Description
What if d is too small? Connect to the service and get the flag: nc mercury.picoctf.net 31133
Setup
Connect via netcat to receive e, n, and c.
Solution
- Step 1Collect e, n, and cConnect to the server. It prints the public exponent e, modulus n, and ciphertext c. Copy these values for use in the attack script.
Learn more
In RSA encryption, the public key consists of two numbers: the modulus
n(a product of two large primes) and the public exponente. The ciphertextcis produced by computingc = m^e mod n, wheremis the plaintext message as an integer.These three values --
e,n, andc-- are all that's needed to attempt an attack. The server gives them to you openly becauseeandnare part of the public key; onlyd(the private exponent) is supposed to be secret. The challenge is recoveringdwithout factoringn. - Step 2Apply Wiener's AttackWiener's attack recovers the private exponent d when d < n^0.25. The owiener Python library implements this attack. Install it with pip, then run the script to recover d and decrypt the ciphertext.pip install owienerpython3 << 'EOF' import owiener from Crypto.Util.number import long_to_bytes e = <e> n = <n> c = <c> d = owiener.attack(e, n) if d is None: print("Wiener's attack failed -- d may not be small enough.") else: m = pow(c, d, n) print(long_to_bytes(m).decode()) EOF
Learn more
Wiener's attack (1990) exploits a mathematical weakness in RSA when the private exponent
dis too small relative to the modulus -- specifically whend < n^0.25 / 3. In that case, a property of continued fraction approximations allows an attacker to recoverdefficiently from the public valueseandnalone.The attack works because RSA's key relationship
e*d ≡ 1 (mod φ(n))means the fractione/nis very close tok/dfor some small integerk. Whendis small enough, the convergents of the continued fraction expansion ofe/nincludek/das one of its early terms -- making it directly recoverable.Real-world significance: Developers sometimes choose small values of
dto speed up RSA decryption (since modular exponentiation with a smaller exponent is faster). Wiener's attack demonstrates why this is catastrophic. Modern RSA implementations always use random, full-size private exponents. Thelong_to_bytesfunction frompycryptodomeconverts the recovered plaintext integer back into a readable string.
Flag
picoCTF{...}
Wiener's attack exploits RSA when d < n^0.25 -- always use d larger than the cube root of n.