BUU-CRYPTO2 introduction to cryptography collection II bullet

The introductory questions on the second page of BUU-CRYPTO are finished. wp is integrated here, and all the questions about RSA are put in another column BUUCTF RSA column_ Xiaohan's blog - CSDN blog , then The problem of sensors is put in (BUU-CRYPTO1 cryptography Xiaobai 25 introductory questions detailed problem solving ideas Xiaohan's ...

Posted by jasonX on Sun, 16 Jan 2022 20:35:26 +0100

Cryptographic protocol experiment -- sigma protocol

Cryptographic protocol experiment -- sigma protocol Experiment 1 implementation of DH authentication key exchange protocol SIGMA protocol principle step 1. Configure miracl and openssl library environment Configuring the miracl library environment The configuration is a little troublesome. First, download the source code and paste a mira ...

Posted by just1ncase on Tue, 04 Jan 2022 10:58:38 +0100

RSA implemented in JAVA - without using the security library

The experiment in the school is just learning the cryptography foundation of network security. I just want to write an RSA encryption algorithm. I have seen a lot of RSA encryption codes before, but most of them are implemented using the library. Because I want to better understand, I don't call the security library to implement it once. Of cou ...

Posted by HughbertD on Wed, 15 Dec 2021 20:37:24 +0100

##In October 2021, Guangdong strong net cup, CRYPTO's RSA AND BASE?

In October 2021, Guangdong strong net cup, CRYPTO's RSA AND BASE? Download the attachment, which is a txt file. Open it and find the RSA ciphertext and a codec table similar to base32, which also conforms to the hint of the title: . . As usual, use CTF-RSA-TOOL to run the RSA problem and find that it can run out: . . This should be the flag ...

Posted by LostNights on Thu, 14 Oct 2021 01:52:57 +0200