427341958883142789220800541626034573952425948295446202775198692920613709157662831071515700549093766182579873408465779 n = p * q e = 65537 phi = (p - 1) * (q - 1) d = gmpy2.invert(e,phi) m = pow(c, d, n) flag = long_to_bytes(m).decode('latin1') if "NSS" in flag: print(flag) #NSSCTF{...
对ctf进行解密: 所以得到flag{good-luck}
NSSCTF Round#16 Basic crypto misc-wp CRYPTO pr# 题目 CRT fromCrypto.Util.numberimport*importrandom flag=plaintext ='NSSCTF{***}'charset ='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'padding_length =100-len(plaintext)for_inrange(padding_length): plaintext += random.choice(chars...
对ctf进行解密: 所以得到flag{good-luck}
###1.题目 ###2.看完题目发现给了p,q,e,c,我还以为和这道题一样BUUCTF-crypto:rsarsa,直接用这道题的脚本跑了,一交答案发现答案错误。 ###3.修改脚本,将m转为bytes后提交,正确