Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
ashutosh1206
GitHub Repository: ashutosh1206/crypton
Path: blob/master/RSA-encryption/Attack-Coppersmith/Challenges/Really-Suspicious-Acronym/task.sage
1403 views
1
def bytes_to_long(data):
2
return int(data.encode("hex"),16)
3
4
def rsa(msg,e,n):
5
return pow(bytes_to_long(msg),e,n)
6
7
flag = open('flag.txt','r').read()
8
tmp = randint(2**1023, 2**1024)
9
e = 65537
10
p = next_prime(0xDEAD*tmp+randint(2, 2**500))
11
q = next_prime(0xBEEF*tmp+randint(2, 2**500))
12
N = p*q
13
print('msg1 = '+str(rsa("You can't factor the modulus",e,N)))
14
print('msg2 = '+str(rsa("If you don't know the modulus!",e,N)))
15
print('flag = '+str(rsa(flag,e,N)))
16
17