通過公鑰解密密文思路(256bits RSA)
1.分解公鑰,分解出n與e:
1.1使用openssl(紅色標記是e與n)
1 [email protected]:~/download/iscc-ctf/RSA$ openssl rsa -pubin -text -modulus -in public.pem 2 3 Public-Key: (256 bit) 4 5 Modulus: 6 7 00:a4:10:06:de:fd:37:8b:73:95:b4:e2:eb:1e:c9: 8 9 bf:56:a6:1c:d9:c3:b5:a0:a7:35:28:52:1e:eb:2f: 10 11 b8:17:a7 12 13 Exponent: 65537 (0x10001) #e 14 15 Modulus=A41006DEFD378B7395B4E2EB1EC9BF56A61CD9C3B5A0A73528521EEB2FB817A7 #n 16 17 writing RSA key 18 19 -----BEGIN PUBLIC KEY----- 20 21 MDwwDQYJKoZIhvcNAQEBBQADKwAwKAIhAKQQBt79N4tzlbTi6x7Jv1amHNnDtaCn22 23 NShSHusvuBenAgMBAAE= 24 25 -----END PUBLIC KEY----- 26 27 [email protected]:~/download/iscc-ctf/RSA$
1.2使用腳本
1 from Crypto.PublicKey import RSA 2 3 pub = RSA.importKey(open(‘xxx\public.pem‘).read()) 4 5 n = long(pub.n) 6 7 e = long(pub.e) 8 9 print n 10 11 printe
2.使用msieve來對n來分解因式p、q:(紅色標記部分)
1 [email protected]:~/download/iscc-ctf/RSA$ msieve 0XA41006DEFD378B7395B4E2EB1EC9BF56A61CD9C3B5A0A73528521EEB2FB817A7 -v 2 3 4 Msieve v. 1.54 (SVN 1009) 5 6 Wed May 31 17:02:38 2017 7 8 random seeds: 31130210 1225946d 9 10 factoring 74207624142945242263057035287110983967646020057307828709587969646701361764263 (77 digits) 11 12 no P-1/P+1/ECM available, skipping 13 14 commencing quadratic sieve (77-digit input) 15 16 using multiplier of 7 17 18 using generic 32kb sieve core 19 20 sieve interval: 12 blocks of size 32768 21 22 processing polynomials in batches of 17 23 24 using a sieve bound of 921409 (36471 primes) 25 26 using large prime bound of 92140900 (26 bits) 27 28 using trial factoring cutoff of 26 bits 29 30 polynomial ‘A‘ values have 10 factors 31 32 restarting with 19759 full and 186503 partial relations 33 34 35 36750 relations (19759 full + 16991 combined from 186503 partial), need 36567 36 37 sieving complete, commencing postprocessing 38 39 begin with 206262 relations 40 41 reduce to 51619 relations in 2 passes 42 43 attempting to read 51619 relations 44 45 recovered 51619 relations 46 47 recovered 38442 polynomials 48 49 attempting to build 36750 cycles 50 51 found 36750 cycles in 1 passes 52 53 distribution of cycle lengths: 54 55 length 1 : 19759 56 57 length 2 : 16991 58 59 largest cycle: 2 relations 60 61 matrix is 36471 x 36750 (5.3 MB) with weight 1099597 (29.92/col) 62 63 sparse part has weight 1099597 (29.92/col) 64 65 filtering completed in 4 passes 66 67 matrix is 24901 x 24965 (4.0 MB) with weight 837672 (33.55/col) 68 69 sparse part has weight 837672 (33.55/col) 70 71 saving the first 48 matrix rows for later 72 73 matrix includes 64 packed rows 74 75 matrix is 24853 x 24965 (2.6 MB) with weight 610638 (24.46/col) 76 77 sparse part has weight 441218 (17.67/col) 78 79 commencing Lanczos iteration 80 81 memory use: 2.7 MB 82 83 lanczos halted after 394 iterations (dim = 24853) 84 85 recovered 18 nontrivial dependencies 86 87 p39 factor: 258631601377848992211685134376492365269------------------->p 88 89 p39 factor: 286924040788547268861394901519826758027------------------->q 90 91 elapsed time 00:00:10 92 93 [email protected]:~/download/iscc-ctf/RSA$
3.使用腳本來生成私鑰文件(修改紅色部分)
1 import math 2 3 import sys 4 5 from Crypto.PublicKey import RSA 6 7 8 keypair = RSA.generate(1024) 9 10 11 keypair.p = 258631601377848992211685134376492365269 #msieve求解的p 12 13 keypair.q = 286924040788547268861394901519826758027 #msieve求解的q 14 15 keypair.e = 65537 #分解出的e 16 17 18 keypair.n = keypair.p * keypair.q 19 20 Qn = long((keypair.p-1) * (keypair.q-1)) 21 22 23 i = 1 24 25 while (True): 26 27 x = (Qn * i ) + 1 28 29 if (x % keypair.e == 0): 30 31 keypair.d = x / keypair.e 32 33 break 34 35 i += 1 36 37 38 private = open(‘private.pem‘,‘w‘) 39 40 private.write(keypair.exportKey()) 41 42 private.close()
4.使用生成的privete.pem私鑰文件對密文解密
1 openssl rsautl -decrypt -in flag.enc -inkey private.pem -out flag
附錄:
1.linux下安裝msieve
sourceforgot上下載軟件源代碼包:
https://sourceforge.net/projects/msieve/
解壓後
1 $ cd msieve-code/ 2 3 $make 4 5 to build: 6 7 make all 8 9 add ‘WIN=1 if building on windows 10 11 add ‘WIN64=1 if building on 64-bit windows 12 13 add ‘ECM=1‘ if GMP-ECM is available (enables ECM) 14 15 add ‘CUDA=1‘ for Nvidia graphics card support 16 17 add ‘MPI=1‘ for parallel processing using MPI 18 19 add ‘BOINC=1‘ to add BOINC wrapper 20 21 add ‘NO_ZLIB=1‘ if you don‘t have zlib 22 23 $ make all ECM=1 #根據自己的配置進行選擇
應該會報錯gmp.h不存在,安裝高精度數學庫就可以啦。
2.linux安裝gmp(高精度數學庫)
環境:ubuntu 17.04
源代碼:https://gmplib.org/
下載gmp-5.0.1的源代碼,解壓至gmp-5.0.1目錄。
su切換至超級用戶權限。
./configure
--prefix=/usr --enable-cxx
提示:
checking
for suitable m4… configure: error:
No
usable m4 in $PATH or /usr/5bin (see config.log for
reasons).
根據提示查看config.log日誌文件,發現文件太大,何處找原因呢?
沒有辦法,直接google搜索上面的英文提示。
居然馬上就找到了資料解決這個問題,原來是缺少m4軟件包。
查了一下m4是一個通用的宏處理器,由Brian
Kernighan 和Dennis
Ritchie設計。
apt-get
install build-essential
m4
安裝完畢,其中的build-essential是ubuntu下用來解決安裝g++/gcc編譯環境依賴關系的軟件包。
開始編譯,安裝gmp數學庫。
1 ./configure --prefix=/usr --enable-cxx 2 make 3 make check 4 make install
參考資料:
1.256-bitRSA破解-實驗吧
2.[翻譯]初學者向導―GGNFS和MSIEVE分解因數-『外文翻譯』-看雪安全論壇:http://bbs.pediy.com/thread-156206.htm
3.ubuntu10.4下安裝和使用GMP高精度數學庫:http://blog.csdn.net/bingqingsuimeng/article/details/12748341
通過公鑰解密密文思路(256bits RSA)