###### tags: `DarkCTF` `crypto`
# Pipe Rhyme(RSA)
- file:`https://mega.nz/file/jwUWnDID#qtXnMNkjeTzw-2ESH1xOat5sGoosMbBpIUGClq8xOyY`
- you either know it or not take this and get your flag
- 5552415c2b3525105a4657071b3e0b5f494b034515
- 載完檔案
- 
- n = p * q,線上解工具`http://www.factordb.com/index.php?query=1763350599372172240188600248087473321738860115540927328389207609428163138985769311`
```python=
from Crypto.Util.number import *
n = int(input("ENTER n : "))
e = int(input("ENTER e : "))
c = int(input("ENTER c : "))
print("Find out p and q from factordb")
p = int(input("ENTER P : "))
q = int(input("ENTER q : "))
phi = (p-1)*(q-1)
d = inverse(e,phi)
m=pow(c,d,n)
print("The message is :")
print(m)
print("-"*69)
print("The message after long_to_bytes is :")
print(long_to_bytes(m))
```