Very Smooth
Forget safe primes... Here, we like to live life dangerously... >:)
- 1.
- 2.Using RsaCtfTool with the
pollard_p_1
attack by runningpython RsaCtfTool.py --uncipher [c] -e 65537 -n [n] --attack pollard_p_1
doesn't work since it doesn't try enough primes (relevant source code). So, we adapt their script to create the solution script.py, which tries 7000 primes. - 3.Interestingly, this prime is in factordb so RsaCtfTool will print the flag immediately when using the
factordb
attack.
picoCTF{376ebfe7}
Last modified 1yr ago