JavaScript promise rejection: Loading CSS chunk katex failed. (error: https://theredteam.tech/assets/css/katex.fb6ef55c.css). Open browser console to see more details.
h4cker/crypto/challenges/02_Diffie_Hellman_Key_Exchange.md
2023-08-15 09:51:13 -04:00

1.4 KiB

Challenge 2: Simple RSA Encryption

Challenge Text:

n = 3233, e = 17, Encrypted message: [2201, 2332, 1452]

Instructions:

  1. Factorize the value of n into two prime numbers, p and q.
  2. Compute the private key d using the Extended Euclidean Algorithm.
  3. Decrypt the message using the computed private key.

Answer:

image

Code snippet in Python to perform the entire decryption:

def egcd(a, b):
    if a == 0:
        return (b, 0, 1)
    else:
        g, x, y = egcd(b % a, a)
        return (g, y - (b // a) * x, x)

def modinv(a, m):
    g, x, y = egcd(a, m)
    if g != 1:
        raise Exception('Modular inverse does not exist')
    else:
        return x % m

def decrypt_rsa(ciphertext, n, e):
    p, q = 61, 53  # Factored values
    phi = (p-1)*(q-1)
    d = modinv(e, phi)
    plaintext = [str(pow(c, d, n)) for c in ciphertext]
    return ''.join(chr(int(c)) for c in plaintext)

n = 3233
e = 17
ciphertext = [2201, 2332, 1452]

decrypted_text = decrypt_rsa(ciphertext, n, e)
print(decrypted_text)  # Output: "HEY"

This challenge provided you with an understanding of the RSA algorithm. It covered important concepts like prime factorization, modular arithmetic, and key derivation.