Rem, Shinobu, Asuna
Typical RSA challenge and YOU DON'T NEED TO FACTORIZE N every time you see an RSA challenge!
We have,
Actually, it's very hard to factor a 1024 bit RSA public modulus but If we have some of the leaked data about private keys or the modulus then we can use some tricks to factor the 1024-bit modulus.
Let's start with Fermat's little theorem which states that,
With this trick, we can get one of the factors of the public modulus (n) and then simply decrypt the ciphertext!
Solve Script: solve.py
Flag: wormcon{RSA_And_Fermat's_Little_Theorem!?}
Last updated
Was this helpful?