cryptomedium

Leaked d

uoftctf2026

Task: RSA with leaked private exponent d1, modulus n reused with new public exponent e2. Solution: Factor n using Miller-Rabin based algorithm on e1*d1-1, compute new d2, decrypt ciphertext.

$ ls tags/ techniques/
factor_from_dmiller_rabin_factorizationmodular_arithmetic

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]