cryptoProeasy
Основы RSA 1 (RSA Basics 1)
hackerlab
Task: RSA-encrypted message with public key (n, e) and one prime factor p provided as extra data. Solution: Calculate q from n/p, compute private exponent d using modular inverse, decrypt ciphertext.
$ ls tags/ techniques/
Integer to bytes conversionRSA decryption with known prime factorModular inverse calculation for private exponent
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Основы RSA 2 (RSA Basics 2)— hackerlab
- [crypto][Pro]Ничего особенного (Nothing Special)— hackerlab
- [crypto][Pro]Только RSA (JustRSA)— duckerz
- [crypto][Pro]Leaked d— uoftctf2026
- [crypto][Pro]ChristmasRSA— grodno_new_year_2026