Some functions to solve crypto CTF challs
Broadcast Attack
This uses a broadcast attack to retrieve the original plaintext. You should pass an array with the moduli as the first argument, an array with the ciphertexts as the second argument and the value of the public key e as the third argument.Small e
This uses a Small e attack to retrieve the original plaintext. The first argument should be the ciphertext and the second argument should be the value of the public key e.- Simple XOR
- Tool to bruteforce the key
- Compute occurrence of letters on a string