题目内容
Ben has encrypted a message with the same value of ‘e’ for 3 public moduli - n1 = 86812553978993 n2 = 81744303091421 n3 = 83695120256591 and got the cipher texts - c1 = 8875674977048 c2 = 70744354709710 c3 = 29146719498409. Find the original message. (Wrap it with csictf{})
题目考点
- RSA
- 中国剩余定理
解题思路
- 由题目和RSA原理可知:  1 
 2
 3
 4
 5
 6
 7c1=m^3 mod n1 
 c2=m^3 mod n2
 c3=m^3 mod n3
 👇
 m^3 = c1 mod n1
 m^3 = c2 mod n2
 m^3 = c3 mod n3
- 根据中国剩余定理,可以求出m^3,然后开立方根即可得到m
- python代码:  1 
 2
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18# 导入所需的模块和函数 
 from sympy.ntheory.modular import crt
 from gmpy2 import iroot
 # RSA加密的指数e
 e = 3
 # 三个不同的模数N和对应的密文C
 N = [86812553978993, 81744303091421, 83695120256591]
 C = [8875674977048, 70744354709710, 29146719498409]
 # 使用中国剩余定理解决模数不同的同余方程组
 resultant, mod = crt(N,C)
 # 计算resultant的e次根,即对resultant进行e次方根运算
 value, is_perfect = iroot(resultant,e)
 # 将计算得到的明文值转换成字节并打印出来
 print(bytes.fromhex(str(value)).decode())
FLAG
| 1 | csictf{h45t4d} | 
