View Full Version : RSA implementation

November 6th, 2004, 09:03
I am working on some RSA protected app.It serial scheme is different to regular RSA implemantation so that it decrypts serial with d.I guess I have found the n and d however when I feed this values to my bignumber lib it didnt worked

original program

so I calculated
Maybe I should first try to brutefrorce e instead of factorig and geting it

I know one valid serial though
name: user600
code: qBaILQ9eHfqaHZw+Ld+gyfBusxmMLOq7CJOBgfHbU2I=
Serial is converted to base64.I am new to RSA thing could you check this values and tell me my values are correct or not for this implementation ?

November 7th, 2004, 17:18
you've got your numbers right: p*q=n, d*e=1 mod phi(n). What's 'code' as a number? (too lazy to figure it out myself)

November 8th, 2004, 08:09
Hi LaptoniC

May I ask you How you obtain the p and q (factoring) ?
Which program you are used to factor this 256 bits RSA number ?


November 8th, 2004, 10:55
mike code is as
hex A816882D0F5E1DFA9A1D9C3E2DDFA0C9F06EB3198C2CEABB08938181F1DB5362

for factorizing I used http://www.asahi-net.or.jp/%7EKC2H-MSM/cn/ it is faster than RSA-tool and allows you to save and resume.I factored I guess after 1.5 hour dont remember exactly.

November 8th, 2004, 17:42
I get code^d mod n =

dec: 32203605056077899989696486620583417132870039787602000620061715128083153892901

hex: 473298337bae3413c451da2685c6c0198f473af75521f5b66904cc7c439f3625

and code^e mod n =
dec: 25633554524463369197540132814160836968933790088022549341000866828215553752435
hex: 38ac13e50fab65f6f3a1d21d4356a5b511039facf5d6d3bf8d3da1c51d7dfd73

http://www.alpertron.com.ar/ECM.HTM is a java factoring applet that's pretty good

November 8th, 2004, 19:24
That means I skipped something I will dig it more thanks for your time.

November 10th, 2004, 14:52
http://www.alpertron.com.ar/ECM.HTM is a java factoring applet that's pretty good

Not bad indeed. Two-stage ECM with the weeker B-smoothness limitation... Hmm... But it is Java. Therefore, the speed is horrible.
Better use this one:


This one is using GMP engine. Once again, I'm too lasy to check if this guy has implemented FFT-multiplication, but, anyhow...

November 10th, 2004, 22:39
Java doesn't necessarily imply horrible speed: JIT compilers do a really good job these days, and it's all math calls which are native anyway. Why doesn't someone do a comparison and let us know?

November 10th, 2004, 22:52
The keyword here is "JIT compilers"
As to the speed comparison - m-m-m... Nice idea. Slightly later. Pretty busy now

December 18th, 2004, 21:47
Is there any known attack if (in addition to modulus N and exponent E) C and M is available?
So i have crypted and plaintext "message" and the modulus and exponent and want to determine my private exponent d. what possibilities do i have without getting my big math bible...?

December 20th, 2004, 15:44
Without the math, there is nothing you can do at all. You have to know A LOT. As to your specific problem go read
There is a very easy description there of the various attacks on RSA that do not involve factoring N and allow you to recover M. But I'm not sure about D...
Since d = e^-1(mod((p-1)*(q-1))) you have to know p and q... Though I must admit, I don't know algebra good enough yet to say it for sure

December 21st, 2004, 05:37
[Originally Posted by volodya]Without the math, there is nothing you can do at all. You

I fear thatīs true... ;-)
Anyway, there are lots of Attacks. I played a little with RSATool (2.17).. is there somewhere the source of that nice thing? because i miss some functions and not lucky to write all for new...
(So whatīs with "factorizing" d instead n, furthermore it shuts down without any error calculating bigger keys..)

December 21st, 2004, 15:32
The newest possible version is on my wasm.

But why do you need it for?
To factor N you should use specific tools parallelized on many machines (like NFS implementation). RSA Tool is build using Miracl and suites for the numbers that are less then 80 digits, say. You can calculate these on your personal PC.

December 28th, 2004, 16:53
See "Twenty years of attacks on the RSA cryptosystem" by Dan Boneh