Cubiod

EasyCryptography

Overview

A deliberately vulnerable RSA program is provided. The challenge gives competitors a public value.Recover the secret flag
Flag Format: Flag{text}

Lab Details

Prerequisites & Requirements

  • Basic familiarity with RSA (public/private keys, modulus N, exponent e) and converting between bytes and integers.
  • Comfortable with Python (reading scripts, running small one-off scripts).
  • Ability to use/install simple Python packages (e.g., sympy, pycryptodome or gmpy2).

What will you learn?

  • Why textbook RSA with a very small public exponent (e.g., e = 3) is dangerous for short messages.
  • How to reason about m^e vs N and when modular reduction does not occur.
  • Practical technique: recover a plaintext by computing an integer root and converting it back to bytes.

Tools

  • Python 3 (interpreter).
  • sympy (for integer_nthroot) or gmpy2 (for iroot) for integer roots.
  • pycryptodome (Crypto.Util.number) for byte/int conversions if needed.

Job Positions

Security Analyst

Tags

RsaEncryptionAsymmetricCryptanalysisDecryption