Description
What if d is too small? Connect to the service and get the flag: nc mercury.picoctf.net 31133
Setup
Connect via netcat to receive e, n, and c.
nc mercury.picoctf.net 31133Solution
Walk me through it- Step 1Collect e, n, and cConnect to the server. It prints the public exponent e, modulus n, and ciphertext c. Copy these values for use in the attack script.
Learn more
In RSA encryption, the public key consists of two numbers: the modulus
n(a product of two large primes) and the public exponente. The ciphertextcis produced by computingc = m^e mod n, wheremis the plaintext message as an integer.These three values -
e,n, andc- are all that's needed to attempt an attack. The server gives them to you openly becauseeandnare part of the public key; onlyd(the private exponent) is supposed to be secret. The challenge is recoveringdwithout factoringn. - Step 2Apply Wiener's AttackWiener's attack recovers the private exponent d when d < n^0.25. The owiener Python library implements this attack. Install it with pip, then run the script to recover d and decrypt the ciphertext.bash
pip install owienerpythonpython3 << 'EOF' import owiener from Crypto.Util.number import long_to_bytes e = <e> n = <n> c = <c> d = owiener.attack(e, n) if d is None: raise SystemExit("Wiener's attack failed - d may not be small enough.") # Decrypt and verify the flag prefix m = pow(c, d, n) flag = long_to_bytes(m) assert flag.startswith(b"picoCTF{"), f"unexpected plaintext: {flag!r}" print(flag.decode()) EOFLearn more
Wiener's attack (1990) exploits a mathematical weakness in RSA when the private exponent
dis too small relative to the modulus - specifically whend < n^0.25 / 3. In that case, a property of continued fraction approximations allows an attacker to recoverdefficiently from the public valueseandnalone.The attack works because RSA's key relationship
e*d ≡ 1 (mod φ(n))means the fractione/nis very close tok/dfor some small integerk. Whendis small enough, the convergents of the continued fraction expansion ofe/nincludek/das one of its early terms - making it directly recoverable.Verifying the recovered d. The script asserts the decrypted plaintext starts with
picoCTF{. If owiener returns a non-None d but the assertion fails, you've recovered a continued-fraction convergent that's mathematically valid for the equation but isn't the real private exponent - retry with a tweaked search bound, or fall back to factoring n if it's small.Real-world significance: Developers sometimes choose small values of
dto speed up RSA decryption (since modular exponentiation with a smaller exponent is faster). Wiener's attack demonstrates why this is catastrophic. Modern RSA implementations always use random, full-size private exponents. Thelong_to_bytesfunction frompycryptodomeconverts the recovered plaintext integer back into a readable string. For more on RSA attack patterns, see RSA attacks for CTF.
Alternate Solution
Once Wiener's attack recovers d, paste p, q, e, and the ciphertext into the RSA Calculator on this site to perform the final decryption step in the browser without needing Python.
Flag
picoCTF{...}
Wiener's attack exploits RSA when d < n^0.25 - always use d larger than the cube root of n.