[原创]用RSA-Tools破解RSA-1024..
发表于:
2021-12-18 02:09
10785
[原创]用RSA-Tools破解RSA-1024..
软件中有N E信息
假设:
原始N = 93AF7A8E3A6EB93D1B4D1FB7EC29299D2BC8F3CE5F84BFE88E47DDBDD5550C3CE3D2B16A2E2FBD0FBD919E8038BB05752EC92DD1498CB283AA087A93184F1DD9DD5D5DF7857322DFCD70890F814B58448071BBABB0FC8A7868B62EB29CC2664C8FE61DFBC5DB0EE8BF6ECF0B65250514576C4384582211896E5400000042FDED
E=0x13
可以试着一个字节一个字节的 修改N,比如我测试到:
N1=:
93AF7A8E3A6EB93D1B4D1FB7EC29299D2BC8F3CE5F84BFE88E47DDBDD5550C3CE3D2B16A2E2FBD0FBD919E8038BB05752EC92DD1498CB283AA087A93184F1DD9DD5D5DF7857322DFCD70890F814B58448071BBABB0FC8A7868B62EB29CC2664C8FE61DFBC5DB0EE8BF6ECF0B65250514576C4384582211896E5478F96742FDED
E=0x13
第 1 步: 用RSATools2分解N得到:
PRIME FACTOR: 3
PRIME FACTOR: 313A7E2F68CF93145E6F0A92A40DB889B942FBEF752C3FF82F6D49E9F1C704144BF0E5CE0F653F053F308A2ABD93AC7C64EDB9F06DD990D68E02D3865D6FB49DF47474A7D72660F5447AD85A806E72C18025E9393AFED8D2CD920F90DEEB776EDAA209FE974904F83FCF9A5921B701B172796BD6C80B5B2DCF717DA877C0FF4F
直接计算出d:
d= 488C1845DDD3956162BE96515D8D7BBD7CCE80BF3369A1A3A43544812E68A7B21F122A3D24296A58930429EE24D99FDFBD287054D7C75C2EB65501D37C38D4471768401FC3CCC4C7C33BC592D836F9F4BCD98D97B541AB519ABC4CD57E687A1CA08301414ABC731CFFB8AD90D35E893B65549EEBAD89FFA1D363E199F3D90C73
或者用RDLP_v1.07.exe
或者用用Big Integer Calculator v1.14.exe计算:
φ(N)=(P-1)*(Q-1)
D = 1/E mod (φ(N))
φ(N)=(3-1)
(313A7E2F68CF93145E6F0A92A40DB889B942FBEF752C3FF82F6D49E9F1C704144BF0E5CE0F653F053F308A2ABD93AC7C64EDB9F06DD990D68E02D3865D6FB49DF47474A7D72660F5447AD85A806E72C18025E9393AFED8D2CD920F90DEEB776EDAA209FE974904F83FCF9A5921B701B172796BD6C80B5B2DCF717DA877C0FF4F -1) =
6274FC5ED19F2628BCDE1525481B71137285F7DEEA587FF05EDA93D3E38E082897E1CB9C1ECA7E0A7E6114557B2758F8C9DB73E0DBB321AD1C05A70CBADF693BE8E8E94FAE4CC1EA88F5B0B500DCE583004BD27275FDB1A59B241F21BDD6EEDDB54413FD2E9209F07F9F34B2436E0362E4F2D7AD9016B65B9EE2FB50EF81FE9C
第 2 步: 用大数计算器“Big Integer Calculator v1.14”的"Ans =Y/X MOD( Z)"功能:Y=1, X=e=0x13, Z=φ(N) 求私钥d;
d= 488C1845DDD3956162BE96515D8D7BBD7CCE80BF3369A1A3A43544812E68A7B21F122A3D24296A58930429EE24D99FDFBD287054D7C75C2EB65501D37C38D4471768401FC3CCC4C7C33BC592D836F9F4BCD98D97B541AB519ABC4CD57E687A1CA08301414ABC731CFFB8AD90D35E893B65549EEBAD89FFA1D363E199F3D90C73
这个d和N和E=0x13,进行加密解密测试验证,通过。
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
最后于 2021-12-18 10:09
被glopen编辑
,原因: