Writeups
  • Archive
  • 2021
    • CSAW Qualification Round
      • Crypto
        • Gotta Decrypt Them All
    • TMUCTF
      • 435!
      • Common Factor
    • WORMCON 0x01
      • Fake Encryption
      • Rem, Shinobu, Asuna
      • Exclusive
      • Sir Oracle
      • Invisible Cipher
Powered by GitBook
On this page

Was this helpful?

  1. 2021
  2. CSAW Qualification Round
  3. Crypto

Gotta Decrypt Them All

253 solves / 175 points

PreviousCryptoNextTMUCTF

Last updated 3 years ago

Was this helpful?

Source files and Solve Script:

Attack Idea

STEP 1: Identify the encoded string

STEP 2: Decrypt to get Integers

STEP 3: Convert them to ASCII characters

STEP 4: Identify and decode it to get parameters and encrypted message

STEP 5: Check the small public exponent (e) and take the eth root to get the message

Why STEP 5 works?

In practice, we pick the RSA parameters and the message such thatme≥nm^{e} \geq nme≥n. If we use a small message and a small exponent then it just becomesc=mec = m^{e}c=me and we can directly calculatem=ecm = \sqrt[e]{}cm=e​c to get back our message.

CSAW-Quals/crypto/Gotta Decrypt Them All
Morse
Base64
RSA