Not So Safe Primes
"Generating DH parameters... this is going to take a long time"
Hi, is this challenge working? I've found a key that has had a 100% match rate with the endpoint's output when given 512-bit, randomized, public keys. I've also tried my program against my own test vectors, and it has successfully cracked the keys. I'm extracting the last 50 digits in Python using
str(dh.key)[-50:] but have also done it manually to make sure.
The problem was sympy was automatically changing the order. Worked instantly after manually setting the value.
For me it does not work. I compute the shared secret using my public key and the guess of the another secret. I get match... I do not know :(
From https://id0-rsa.pub/problem/dh-oracle/02/: 2068bf07530bf3a6d656d6907e1926505061a209dbac90b3bff8f8cfadf67a4f8e7bb0102144069569cd2fda30ce42f156e563359c6b58c043d141c5668c135ce
I have an x that gives pow(2,x,p) = that stuff^^ but the answer is not accepted.
same with madness :( UPD: never mind found my error