Rem, Shinobu, Asuna
Typical RSA challenge and YOU DON'T NEED TO FACTORIZE N every time you see an RSA challenge!
We have,
Actually, it's very hard to factor a 1024 bit RSA public modulus but If we have some of the leaked data about private keys or the modulus then we can use some tricks to factor the 1024-bit modulus.
Let's start with Fermat's little theorem which states that,
Let . Now we can apply this here,
With this trick, we can get one of the factors of the public modulus (n) and then simply decrypt the ciphertext!
Solve Script: solve.py
Flag: wormcon{RSA_And_Fermat's_Little_Theorem!?}
Last updated