Description
What happens if you have a small exponent? There is a small danger in using small exponents in RSA. n and c are provided.
Setup
Download the challenge files containing n, c, and e.
wget <url>/ciphertextwget <url>/nwget <url>/eSolution
Walk me through it- Step 1Recognize the small exponent weaknessThe challenge uses e=3. When the public exponent is very small and the message is not padded sufficiently, m^e may be only slightly larger than n. This means the ciphertext c = m^3 mod n is equivalent to m^3 - k*n for some small integer k. Try increasing values of k until the result is a perfect cube.
Learn more
The basic cube root attack. RSA encrypts as
c = m^e mod n. Withe = 3, ifm^3 < nthe reduction is a no-op andc = m^3. Take the integer cube root ofcand you havem.This challenge twist: m^3 just barely exceeds n. By definition of
mod,c = m^3 - k*nfor some non-negative integerk = floor(m^3 / n). Thereforem^3 = c + k*n. Ifkis small (single digits to a few thousand), iterate:for k in 0, 1, 2, ...: candidate = c + k*n m, exact = iroot(candidate, 3) if exact: return mWorked toy example. Take
n = 1000,e = 3, plaintextm = 11:m^3 = 1331 c = 1331 mod 1000 = 331 k = floor(1331 / 1000) = 1 Recovery (do not know m): k = 0: iroot(331, 3) = (6, False) no k = 1: iroot(331 + 1000, 3) = (11, True) ✓ recovered m = 11How big can k get? If
mis the same bit-length asn, thenk ≈ m^3 / ncan be roughlyn^2in magnitude - completely infeasible to iterate. The attack only works when the plaintext is short enough thatm^3fits in "a few wraparounds" ofn. For a flag plaintext padded with a few bytes,kis typically 1 to a few thousand. If iteration runs for millions of values without success, the message is too long and you need stronger techniques (Coppersmith, broadcast).Why
irootnot** (1/3). Floating-point cube roots lose precision past 2^53.gmpy2.iroot(c, 3)uses arbitrary-precision Newton iteration: start with an estimatex_0, refine viax_(i+1) = (2*x_i + c // x_i^2) / 3untilx_(i+1) == x_i, then checkx^3 == c. - Step 2Iterate k until you find a perfect cube rootUse gmpy2.iroot to compute the integer cube root of c + k*n. The function returns (root, exact) - when exact is True, you have found m. Convert the resulting integer to bytes to read the flag.python
python3 << 'EOF' from gmpy2 import iroot from Crypto.Util.number import long_to_bytes n = <n> c = <c> e = 3 k = 0 while True: candidate = c + k * n m, exact = iroot(candidate, e) if exact: print(long_to_bytes(m).decode()) break k += 1 EOFLearn more
gmpy2 is a Python wrapper around the GMP arbitrary-precision library.
iroot(x, n)returns(root, exact)whererootis the integer n-th root ofxandexactisTrueonly ifroot^n == xexactly. This is far more reliable than floating-point cube root functions, which lose precision on 300+ digit numbers.This attack is known as the small-exponent attack. The standard defense is to use OAEP padding (PKCS#1 v2), which randomizes messages before encryption so that even identical plaintexts encrypt to different ciphertexts. Modern RSA implementations always use padding - never raw textbook RSA.
- Step 3Fallback: Hastad's broadcast attackGiven the same plaintext m encrypted under e different public keys (n_1, n_2, ..., n_e) all with the same small exponent e, use the Chinese Remainder Theorem to compute c = m^e mod (n_1 * ... * n_e). Since m^e is below this product, c equals m^e exactly and an integer e-th root recovers m.python
python3 - <<'EOF' from gmpy2 import iroot from sympy.ntheory.modular import crt from Crypto.Util.number import long_to_bytes # Three ciphertexts of the same m under e=3 with different moduli ns = [<n1>, <n2>, <n3>] cs = [<c1>, <c2>, <c3>] e = 3 # CRT recombines the three ciphertexts into m^e mod (n1*n2*n3) combined, _ = crt(ns, cs) m, exact = iroot(combined, e) assert exact, "CRT result was not a perfect e-th power - check inputs" print(long_to_bytes(int(m)).decode()) EOFLearn more
When to reach for Hastad. The single-ciphertext cube-root iteration only works when
k = floor(m^3 / n)is small. If iteration walks past tens of millions ofkvalues without success, the plaintext is comparable in size to the modulus and the basic attack is not going to terminate. Hastad sidesteps this by exploiting the structure of multiple equations:m^e mod n_1, m^e mod n_2, ..., m^e mod n_e. CRT solves them simultaneously to givem^e mod (n_1 * ... * n_e), and sincem^e < n_1 * ... * n_eby construction (the moduli are large enough), the modular result ism^eon the integers. One integer e-th root finishes the recovery.Same-padding caveat: Hastad in its raw form requires the plaintext to be literally identical across all e encryptions. If each encryption applies a different linear padding
m_i = a_i * m + b_i, the generalised Hastad / Coppersmith attack still recoversmas long as the padding polynomials are known.
Alternate Solution
Once you recover p and q (either through factoring or the small-exponent attack), use the RSA Calculator on this site to compute d and decrypt the ciphertext in the browser - handling arbitrarily large BigInt values without needing gmpy2 or Python.
Flag
picoCTF{...}
When e=3 and m is lightly padded, m^3 barely exceeds n - iterate k until you find a perfect integer cube root.