CRYPTO-DSA

参考某位大佬的博客和nss的一些题目,这两天的DSA题目

DSA数字签名 | DexterJie'Blog

[NCTF 2021]dsa

task.py

  1. from Crypto.Util.number import *
  2. from secret import flag
  3. from hashlib import sha256
  4. import os
  5. def keygen():
  6. while True:
  7. p = getPrime(522)
  8. q = p//2
  9. if isPrime(q):
  10. break
  11. g = 3
  12. h = long_to_bytes(getPrime(256))
  13. x = int.from_bytes(h*2, "big")
  14. y = pow(g, x, p)
  15. return g, p, q, y, x
  16. def sign(h, x):
  17. k = sha256(h.encode().hex().encode()).digest()+sha256(bytes.fromhex(h)+x.to_bytes(128, "big")).digest()
  18. k = int.from_bytes(k, "big")
  19. r = pow(g,k,p)
  20. s = (r*x+int(h,16))*inverse(k,q)%q
  21. return r, s
  22. g, p, q, y, x = keygen()
  23. flag = int(flag[5:-1],16)^int(sha256(x.to_bytes(128, "big")).hexdigest(),16)
  24. r, s = sign(hex(flag)[2:], x)
  25. print(q)
  26. print(y)
  27. print(flag)
  28. print(r)
  29. print(s)
  30. '''
  31. q=4065074330205980877463463424406813850154275302695361748314870346411329051948044450952905063182483477758495116696164996888846308775044737816809015524088898203
  32. y=7743982251072012463264403932580827621959049035277930304818871889119878506480333248188293037455476433705911511645160292331990658781048396135284434991466243636
  33. flag=19480592192543881131267167328019941277106895469291691207381812905033306766991
  34. r=962433004607153392099715322793248884218264181538005666659905851247468102959956625098831516046715446615198437005036117685792905736788216987378584513020215442
  35. s=1861254747644911591100925843087118347161726578606012243057783788330822542299254180561801871884967022902307837045926190782819951409650425825871898890839825777
  36. '''
\[p=2*q+1
\]
\[x=(2^{256}+1)*d^{'}
\]

据说k是H和H+X的哈希拼接,所以可以知道k的高256位(有没有人能解释的)

\[H=m异或 h(m)\\
\]
\[k=h(H)+h(H+x)=>k=H(2^{256})+h^{'}\\
\]
\[f(x)=(2^{256}H+h^{'})*s-(2^{256+1})*d^{'}*r-H\ (mod\ q)
\]

就是flag的低位和d‘的二元copper

  1. def small_roots(f, bounds, m=1, d=None):
  2. if not d:
  3. d = f.degree()
  4. R = f.base_ring()
  5. N = R.cardinality()
  6. f /= f.coefficients().pop(0)
  7. f = f.change_ring(ZZ)
  8. G = Sequence([], f.parent())
  9. for i in range(m + 1):
  10. base = N ^ (m - i) * f ^ i
  11. for shifts in itertools.product(range(d), repeat=f.nvariables()):
  12. g = base * prod(map(power, f.variables(), shifts))
  13. G.append(g)
  14. B, monomials = G.coefficient_matrix()
  15. monomials = vector(monomials)
  16. factors = [monomial(*bounds) for monomial in monomials]
  17. for i, factor in enumerate(factors):
  18. B.rescale_col(i, factor)
  19. B = B.dense_matrix().LLL()
  20. B = B.change_ring(QQ)
  21. for i, factor in enumerate(factors):
  22. B.rescale_col(i, 1 / factor)
  23. H = Sequence([], f.parent().change_ring(QQ))
  24. for h in filter(None, B * monomials):
  25. H.append(h)
  26. I = H.ideal()
  27. if I.dimension() == -1:
  28. H.pop()
  29. elif I.dimension() == 0:
  30. roots = []
  31. for root in I.variety(ring=ZZ):
  32. root = tuple(R(root[var]) for var in f.variables())
  33. roots.append(root)
  34. return roots
  35. return []
  36. from Crypto.Util.number import *
  37. from hashlib import sha256
  38. import itertools
  39. q = 4065074330205980877463463424406813850154275302695361748314870346411329051948044450952905063182483477758495116696164996888846308775044737816809015524088898203
  40. y = 7743982251072012463264403932580827621959049035277930304818871889119878506480333248188293037455476433705911511645160292331990658781048396135284434991466243636
  41. h = 19480592192543881131267167328019941277106895469291691207381812905033306766991
  42. r = 962433004607153392099715322793248884218264181538005666659905851247468102959956625098831516046715446615198437005036117685792905736788216987378584513020215442
  43. s = 1861254747644911591100925843087118347161726578606012243057783788330822542299254180561801871884967022902307837045926190782819951409650425825871898890839825777
  44. g = 3
  45. p = q*2+1
  46. #sagemath
  47. kmax=int(sha256(hex(h)[2:].encode().hex().encode()).digest().hex(),16)
  48. PR.<h_0, d_0> = PolynomialRing(Zmod(q))
  49. f = (2^256 * kmax + h_0) * s - (2^256 + 1) * d_0 * r - h
  50. roots = small_roots(f, [2^256, 2^256], d=4, m=4)
  51. #roots
  52. kmin = int(roots[0][0])
  53. k = kmax*2^256+kmin
  54. x_ = int(roots[0][1])
  55. x_0 = (2^256+1)*x_
  56. if pow(g,x_0,p) == y:
  57. flag = h^^int(sha256(int(x_0).to_bytes(128, "big")).hexdigest(),16)
  58. print(hex(flag)[2:])

[HZNUCTF 2023 preliminary]easyDSA

task.py

  1. from hash import *
  2. from sage import *
  3. from secrets import flag
  4. from Crypto.Util.number import *
  5. from gmpy2 import invert
  6. def dsa(hmac, _pk, _sk, k):
  7. _p, _q, _g, _y = _pk
  8. x = _sk
  9. r = pow(_g, k, _p) % _q
  10. s = ((hmac + x * r) * invert(k, _q)) % _q
  11. return int(r), int(s)
  12. m = int(flag.hex(), 16)
  13. p = getPrime(2048)
  14. q = getPrime(256)
  15. g = getRandomNBitInteger(2048)
  16. y = pow(g, m, p)
  17. pk = (p, q, g, y)
  18. sk = m
  19. hm1 = int(SM3(default_hm1), 16)
  20. hm2 = int(SM3(default_hm2), 16)
  21. nonce = getPrime(64)
  22. xxxx = getPrime(20)
  23. print(f"(r1, s1) = {dsa(hm1, pk, sk, nonce)}")
  24. print(f"(r2, s2) = {dsa(hm1, pk, sk, nonce ** 2 + xxxx)}")
  25. print(f"p = {p}\nq = {q}\ng = {g}\ny = {y}")
  26. # (r1, s1) = (43665657147136977892760835332544097729763754398125679419859037123212964274095, 11372107439153704547599978617809027960018057676066118055075660375442954789009)
  27. # (r2, s2) = (29184887007213204285288676779168140587575609668559831035949650649308618592275, 5011738292572181542092375902756977363590922060964162373234404450451520414798)
  28. # p = 31961141251107494919420190534228520246958409864267239760354623819192809291490262139213317490432416411403367763443527530375117617196123131270496004125231254335150221348901335274505489844222882171272650010562960614279185073793274638651086760235178963210965828168433516820007716846876686795459738332444629111764967204355463398049697867061034126529189537688874999118692225915790053920062142349951686250122300061810240375783724631961234942175580462986265098353263395579346466921241016500821787793395554444982717141449909744838267161237273856377774256250949274635575801148994817767751541256849860886577256992383324866941911
  29. # q = 69375998045163628324086568160767337544901252262545889505892695427466730978301
  30. # g = 23095306638137759877487469277470910487928442296144598697677211337473146684728707820084075779044942034329888686699655576145455963231144004571165817481066424910959951439014314776050521403558035997997820617824839889597136772108383034876458141163933312284054415480674388788905935457149956424898637134087874179010376667509489926236214865373552518669840236207944772752416668193786003948717604980584661094548997197117467440864460714843246250800575997370964173558788145639802963655916833143883799542309432910222224223561677245110195809587171802538978009246887077924173034608600837785506594525481696000424121705524449481831586
  31. # y = 30195133393879069638917191223585579396119430591488890396938821804398771785068454607425044458865556053274470709839502680269466948174813926392729790863065933078609827279352860810689776644132512095691760326095517755483748554008211568781998662554432781285208646921699265866446498342049913829592480268053599307065979016922204438675164034767731708343084371572648019835171087671868322447023378942812010740490724160077164191297435291229504616686997442254543493394641023587237077429236872101951650325361004443988267286616139798736713430746804524113024341440435623834197278500144543476528466395780355874841379098027115073850819

给了3个文件,主要还是看task.py

关系式

\[s1\equiv (H_1+r_1x)k_1^{-1}\\
\]
\[s2\equiv (H_2+r2x)k_2^{-1}
\]

已知

\[k_2=k_1^{2}+x_0\\
\]
\[H_1=H_2\\
\]

构造二元copper

\[f(x)=(s_2(k_1^2+x_0)-H_2)r_2^{-1}-(s_1k_1-H_1)*r^{-1}
\]

SM3可以直接用在线平台算。

exp

  1. (r1, s1) = (43665657147136977892760835332544097729763754398125679419859037123212964274095, 11372107439153704547599978617809027960018057676066118055075660375442954789009)
  2. (r2, s2) = (29184887007213204285288676779168140587575609668559831035949650649308618592275, 5011738292572181542092375902756977363590922060964162373234404450451520414798)
  3. p = 31961141251107494919420190534228520246958409864267239760354623819192809291490262139213317490432416411403367763443527530375117617196123131270496004125231254335150221348901335274505489844222882171272650010562960614279185073793274638651086760235178963210965828168433516820007716846876686795459738332444629111764967204355463398049697867061034126529189537688874999118692225915790053920062142349951686250122300061810240375783724631961234942175580462986265098353263395579346466921241016500821787793395554444982717141449909744838267161237273856377774256250949274635575801148994817767751541256849860886577256992383324866941911
  4. q = 69375998045163628324086568160767337544901252262545889505892695427466730978301
  5. g = 23095306638137759877487469277470910487928442296144598697677211337473146684728707820084075779044942034329888686699655576145455963231144004571165817481066424910959951439014314776050521403558035997997820617824839889597136772108383034876458141163933312284054415480674388788905935457149956424898637134087874179010376667509489926236214865373552518669840236207944772752416668193786003948717604980584661094548997197117467440864460714843246250800575997370964173558788145639802963655916833143883799542309432910222224223561677245110195809587171802538978009246887077924173034608600837785506594525481696000424121705524449481831586
  6. y = 30195133393879069638917191223585579396119430591488890396938821804398771785068454607425044458865556053274470709839502680269466948174813926392729790863065933078609827279352860810689776644132512095691760326095517755483748554008211568781998662554432781285208646921699265866446498342049913829592480268053599307065979016922204438675164034767731708343084371572648019835171087671868322447023378942812010740490724160077164191297435291229504616686997442254543493394641023587237077429236872101951650325361004443988267286616139798736713430746804524113024341440435623834197278500144543476528466395780355874841379098027115073850819
  7. #!/usr/bin/env python
  8. # -*- coding: utf-8 -*-
  9. from Crypto.Util.number import*
  10. import itertools
  11. IV = 0x7380166f4914b2b9172442d7da8a0600a96f30bc163138aae38dee4db0fb0e4e
  12. default_hm1 = b'HZNUCTFRound#1'
  13. default_hm2 = b'HZNUCTFRound#1'
  14. def small_roots(f, bounds, m=1, d=None):
  15. if not d:
  16. d = f.degree()
  17. R = f.base_ring()
  18. N = R.cardinality()
  19. f /= f.coefficients().pop(0)
  20. f = f.change_ring(ZZ)
  21. G = Sequence([], f.parent())
  22. for i in range(m + 1):
  23. base = N ^ (m - i) * f ^ i
  24. for shifts in itertools.product(range(d), repeat=f.nvariables()):
  25. g = base * prod(map(power, f.variables(), shifts))
  26. G.append(g)
  27. B, monomials = G.coefficient_matrix()
  28. monomials = vector(monomials)
  29. factors = [monomial(*bounds) for monomial in monomials]
  30. for i, factor in enumerate(factors):
  31. B.rescale_col(i, factor)
  32. B = B.dense_matrix().LLL()
  33. B = B.change_ring(QQ)
  34. for i, factor in enumerate(factors):
  35. B.rescale_col(i, 1 / factor)
  36. H = Sequence([], f.parent().change_ring(QQ))
  37. for h in filter(None, B * monomials):
  38. H.append(h)
  39. I = H.ideal()
  40. if I.dimension() == -1:
  41. H.pop()
  42. elif I.dimension() == 0:
  43. roots = []
  44. for root in I.variety(ring=ZZ):
  45. root = tuple(R(root[var]) for var in f.variables())
  46. roots.append(root)
  47. return roots
  48. return []
  49. H1=19905280947443115569469777697852124038269468456842113763109865796452965095134
  50. H2=H1
  51. PR.<k1, x0> = PolynomialRing(Zmod(q))
  52. f = (s2*(k1**2+x0)-H2)*inverse(r2,q)-(s1*k1-H1)*inverse(r1,q)
  53. roots = small_roots(f, (2^64, 2^20), m=1, d=2)
  54. print(roots)
  55. k1,x0=roots[0]
  56. #[(15744441039285451081, 631339)]
  57. k2=k1**2+x0
  58. x = (s1*k1-H1)*inverse(r1,q)%q
  59. print(long_to_bytes(int(x))

[suctf 2019]DSA

在终端里面交互

得到DSA的参数。发现有几组的r相同,于是可以构造方程组求私钥x,把私钥求出来后,将终端给你的签名消息的hash值进行签名,将会得道签名对(r,s),将签名对与终端交互,得到flag

\[k*s1 = H(m1) + x*r\ mod\ q\\
\]
\[k*s2 = H(m2) + x*r\ mod\ q
\]

exp

  1. import gmpy2
  2. r =645224390501315862797070591755816309562736584452
  3. h_flag = 334436397493699539473999398012751306876
  4. p=89884656743115797097819440555693178620485594490643767510103963471608924587913709653256746790562883588011852460735275267990503465149454718627614453763060059226676569508565322541877120147735776580975577455382906808621021450526077323235477260260610074352985347306411700160496668007768862436197980651598048994217
  5. q=733351900012832584621865112243949059368957476097
  6. g=88493223492302907020961042092534061870813103426197667060896649536511822654652196955971640083365037379740401608129629097454817124374624947279386614844301750312126039698542869587208495662827992222619770171959869103091417006779702356792342825516705379752141737800147265145023116961039150128411592713662148401589
  7. y=52169245435909876495152421578533821340872117742587260268454403838425273037980176268874598797032049946042829131912183461753205871292554332715861109864480014054314530798154726283889479994795350311013632333809929713875409593432791157873854766290466911161859680981529617530940854956585734363116431329106262579369
  8. h1 = 193111848988193367504523557345609960681
  9. h2 = 6552181908429515529989854270507740427
  10. s1 = 624451987004675139546639048435927733971094708317
  11. s2 = 206502049020604103620526858798020639447000006522
  12. ds = s2-s1
  13. dh = h2-h1
  14. k = gmpy2.mul(dh,gmpy2.invert(ds,q))
  15. k = gmpy2.f_mod(k,q)
  16. tmp = gmpy2.mul(k,s1)-h1
  17. x = tmp*gmpy2.invert(r,q)
  18. x = gmpy2.f_mod(x,q)
  19. print(int(x))
  20. s_flag = (gmpy2.invert(k,q)*(h_flag+x*r)) % q
  21. print((r,s_flag))
  22. #(645224390501315862797070591755816309562736584452L, 497133993307905006634015243473843926347603500982L)

[D^3CTF 2022]leak_dsa

task.py

  1. from hashlib import sha256
  2. from secret import flag
  3. from Crypto.Util.number import *
  4. from random import *
  5. import os
  6. from binascii import *
  7. def gen_key(qbit , pbit):
  8. q = getPrime(qbit)
  9. while 1:
  10. p = getrandbits(pbit-qbit)*q + 1
  11. if isPrime(p):
  12. break
  13. while 1:
  14. h = randint(1 , p)
  15. g = pow(h , (p-1)//q , p)
  16. if g != 1:
  17. break
  18. d = randint(1 , q-1)
  19. y = pow(g,d,p)
  20. pubkey = (p ,q , g ,y)
  21. prikey = (p ,q ,g ,y , d)
  22. return pubkey , prikey
  23. def sign(prikey , m):
  24. p,q,g,y,d = prikey
  25. k = randint(1 , q-1)
  26. r = pow(g , k , p) % q
  27. s = inverse(k , q) * (int(sha256(m).hexdigest(),16)+ d * r) % q
  28. return (r , s) , k
  29. def verify(pubkey , m , r ,s ):
  30. p,q,g,y = pubkey
  31. w = inverse(s , q)
  32. u1 = int(sha256(m).hexdigest(),16) * w % q
  33. u2 = r * w % q
  34. if r == pow(g , u1 , p)*pow(y , u2,p)% q:
  35. return 1
  36. return 0
  37. N = 70
  38. pubkey , prikey = gen_key(256 , 2048)
  39. f = open('./cipher.txt' , 'w')
  40. f.write(str(pubkey) + '\n')
  41. for i in range(N):
  42. m = os.urandom(10)
  43. signature , gift = sign(prikey , m)
  44. mask = getrandbits(256)
  45. f.write(hexlify(m).decode() + ',' + str(signature) +',' +str(mask & gift) +','+ str(mask) + '\n')
  46. assert flag[:6] == b'd3ctf{' and flag[-1:] == b'}'
  47. assert flag[6:-1] == sha256(str(prikey[-1]).encode()).hexdigest()

给个链接吧:D^3CTF 2022 - hash_hash - 博客园是一种基于DSA的HNP问题

基于DSA的HNP问题

DSA数字签名 | DexterJie'Blog

\[A=s^{-1}\ mod\ q\\
\]
\[B=s^{-1}H\ mod\ q
\]

所以

\[k\equiv Ax+B\ mod\ q
\]

\[(t_1 \quad t_2 \quad \ldots \quad t_n \quad x \quad 1)
\begin{pmatrix}
q & 0 & \ldots & 0 & 0 & 0 \\
0 & q & \ldots & 0 & 0 & 0 \\
\vdots & \vdots & \ddots & \vdots & \vdots & \vdots \\
0 & 0 & \ldots & q & 0 & 0 \\
A_1 & A_2 & \ldots & A_n & 1 & 0 \\
B_1 & B_2 & \ldots & B_n & 0 & K
\end{pmatrix}
= (k_1 \quad k_2 \quad \ldots \quad k_n \quad x \quad K)
\]

当然这是在x不太大的情况下

task.py

  1. from Crypto.Util.number import *
  2. from Crypto.PublicKey import DSA
  3. import random
  4. import hashlib
  5. def gen_key():
  6. pri = getPrime(128)
  7. pub = pow(g,pri,p)
  8. return pri,pub
  9. def sign(m,pri):
  10. k = getPrime(128)
  11. H = int(hashlib.sha256(m).hexdigest(),16)
  12. r = pow(g,k,p) % q
  13. s = pow(k,-1,q) * (H + pri * r) % q
  14. return r,s
  15. key = DSA.generate(1024)
  16. p, q, g = key.p, key.q, key.g
  17. pri, pub = gen_key()
  18. print(f"p = {p}")
  19. print(f"q = {q}")
  20. print(f"g = {g}")
  21. print(f"pub = {pub}")
  22. flag = "flag{" + hashlib.sha256(str(pri).encode()).hexdigest() + "}"
  23. for i in range(5):
  24. r,s = sign(str(i).encode(),pri)
  25. print(f"r = {r}")
  26. print(f"s = {s}")
  27. """
  28. p =
  29. q =
  30. g =
  31. pub =
  32. r =
  33. s =
  34. r =
  35. s =
  36. r =
  37. s =
  38. r =
  39. s =
  40. r =
  41. s =
  42. """

这有五组签名对

  1. import hashlib
  2. from Crypto.Util.number import *
  3. p =
  4. q =
  5. g =
  6. pub =
  7. R = [,,,,]
  8. S = [,,,,]
  9. H = [int(hashlib.sha256(str(i).encode()).hexdigest(),16) for i in range(5)]
  10. A = [inverse(S[i],q) * R[i] % q for i in range(5)]
  11. B = [inverse(S[i],q) * H[i] % q for i in range(5)]
  12. n = len(A)
  13. K = 2^128
  14. Ge = Matrix(ZZ,n+2,n+2)
  15. for i in range(n):
  16. Ge[i,i] = q
  17. Ge[-2,i] = A[i]
  18. Ge[-1,i] = B[i]
  19. Ge[-2,-2] = 1
  20. Ge[-1,-1] = K
  21. for line in Ge.LLL():
  22. if line[-1] == K:
  23. x = line[-2]
  24. print(f"x = {x}")
  25. flag = "flag{" + hashlib.sha256(str(x).encode()).hexdigest() + "}"
  26. print(flag)

消元x

当x数量级比较大的时候

\[s_i\equiv k_i^{-1}(H_i+xr_i)\ mod\ q\\
\]
\[k_is_i\equiv H_i+xr_i\ mod\ q
\]

取另外一组签名消去x得到

\[k_is_ir_j\equiv H_rr_j+xr_ir_j\ mod\ q\\
\]
\[k_js_jr_i\equiv H_jr_i+xr_jr_i\ mod\ q
\]

相减得

\[s_ir_jk_i-s_jr_ik_j\equiv H_ir_j-H_jr_i\ mod\ q
\]

取j=0

\[(s_ir_0)k_i-(s_0r_i)k_0\equiv H_ir_0-H_0r_i\ mod\ q
\]

乘以\((r_0s_i)^{-1}\)得到

\[k_i-(r_0s_i)^{-1}(s_0r_i)k_0\equiv (r_0s_i)^{-1}(H_ir_0-H_0r_i)\ mod\ q
\]
\[k_i\equiv A_ik_0+B_i\ mod\ q
\]

有点像LCG的HNP

\[(t_1 \quad t_2 \quad \ldots \quad t_n \quad k_0\quad 1)
\begin{pmatrix}
q & 0 & \ldots & 0 & 0 & 0 \\
0 & q & \ldots & 0 & 0 & 0 \\
\vdots & \vdots & \ddots & \vdots & \vdots & \vdots \\
0 & 0 & \ldots & q & 0 & 0 \\
A_1 & A_2 & \ldots & A_n & 1 & 0 \\
B_1 & B_2 & \ldots & B_n & 0 & K
\end{pmatrix}
= (k_1 \quad k_2 \quad \ldots \quad k_n \quad k_0 \quad K)
\]

春秋杯——signature

task.py

  1. import os
  2. import hashlib
  3. from Crypto.Util.number import *
  4. from Crypto.PublicKey import DSA
  5. import random
  6. def gen_proof_key():
  7. password = 'happy_the_year_of_loong'
  8. getin = ''
  9. for i in password:
  10. if random.randint(0, 1):
  11. getin += i.lower()
  12. else:
  13. getin += i.upper()
  14. ans = hashlib.sha256(getin.encode()).hexdigest()
  15. return getin,ans
  16. def gen_key():
  17. pri = random.randint(2,q - 2)
  18. pub = pow(g,pri,p)
  19. return pri,pub
  20. def sign(m,pri):
  21. k = int(hashlib.md5(os.urandom(20)).hexdigest(),16)
  22. H = int(hashlib.sha256(m).hexdigest(),16)
  23. r = pow(g,k,p) % q
  24. s = pow(k,-1,q) * (H + pri * r) % q
  25. return r,s
  26. def verify(pub,m,signature):
  27. r,s = signature
  28. if r <= 0 or r >= q or s <= 0 or s >= q:
  29. return False
  30. w = pow(s,-1,q)
  31. H = int(hashlib.sha256(m).hexdigest(),16)
  32. u1 = H * w % q
  33. u2 = r * w % q
  34. v = (pow(g,u1,p) * pow(pub,u2,p) % p) % q
  35. return v == r
  36. def login():
  37. print('Hello sir,Plz login first')
  38. menu = '''
  39. 1.sign
  40. 2.verify
  41. 3.get my key
  42. '''
  43. times = 8
  44. while True:
  45. print(menu)
  46. if times < 0:
  47. print('Timeout!')
  48. return False
  49. choice = int(input('>'))
  50. if choice == 1:
  51. name = input('Username:').encode()
  52. if b'admin' in name:
  53. print('Get out!')
  54. return False
  55. r,s = sign(name,pri)
  56. print(f'This is your signature -- > {r},{s}')
  57. times -= 1
  58. elif choice == 2:
  59. print('Sure,Plz input your signature')
  60. print(pri)
  61. r = int(input('r:'))
  62. s = int(input('s:'))
  63. if verify(pub,b'admin',(r,s)) == True:
  64. print('login success!')
  65. return True
  66. else:
  67. print('you are not admin')
  68. return False
  69. elif choice == 3:
  70. print(f'Oh,your key is {(p,q,g)}')
  71. getin,ans = gen_proof_key()
  72. print(f'Your gift --> {ans[:6]}')
  73. your_token = input('Plz input your token\n>')
  74. if your_token != getin:
  75. print('Get out!')
  76. exit(0)
  77. key = DSA.generate(1024)
  78. p, q, g = key.p, key.q, key.g
  79. pri, pub = gen_key()
  80. if login() == False:
  81. exit(0)
  82. print(open('/flag','r').read())

开始就是一段字符串的大小写混淆,它给了我们hash值,于是我们暴破,直到hash值一样。

接着就是得到DSA的参数p,q,g,我们有8次获得签名对的机会。

然后利用这8组造格

  1. import hashlib
  2. import itertools
  3. from tqdm import *
  4. from pwn import *
  5. from Crypto.Util.number import *
  6. def pass_proof(head):
  7. password = 'happytheyearofloong'
  8. table = itertools.product([0,1],repeat=19)
  9. for i in tqdm(table):
  10. getin = ""
  11. for j in range(len(i)):
  12. if i[j] == 0:
  13. getin += password[j].lower()
  14. else:
  15. getin += password[j].upper()
  16. msg = getin[:5] + "_" + getin[5:8] + "_" + getin[8:12] + "_" + getin[12:14] + "_" + getin[14:]
  17. h = hashlib.sha256(msg.encode()).hexdigest()
  18. if h[:6] == head:
  19. print(msg)
  20. return msg
  21. sh = remote("8.147.132.12",41792)
  22. head = sh.recvline().strip().decode().split(" ")[-1]
  23. msg = pass_proof(head)
  24. sh.recvuntil(b"Plz input your token")
  25. sh.sendlineafter(b">",msg.encode())
  26. sh.recvuntil(b"3.get my key\n")
  27. sh.sendlineafter(b">",b"3")
  28. (p,q,g) = eval(sh.recvline().strip().decode().split("Oh,your key is ")[-1])
  29. H = []
  30. R = []
  31. S = []
  32. for i in range(8):
  33. name = b"a"*(i+1)
  34. sh.recvuntil(b"3.get my key\n")
  35. sh.sendlineafter(b">",b"1")
  36. sh.sendlineafter(b"Username:",name)
  37. data = sh.recvline().strip().decode()
  38. print(data)
  39. r = int(data.split(" ")[-1].split(',')[0])
  40. s = int(data.split(" ")[-1].split(',')[1])
  41. h = int(hashlib.sha256(name).hexdigest(),16)
  42. R.append(r)
  43. S.append(s)
  44. H.append(h)
  45. def get_k():
  46. n = len(R)
  47. r0 = R[0]
  48. h0 = H[0]
  49. s0 = S[0]
  50. A = []
  51. B = []
  52. for i in range(n):
  53. a = inverse((r0 * S[i]),q) * (R[i] * s0) % q
  54. b = inverse((r0 * S[i]),q) * (H[i]*r0 - h0 * R[i])
  55. A.append(a)
  56. B.append(b)
  57. Ge = Matrix(ZZ,n+2,n+2)
  58. for i in range(n):
  59. Ge[i,i] = q
  60. Ge[-2,i] = A[i]
  61. Ge[-1,i] = B[i]
  62. K = 2**128
  63. Ge[-2,-2] = 1
  64. Ge[-1,-1] = K
  65. for line in Ge.LLL():
  66. if abs(line[-1]) == K:
  67. return line[-2]
  68. k0 = get_k()
  69. print(f"k0 = {k0}")
  70. sh.recvuntil(b"3.get my key\n")
  71. sh.sendlineafter(b">",b"2")
  72. sh.recvline()
  73. x = int(sh.recvline().strip().decode())
  74. r = pow(g,k0,p) % q
  75. hh = int(hashlib.sha256(b"admin").hexdigest(),16)
  76. s = pow(k0,-1,q) * (hh + x*r) % q
  77. sh.sendlineafter(b"r:",str(r).encode())
  78. sh.sendlineafter(b"s:",str(s).encode())
  79. print(sh.recvline().strip().decode())
  80. print(sh.recvline().strip().decode())

给出k的高位

k写成\(k=2^hk_h+k_{un}2^l+k_l\)

一系列化简得到,\(A_i\equiv (s_ir_02^l)^{-1}(s_0r_i2^l)k_{0un}\ mod\ q\)

\(B_i\equiv (s_ir_02^l)^{-1}(H_ir_0-H_0r_i+(s_0r_i)(k_{0h}2^h+k_{0l})-(s_ir_0)(k_{ih}2^h+k_{il}))\ mod\ q\)

\[k_{iun}\equiv A_ik_{0un}+B_i\ mod\ q
\]
\[(t_1 \quad t_2 \quad \ldots \quad t_n \quad k_{0un}\quad 1)
\begin{pmatrix}
q & 0 & \ldots & 0 & 0 & 0 \\
0 & q & \ldots & 0 & 0 & 0 \\
\vdots & \vdots & \ddots & \vdots & \vdots & \vdots \\
0 & 0 & \ldots & q & 0 & 0 \\
A_1 & A_2 & \ldots & A_n & 1 & 0 \\
B_1 & B_2 & \ldots & B_n & 0 & K
\end{pmatrix}
= (k_{1un} \quad k_{2un} \quad \ldots \quad k_{nun} \quad k_{0un} \quad K)
\]

2024RCTF——SignSystem

task.py

  1. from random import getrandbits, randint
  2. from Crypto.Util.number import getPrime, isPrime, inverse
  3. from hashlib import sha1
  4. import signal
  5. def gen(l, n):
  6. q = getPrime(l)
  7. while True:
  8. t = getrandbits(n - l)
  9. p = t * q + 1
  10. if isPrime(p):
  11. break
  12. h = randint(1, p - 1)
  13. g = pow(h, t, p)
  14. x = randint(1, q)
  15. y = pow(g, x, p)
  16. return (p, q, g, y), x
  17. def gen_ephemeral_key(k, lsb, msb):
  18. return msb << (k + lsb.bit_length()) | getrandbits(k) << lsb.bit_length() | lsb
  19. def sign(pubkey, x, msg, lsb, msb):
  20. p, q, g, y = pubkey
  21. k = gen_ephemeral_key(150, lsb, msb)
  22. r = pow(g, k, p) % q
  23. Hm = int(sha1(msg).hexdigest(), 16)
  24. s = (Hm + x * r) * inverse(k, q) % q
  25. return (r, s)
  26. def verify(pubkey, sig, msg):
  27. p, q, g, y = pubkey
  28. r, s = sig
  29. if not 0 < r < q or not 0 < s < q:
  30. return False
  31. w = inverse(s, q)
  32. Hm = int(sha1(msg).hexdigest(), 16)
  33. u1 = Hm * w % q
  34. u2 = r * w % q
  35. v = pow(g, u1, p) * pow(y, u2, p) % p % q
  36. return v == r
  37. signal.alarm(900)
  38. with open("flag.txt", "r") as f:
  39. flag = f.read()
  40. l, n = 160, 1024
  41. pub, x = gen(l, n)
  42. print("your pubKey: {}".format(pub))
  43. msb = getrandbits(8)
  44. lsb = getrandbits(2)
  45. menu = """
  46. [1] sign message
  47. [2] verify signature
  48. """
  49. for i in range(20):
  50. print(menu)
  51. op = int(input(">").strip())
  52. if op == 1:
  53. msg = input("Which message to sign?: ").strip().encode()
  54. if msg == b"get flag":
  55. print("I'm afraid I can't do that.")
  56. break
  57. else:
  58. sig = sign(pub, x, msg, lsb, msb)
  59. print(f"Signature: {sig}")
  60. elif op == 2:
  61. msg = input("Which message to verify?: ").strip().encode()
  62. r = int(input("r:").strip())
  63. s = int(input("s:").strip())
  64. v = verify(pub, (r, s), msg)
  65. if v and msg == b"get flag":
  66. print(flag)
  67. else:
  68. print(v)
  69. else:
  70. print("Invalid option")

可以知道,每个k的高8位和低2位是一样的。

exp

  1. from Crypto.Util.number import *
  2. import string
  3. from pwn import *
  4. from sage.all import *
  5. from tqdm import *
  6. import gmpy2
  7. import time
  8. table = string.ascii_lowercase
  9. host = '' #ip地址
  10. port = #端口
  11. sh = remote(host,port) #建立连接
  12. sh.recvuntil(b"your pubKey:")
  13. pub = eval(sh.recvline().decode().strip())
  14. p,q,g,y = pub
  15. R=[]
  16. H=[]
  17. S=[]
  18. for i in range(19):
  19. sh.recvuntil(b">")
  20. sh.sendline(b"1")
  21. sh.recvuntil(b"Which message to sign?:")
  22. m="".join(choices(table,k=16))
  23. msg=m.encode()
  24. sh.sendline(msg)
  25. sh.recvuntil(b"Signature:")
  26. data1=eval(sh.recvline().decode().strip())
  27. r,s=data1
  28. S.append(s)
  29. R.append(r)
  30. H.append(h)
  31. r0=R[0]
  32. s0=S[0]
  33. h0=H[0]
  34. def sign(pubkey, x, msg, lsb, msb):
  35. p, q, g, y = pubkey
  36. k = gen_ephemeral_key(150, lsb, msb)
  37. r = pow(g, k, p) % q
  38. Hm = int(sha1(msg).hexdigest(), 16)
  39. s = (Hm + x * r) * inverse(k, q) % q
  40. return (r, s)
  41. for high in trange(256):
  42. for low in range(4):
  43. lowbit=low.bit_length()
  44. A=[]
  45. B=[]
  46. tt=2**lowbit
  47. for i in range(1,len(R)):
  48. a=s0*R[i]*tt*gmpy2.invert(tt*t0*S[i],q)%q
  49. b=gmpy2.invert(S[i]*r0*2**lowbit,q)*(H[i]*r0-h0*R[i]+(s0*R[i])*(high*2**512+low)-r0*S[i]*(high*2*2**512+low))%q
  50. A.append(a)
  51. B.append(b)
  52. n=len(A)
  53. Ge=Matrix(ZZ,n+2,n+2)
  54. for i in range(n):
  55. Ge[i,i]=q
  56. Ge[-2,i]=A[i]
  57. Ge[-1,i]=B[i]
  58. K=2**150
  59. Ge[-2,-2]=1
  60. Ge=[-1,-1]=K
  61. for line in Ge.BKZ(block_size=30):
  62. if abs(line[-1])==K:
  63. k0_unknown=line[-2]
  64. k0 = high*2**152 + k0_unknown*tt + low
  65. d = (k0 * s0 - h0) * gmpy2.invert(r0,q) % q
  66. if pow(g,d,p) == y:
  67. print(1)
  68. sig = sign(pub,d,b"get flag",k0)
  69. r,s = sig
  70. sh.recvuntil(b">")
  71. sh.sendline(b"2")
  72. sh.recvuntil(b"Which message to verify?: ")
  73. sh.sendlineafter(b"r:",str(r).encode())
  74. sh.sendlineafter(b"s:",str(s).encode())
  75. print(sh.recvline())

CRYPTO-DSA的更多相关文章

  1. 2015GitWebRTC编译实录13

    2015.07.21 libboringssl.a 编译通过主要是生成路径,去除test文件比较啰嗦,后继测试需要重点跟进下 CC obj/third_party/boringssl/boringss ...

  2. openssl知识点总结

    openssl知识点总结 实践总结见之前博客:http://www.cnblogs.com/Jclemo/p/6091201.html 简介 openssl是一个功能丰富且自包含的开源安全工具箱.它提 ...

  3. Postman接口自动化测试实例用到的完整的SM2前端加密算法代码

    var __g__ = {}; !function(t,e){"object"==typeof exports?module.exports=exports=e():"f ...

  4. Openssl源代码整理学习---含P7/P10/P12说明

    声明:建议结合Openssl源代码学习: 一.基础知识 1.Openssl 简史 OpenSSL项目是加拿大人Eric A.Yang 和Tim J.Hudson开发,现在有Openssl项目小组负责改 ...

  5. Openssl编程--源码分析

    Openssl编程 赵春平 著 Email: forxy@126.com 第一章 基础知识 8 1.1 对称算法 8 1.2 摘要算法 9 1.3 公钥算法 9 1.4 回调函数 11 第二章 ope ...

  6. Openssl源代码整理学习

    一.基础知识 1.Openssl 简史 OpenSSL项目是加拿大人Eric A.Yang 和Tim J.Hudson开发,现在有Openssl项目小组负责改进和维护:他们是全球一些技术精湛的志愿技术 ...

  7. 基于redis 3.x搭建集群环境

    由于我团队开发的在线坐席系统,即将面对线上每周3000W的下行投放客户,产品的咨询量可能会很大,基于前期,200W的投放时,前10分钟,大概800问题量,平均一个客户大概8个问题,也就是说每分钟10个 ...

  8. nginx 安装手记

    Nginx需要依赖下面3个包 1. gzip 模块需要 zlib 库 ( 下载: http://www.zlib.net/ )  zlib-1.2.8.tar.gz 2. rewrite 模块需要 p ...

  9. openssl源码目录结构

    openssl源代码主要由eay库.ssl库.工具源码.范例源码以及测试源码组成. eay库是基础的库函数,提供了很多功能.源代码放在crypto目录下.包括如下内容: 1) asn.1 DER编码解 ...

  10. OpenSSL源码简介

    1.X.509标准 x509是由国际电信联盟(ITU-T)制定的数字证书标准:包含公钥和用户标志符.CA等: x509是数字证书的规范,P7和P12是两种封装形式:X.509是常见通用的证书格式.所有 ...

随机推荐

  1. 【转载】Netty堆外内存泄漏排查

    https://www.imooc.com/article/298943 上篇文章介绍了Netty内存模型原理,由于Netty在使用不当会导致堆外内存泄漏,网上关于这方面的资料比较少,所以写下这篇文章 ...

  2. Qt开源作品40-图片及文字与base64编码互换

    一.前言 对于图片的传输,通俗的做法一般有两种,一种是直接二进制文件传输,比如先传输开始标记,带文件名称.文件字节长度,然后挨个分包发送.最后发送文件结束标记,这种方式必须要求接收方按照自己定义的规则 ...

  3. 创建springboot项目时出现Selected Java version 11 is not supported by SDK (maximum 8)

    创建springboot项目的时候出现这个问题: selected java version 11 is not supporteed Max supported version is(1.8) 错误 ...

  4. IDEA中导入其它由Maven管理的java web项目并运行,提示“Error:(3, 38) java: 程序包org.springframework.stereotype不存在”问题的解决

    现象描述: IDEA中导入其它由Maven管理的java web项目并运行,提示"Error:(3, 38) java: 程序包org.springframework.stereotype不 ...

  5. Windows 配置自动更新重启策略

    I. 打开策略编辑器 [Win + R]打开 "运行" 窗口,输入: gpedit.msc 打开"本地组策略编辑器". II. 设置不自动重启 启用策略,选择在 ...

  6. IDEA集成Docker控制台日志乱码问题解决

    IDEA工具栏 → HELP → Edit Custom VM Options... 文件尾部添加一行 -Dfile.encoding=utf-8 重启IDEA即可

  7. 如何快速在本地运行你vue打包的的dist文件

    要在本机启动运行前端提供的dist包,需要先安装一个HTTP服务器,例如Apache,Nginx,phpstudy.这里以使用Node.js的http-server为例进行说明 首先,确保已经安装了N ...

  8. 监听sessionStorage中值的变化

    应用场景:将登录接口所返回的用户信息存入sessionStorage,在其他地方需要使用到用户信息,但不知道什么时候接口请求完,此时可以监听sessionStorage中值的变化. 应用:Event自 ...

  9. keycloak~巧用client-scope实现token字段和userinfo接口的授权

    keycloak中的client-scope允许你为每个客户端分配scope,而scope就是授权范围,它直接影响了token中的内容,及userinfo端点可以获取到的用户信息,这块我们可以通过自定 ...

  10. Linux 运维必备 150 个命令汇总

    地址:https://www.linuxcool.com 线上查询及帮助命令 man:全拼manual,用来查看系统中自带的各种参考手册. help:用于显示shell内部命令的帮助信息. 文件和目录 ...