6:f1:54:07:c5:0b:14:c9:57:45:ce:2d:
3b:c4:73
00:95:a8:a5:cd:6e:43:2c:9b:9a:c2:95:69:c4:59:
44:63:a5:3c:55:e0:4d:2f:5f:22:7e:64:ee:d2:2a:
96:b6:6d
coefficient:
00:95:4f:6d:16:84:7f:2b:cc:ca:c9:19:0d:81:db:
42:b7:ef:82:3c:8c:4d:3c:96:55:32:2c:01:92:c7:
5e:f1:69
3f:01:70:5e:21:bc:ff:6c:a1:a9:23:ff:9f:15:76:
ab:a0:29:f0:cb:a4:71:51:da:2f:06:cb:ac:ad:00:
b9:75
writing RSA key
-----BEGIN PRIVATE KEY-----
MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEAw9q4CE6IXiMRUuC4
JUJSQEAiWF2A9zQr9v9dH37jHSmfZXdtcXaXV1/41024nApPfpP/9UaP6MGJtbGi
HmQjcQIDAQABAkAUMWfKC3bJ5emyVtMFnGnoj/Q6kiFq22kxBTEvvyBhcCvvHrSo
QCNrHP1YDmaqDNThPEeiiwjyplrCHn121L31AiEA7BTTKgbDvw1o4IM/fH/shxYw
3Zq8Vw3nC9s5FlsSTN8CIQDUYQW3Wf+T7pEzVvuHhmhO+oKMEGiFs3Ce8sjho8pJ
rwIgdGKr27ssA2MkAhMSWFlkjRBWlNl04mH7NrAjy66oLfcCIQCez9qFbCBJD9m2
aXH3uxNfE8bxVAfFCxTJV0XOLTvEcwIhAJVPbRaEfyvMyskZDYHbQrfvgjyMTTyW
VTIsAZLHXvFp
MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEA6zpy8AXVP975Xn93
CobwpL3KUdGsp2qnHa+b3cyhN8USDFlXTVnY1Lj6fDTYi6vmW14u8YVIJ4lFvMw6
H3HuMQIDAQABAkEAtLyFIZ0pu9ij/BKuMZ16+umEsZcMNNqCqxGKDkKzQLgmxZ6K
Tqmdot+p5uSJ+mvxXrQUEmDkD4lFudtsuutFHQIhAPgHKY0+INTuHQ39Ns0mNtIV
XfI+a/3uLCkBmE+oaG9jAiEA8sn3v/JQ5yoCjHQE4MCy1Z25+9jU61szU4euhsh7
MlsCIFvQKu2CBh1MV60KAvNGJhz2k+RMfyVsuSQk1wEF0kMJAiEAlailzW5DLJua
wpVpxFlEY6U8VeBNL18ifmTu0iqWtm0CID8BcF4hvP9soakj/58VdqugKfDLpHFR
2i8Gy6ytALl1
-----END PRIVATE KEY-----
```
## Cracking RSA with Chinese Remainder Theory - Håstads Broadcast