###### tags: `DarkCTF` `crypto` # Pipe Rhyme(RSA) - file:`https://mega.nz/file/jwUWnDID#qtXnMNkjeTzw-2ESH1xOat5sGoosMbBpIUGClq8xOyY` - you either know it or not take this and get your flag - 5552415c2b3525105a4657071b3e0b5f494b034515 - 載完檔案 - ![](https://i.imgur.com/pSt5h9a.png) - n = p * q,線上解工具`http://www.factordb.com/index.php?query=1763350599372172240188600248087473321738860115540927328389207609428163138985769311` ```python= from Crypto.Util.number import * n = int(input("ENTER n : ")) e = int(input("ENTER e : ")) c = int(input("ENTER c : ")) print("Find out p and q from factordb") p = int(input("ENTER P : ")) q = int(input("ENTER q : ")) phi = (p-1)*(q-1) d = inverse(e,phi) m=pow(c,d,n) print("The message is :") print(m) print("-"*69) print("The message after long_to_bytes is :") print(long_to_bytes(m)) ```