CH01 - 500pts


Download the files and find a way to retrieve the encrypted data. Contents:,, m1.enc, m2.enc

Challenge Files:


  1. Searching for "rsa two messages different exponents" finds this Crypto StackExchange answer which links to this other Crypto StackExchange answer which mentions a "common modulus attack."

  2. Mathematical Attacks on RSA Cryptosystem states: "A Common Modulus attack can be used to recover the plaintext when the same message is encrypted to two RSA keys that use the same modulus. This algorithm works if and only if message sends with the same modulus and relatively prime encryption exponents." You can learn more by reading this article RSA Attacks: Common Modulus.

  3. Searching for a Python script to conduct this attack finds HexPandaa/RSA-Common-Modulus-Attack.

  4. We can run this tool using python3 -c1 ch01/m1.enc -c2 ch01/m2.enc -k1 ch01/ -k2 ch01/ to get the flag: Flag: shaRinGisCaRinG-010.



Last updated