Description
The service prints the RSA modulus N, public exponent e, and the encrypted flag. Because N is even (one prime is 2), phi(N) collapses to q − 1, letting us recover the private key instantly.
Setup
Connect to `verbal-sleep.picoctf.net 51434` and copy the N, e, and ciphertext values you receive.
Plug those numbers into a short Python script that factors N/2, builds phi, and decrypts the ciphertext.
nc verbal-sleep.picoctf.net 51434python3 - <<'PY'
from Crypto.Util.number import long_to_bytes
N = 17537614138261784213928370696328752813986709042120259741743863531969271925248508130709263987579968737098825108090143054462035829031497144145084077726439478
e = 65537
c = 1862202474168637121872319135644317889384481444154089212360721245109801826108338981069221317033529716486407831083567338102494200390951480362472079543955817
q = N // 2
phi = q - 1
d = pow(e, -1, phi)
m = pow(c, d, N)
print(long_to_bytes(m).decode())
PYSolution
- Step 1Capture the challenge outputEach netcat connection emits a fresh set of RSA parameters. Grab N, e, and the ciphertext before disconnecting. N always divides evenly by 2, so you only need one large odd factor q = N / 2.
Learn more
RSA relies on the computational difficulty of factoring the product of two large prime numbers. The modulus
N = p × qis public, but recoveringpandqindividually fromNalone should be computationally infeasible when both primes are large (typically 1024 bits or more each). The security breaks down completely when one of the primes is small or trivially guessable.In this challenge, one prime is literally
2- the smallest prime. Checking divisibility by 2 is as simple as looking at the last digit or testingN % 2 == 0. This makes factoring N trivial:p = 2,q = N / 2. An even modulus is an immediate red flag in any RSA implementation because it means one prime was 2.Proper RSA key generation uses cryptographically secure random prime generation algorithms (like the Miller-Rabin primality test with high iteration counts) that always produce odd primes significantly larger than 3. Libraries like OpenSSL, Python's
cryptographypackage, and pycryptodome handle this correctly. Rolling your own RSA key generation is strongly discouraged for exactly this reason. - Step 2Exploit the even modulusBecause p = 2, Euler's totient is simply φ(N) = (2 − 1) × (q − 1) = q − 1. Invert e modulo φ(N) to obtain the private exponent d and run a modular exponentiation to recover the plaintext.
d = pow(e, -1, q - 1)m = pow(ciphertext, d, N)Learn more
Euler's totient function φ(N) counts the integers from 1 to N that are coprime to N. For a product of two distinct primes, φ(N) = (p − 1)(q − 1). RSA private key generation requires computing φ(N) to find the modular inverse of the public exponent e. With p = 2, the totient simplifies to (2−1)(q−1) = q−1, a value that is directly computable from the public modulus.
Python 3.8+ supports
pow(e, -1, m)for modular inverse computation using the extended Euclidean algorithm. This is equivalent to finding d such thate × d ≡ 1 (mod φ(N)), which is the RSA private exponent. The modular inverse exists only whengcd(e, φ(N)) = 1; standard RSA public exponents like 65537 are chosen specifically because they are prime and likely coprime to φ(N).The decryption operation
m = pow(c, d, N)performs modular exponentiation efficiently using Python's built-in three-argumentpow, which uses the square-and-multiply algorithm. For large RSA numbers this is much faster than naive exponentiation, completing in milliseconds even for 2048-bit moduli. - Step 3Convert the integer to bytesUse `Crypto.Util.number.long_to_bytes` (from pycryptodome) to transform the decrypted integer into ASCII, and the result is the picoCTF flag.
from Crypto.Util.number import long_to_bytesprint(long_to_bytes(m).decode())Learn more
RSA operates on integers modulo N. To encrypt a message, the plaintext is first converted to an integer (using a padding scheme and byte-to-integer conversion), then encrypted. Decryption produces the integer back; recovering the string requires reversing that conversion.
long_to_bytes from pycryptodome interprets the integer as a big-endian sequence of bytes, which is the standard representation. This is the inverse of
int.from_bytes(msg, 'big')in plain Python. In real RSA usage, the plaintext integer would be much smaller than N thanks to OAEP padding, which adds randomness and structure before encryption. Unpadded RSA (textbook RSA) like this challenge is deterministic and vulnerable to several attacks beyond just weak key generation.Pycryptodome (the successor to PyCrypto) provides a comprehensive set of cryptographic primitives for Python, including RSA, AES, hashing, and key derivation. It is a commonly used library in CTF crypto challenges. Install it with
pip install pycryptodome.
Alternate Solution
If you want to skip writing the Python script, paste N, e, and the ciphertext into the RSA Calculator on this site. Since N is even, divide by 2 to get q, set p = 2, and the tool will compute d and decrypt the ciphertext automatically - no local install needed.
Flag
picoCTF{tw0_1$_pr!m38177...}
If the script throws a ValueError, double-check you copied the current N/e/c set. The values change with every connection.