{"width":"100%","description":"Challenge I use whatever exponent I want \u30d5\u30a1\u30a4\u30eb\uff1achall.py from Crypto.Util.number import getPrime, inverse, bytes_to_long e = 1440 p = getPrime(1024) q = getPrime(1024) n = p * q flag = b\"buckeye{???????????????????????????????}\" c = pow(bytes_to_long(flag), e, n) print(f\"e = {e}\") print(f\"p = {p}\") pr\u2026","blog_url":"https://partender810.hatenablog.com/","author_url":"https://blog.hatena.ne.jp/partender810/","title":"Buckeye CTF Defective RSA writeup","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/p/partender810/20211027/20211027133536.png","author_name":"partender810","url":"https://partender810.hatenablog.com/entry/2021/10/30/120348","blog_title":"Attack All Around","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fpartender810.hatenablog.com%2Fentry%2F2021%2F10%2F30%2F120348\" title=\"Buckeye CTF Defective RSA writeup - Attack All Around\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","type":"rich","version":"1.0","published":"2021-10-30 12:03:48","categories":[],"height":"190","provider_name":"Hatena Blog"}