cryptoPromedium
Leaked d
uoftctf2026
Given: - `n1` - RSA modulus - `e1 = 65537` - old public exponent - `d1` - leaked private exponent for e1 - `e2 = 6767671` - new public exponent - `c` - ciphertext encrypted with e2
$ ls tags/ techniques/
factor_from_dmiller_rabin_factorizationmodular_arithmetic
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]ChristmasRSA— grodno_new_year_2026
- [crypto][Pro]Основы RSA 1 (RSA Basics 1)— hackerlab
- [crypto][Pro]Bread 1 — RSA Decryption— spbctf
- [crypto][Pro]weird modulus— spbctf
- [crypto][Pro]Только RSA (JustRSA)— duckerz