BUU-CRYPTO2 introduction to cryptography collection II bullet
The introductory questions on the second page of BUU-CRYPTO are finished. wp is integrated here, and all the questions about RSA are put in another column
BUUCTF RSA column_ Xiaohan's blog - CSDN blog , then
The problem of sensors is put in
(BUU-CRYPTO1 cryptography Xiaobai 25 introductory questions detailed problem solving ideas Xiaohan's ...
Posted by jasonX on Sun, 16 Jan 2022 20:35:26 +0100
Cryptographic protocol experiment -- sigma protocol
Cryptographic protocol experiment -- sigma protocol
Experiment 1 implementation of DH authentication key exchange protocol
SIGMA protocol
principle
step
1. Configure miracl and openssl library environment
Configuring the miracl library environment
The configuration is a little troublesome. First, download the source code and paste a mira ...
Posted by just1ncase on Tue, 04 Jan 2022 10:58:38 +0100
RSA implemented in JAVA - without using the security library
The experiment in the school is just learning the cryptography foundation of network security. I just want to write an RSA encryption algorithm. I have seen a lot of RSA encryption codes before, but most of them are implemented using the library. Because I want to better understand, I don't call the security library to implement it once. Of cou ...
Posted by HughbertD on Wed, 15 Dec 2021 20:37:24 +0100
##In October 2021, Guangdong strong net cup, CRYPTO's RSA AND BASE?
In October 2021, Guangdong strong net cup, CRYPTO's RSA AND BASE?
Download the attachment, which is a txt file. Open it and find the RSA ciphertext and a codec table similar to base32, which also conforms to the hint of the title:
. . As usual, use CTF-RSA-TOOL to run the RSA problem and find that it can run out: . . This should be the flag ...
Posted by LostNights on Thu, 14 Oct 2021 01:52:57 +0200