\(C' = C \cdot S^E\), find \(P' = \text{decrypt}(C')\), and hence \(P = P' S^{-1}\)
ct1: <long num 1> ct2: <long num 2> e1: 13 e2: 15 modulus: <modulo>
You have two captured ciphertexts. The public key is (e1, n). But, due to a transient bit flip, the second ciphertext was encrypted with a faulty public key: (e2, n). Recover the plaintexts.
\(xa + yb = \gcd(a, b)\) for all \(a, b\)
Given some number of ciphertexts encrypting the same plaintext, knowning the values of public keys, find the plaintext
For a set of congruences \[x \equiv a_i \pmod n_i,\; 0 < i \leq k,\] there exists a solution, and that solution is unique under the congruence of \(N = \prod_{i = 1}^{k} n_i\), where each of \(n_i\) is pairwise coprime
It is well known that any RSA encryption can be undone by just encrypting the ciphertext over and over again. If the RSA modulus has been chosen badly then the number of encryptions necessary to undo an encryption is small. However, if the modulus is well chosen then a cycle attack can take much longer. This property can be used for a timed release of a message. We have confirmed that it takes a whopping 21025-3 encryptions to decrypt the flag. Pack out your quantum computer and perform 21025-3 encryptions to solve this challenge. Good luck doing this in 48h.