From 01773cb4cdb1fdf6757a9d040eab278ac5e97118 Mon Sep 17 00:00:00 2001 From: Daniel <59575049+lemoentjiez@users.noreply.github.com> Date: Tue, 24 Jan 2023 00:43:45 +0200 Subject: [PATCH] Create README.md --- LabMD_2/README.md | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 LabMD_2/README.md diff --git a/LabMD_2/README.md b/LabMD_2/README.md new file mode 100644 index 0000000..ad4979e --- /dev/null +++ b/LabMD_2/README.md @@ -0,0 +1,7 @@ +# Random vulnerability +You've stumbled onto a significant vulnerability in a commonly used cryptographic library. It turns out that the random number generator it uses frequently produces the same primes when it is generating keys. +Exploit this knowledge to factor the (hexadecimal) keys below, and enter your answer as the last six digits of the largest factor you find (in decimal). +Key 1: +`1c7bb1ae67670f7e6769b515c174414278e16c27e95b43a789099a1c7d55c717b2f0a0442a7d49503ee09552588ed9bb6eda4af738a02fb31576d78ff72b2499b347e49fef1028182f158182a0ba504902996ea161311fe62b86e6ccb02a9307d932f7fa94cde410619927677f94c571ea39c7f4105fae00415dd7d` +Key 2: +`2710e45014ed7d2550aac9887cc18b6858b978c2409e86f80bad4b59ebcbd90ed18790fc56f53ffabc0e4a021da2e906072404a8b3c5555f64f279a21ebb60655e4d61f4a18be9ad389d8ff05b994bb4c194d8803537ac6cd9f708e0dd12d1857554e41c9cbef98f61c5751b796e5b37d338f5d9b3ec3202b37a32f`