cryptomedium
Leaked d
uoftctf2026
Task: RSA with leaked private exponent d1, modulus n reused with new public exponent e2. Solution: Factor n using Miller-Rabin based algorithm on e1*d1-1, compute new d2, decrypt ciphertext.
$ ls tags/ techniques/
factor_from_dmiller_rabin_factorizationmodular_arithmetic
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]