Anonymous
6/13/2025, 7:31:15 AM No.16696693
Pt 2 electric boogaloo
Last one was a little rough. Thanks for trying it out though, and keep going if you want!
The notes for this challenge are very long (shocker, it's RSA-4096). They can be found here:
https://pastebin.com/HsWj0GjD
Trust me, this isn't a hopeless challenge. If you know what you're doing, it can be cracked in seconds with python.
Some more information, for those curious:
Primes were generated via pseudorandom bit sequences evaluated via 40 round Miller-Rabin
If and when you break it, the ciphertext encoding is simply a bitstring where each byte is a character.
Just convert the bytes to characters and you'll get the message, testing your encoding-guessing skills isn't part of this challenge.
The attack you need was formalized very recently - about 2 years ago, with real attacks in the wild - but its origin is very, very old.
Once again, good luck!
Last one was a little rough. Thanks for trying it out though, and keep going if you want!
The notes for this challenge are very long (shocker, it's RSA-4096). They can be found here:
https://pastebin.com/HsWj0GjD
Trust me, this isn't a hopeless challenge. If you know what you're doing, it can be cracked in seconds with python.
Some more information, for those curious:
Primes were generated via pseudorandom bit sequences evaluated via 40 round Miller-Rabin
If and when you break it, the ciphertext encoding is simply a bitstring where each byte is a character.
Just convert the bytes to characters and you'll get the message, testing your encoding-guessing skills isn't part of this challenge.
The attack you need was formalized very recently - about 2 years ago, with real attacks in the wild - but its origin is very, very old.
Once again, good luck!
Replies: