cryptoProeasy
Ничего особенного (Nothing Special)
hackerlab
Task: RSA decryption with standard parameters (2048-bit modulus, e=65537). Solution: Checked FactorDB and found the modulus was already factored, allowing direct RSA decryption.
$ ls tags/ techniques/
FactorDB modulus lookupRSA decryption with known factorsModular inverse calculation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Основы RSA 2 (RSA Basics 2)— hackerlab
- [crypto][Pro]Ни в чём не ошибся— duckerz
- [crypto][Pro]Только RSA (JustRSA)— duckerz
- [crypto][Pro]Основы RSA 1 (RSA Basics 1)— hackerlab
- [crypto][Pro]Весёлый RSA (Funny RSA)— hackerlab