cryptoProhard
Широковещание (Broadcasting)
hackerlab
Task: RSA encrypted flag sent to 3 recipients with e=3 and different moduli, hint about 'Swedish mathematician'. Solution: Håstad's Broadcast Attack using Chinese Remainder Theorem to recover m³, then extract cube root.
$ ls tags/ techniques/
rsacrtchinese_remainder_theoremmulti_recipientsame_messagehastad_broadcast_attacksmall_exponente_equals_3cube_root
Håstad's Broadcast AttackChinese Remainder Theorem (CRT)Integer nth root extractionMulti-recipient RSA exploitation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Весёлый RSA (Funny RSA)— hackerlab
- [crypto][Pro]Основы RSA 1 (RSA Basics 1)— hackerlab
- [crypto][Pro]Secrets— spbctf
- [crypto][free]Baby Time Capsule— hackthebox
- [crypto][Pro]Opel Astra— miptctf