84 words
1 minute
Prime Suspects

Prime Suspects#

The suspect encrypted a message using a suspiciously weak RSA setup. Can you uncover what they were trying to hide?

We’ve recovered the following:

n = 102064367305175623005003367803963735992210717721719563218760598878897771063019 e = 65537 c = 66538583650087752653364112099322882026083260207958188191147900019851853145222

Decrypting#

First we look up n on factor.db and we find out that it already factored

Since n=p*q, This gives us p=305875545128432734240552595430305723491 and q=333679396508538352589365351078683227609

If we have both p and q we can easily decrypt our message c

Now we can just look up any RSA decrypter and get our flag by plugging in our values: SVUSCG{sm4ll_pr1m3s}