cryptoProeasy

Ни в чём не ошибся

duckerz

Task: RSA encryption with encoder.py and out.txt files. Solution: Discovered that e_output = e + p leaks the prime factor; recovered p by subtracting standard e=65537, then trivially factored n and decrypted the flag.

$ ls tags/ techniques/
prime_factor_leaktrivial_factorization

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups