crypto-analysis

Crypto Analysis Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "crypto-analysis" with this command: npx skills add kiwamizamurai/cctf/kiwamizamurai-cctf-crypto-analysis

Crypto Analysis Skill

Quick Workflow

Progress:

  • Try Ciphey auto-decrypt first
  • Identify crypto type (RSA/AES/XOR/classical)
  • Check for known weaknesses
  • Implement attack
  • Decrypt flag

Step 1: Auto-Decrypt (Try First!)

ciphey -t "ENCODED_TEXT" # Auto-detects and decrypts ciphey -f encrypted.txt # From file

Step 2: Identify Crypto Type

Pattern Crypto Type Reference

n, e, c variables RSA reference/rsa-attacks.md

16/32 byte key, IV AES reference/aes-attacks.md

XOR operations XOR/Stream reference/classical.md

Polynomial mod Lattice reference/lattice.md

RSA Attack Decision Tree

├── e small (≤5)? → Direct eth root ├── e very large? → Wiener's Attack ├── Multiple n,e,c? → Hastad's Broadcast ├── Same n, diff e? → Common Modulus ├── GCD(n1,n2) > 1? → Common Factor ├── p ≈ q? → Fermat Factorization ├── dp/dq leaked? → Partial Key Recovery └── Default → FactorDB / yafu

Full implementations: reference/rsa-attacks.md

Quick Commands

Auto-decrypt

ciphey -t "text"

XOR analysis

xortool encrypted.bin xortool -c 20 encrypted.bin # Expect spaces

Factor large n

yafu "factor(<n>)"

RSA tool

python3 RsaCtfTool.py -n <n> -e <e> --uncipher <c>

Lattice (SageMath)

sage solve.sage

Reference Files

  • RSA Attacks: Small e, Wiener, Hastad, Common Modulus, Fermat, FactorDB

  • AES Attacks: ECB detection, CBC flip, Padding Oracle

  • Classical/XOR: Ciphey, xortool, frequency analysis, Vigenère

  • Lattice: Coppersmith, LLL, HNP

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

osint

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

pyjail

No summary provided by upstream source.

Repository SourceNeeds Review
General

networking

No summary provided by upstream source.

Repository SourceNeeds Review