Not So Safe Primes

"Generating DH parameters... this is going to take a long time"



DR.Philth

43 solved
Oct. 18, 2018, 11:11 p.m.

Hi, is this challenge working? I've found a key that has had a 100% match rate with the endpoint's output when given 512-bit, randomized, public keys. I've also tried my program against my own test vectors, and it has successfully cracked the keys. I'm extracting the last 50 digits in Python using str(dh.key)[-50:] but have also done it manually to make sure.

DR.Philth

43 solved
Oct. 23, 2018, 7:19 p.m.

The problem was sympy was automatically changing the order. Worked instantly after manually setting the value.

matinc26

0 solved
Nov. 15, 2019, 4:14 p.m.

For me it does not work. I compute the shared secret using my public key and the guess of the another secret. I get match... I do not know :(

madness

38 solved
April 10, 2020, 4:46 a.m.

From https://id0-rsa.pub/problem/dh-oracle/02/: 2068bf07530bf3a6d656d6907e1926505061a209dbac90b3bff8f8cfadf67a4f8e7bb0102144069569cd2fda30ce42f156e563359c6b58c043d141c5668c135ce

I have an x that gives pow(2,x,p) = that stuff^^ but the answer is not accepted.

rkm0959

38 solved
June 24, 2020, 2:16 a.m.

same with madness :( UPD: never mind found my error