In RSA, a small e value can be problematic, but what about N? Can you decrypt this?
How RSA works
here is message(plaintext), and is ciphertext
If is small, we can crack it
(tool 1: https://www.dcode.fr/euler-totient tool 2: http://factordb.com/)
and know what and are.
After acquiring and , we can calculate , then calculate d=pow(e,-1,phin)
using Python.
proof of RSA
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More β
(source: https://drive.google.com/file/d/1EURAqSaG2Mn0w0j70rI0Ph100CzXANty/view)
Writeup
- Use FactorDB to get the value of and
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More β
- Use Python to decode it
Output:
Easier way
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More β
note that β P,Q computed with N (FactorDB database) is mentioned