Skip to main content
Mod Moved Comments To Chat
Polish
Source Link
fgrieu
  • 150.9k
  • 13
  • 327
  • 631

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't stated which of these these conditions is met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or, testable, or probable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicioussuspiciously low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't stated which of these these conditions is met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or testable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't stated which of these these conditions is met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated, testable, or probable facts to good use. Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspiciously low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

The satement is wrong, so long for using that some n are prime
Source Link
fgrieu
  • 150.9k
  • 13
  • 327
  • 631

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't identified onestated which of these these conditions, nor why it would be is met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or testable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime)(e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't identified one of these conditions, nor why it would be met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or testable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't stated which of these these conditions is met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or testable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

Polish
Source Link
fgrieu
  • 150.9k
  • 13
  • 327
  • 631

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't identified one of these conditions, nor why it would be met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for any RSA-related CTFCTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns you'llto compute. PutTry to put all stated or testable facts to good use (e.g. in the factcase at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools areinclude algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't identified one of these conditions, nor why it would be met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for any RSA-related CTF: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns you'll compute. Put to use the fact that $n_3$, $n_4$, $n_5$ are prime. Basic tools are algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

$n_1$ is a product of two relatively small 128-bit $p$ and $q$ so its easily factorable by a simple database look-up

Hint: use an approximation of the prime-counting function to comfort or challenge that reasoning.

A small public exponent attack should work for $n_3$, $n_4$, and $n_5$

Hint: $e=3$ is questionable if some conditions are met, see this. You haven't identified one of these conditions, nor why it would be met.

Is my hunch (that Fermat factorization will reveal a non-trivial factorization of $n_2$) correct?

You've got a non-quantitative justification of that hunch, which correctly identifies the non-trivial factorization you can hope to get. To decide if that works, quantitatively estimate what's the expected number of steps in the Fermat method, or just try it.

How can I go forward from here?

Hints valid for RSA-related CTFs: Write relations between unknowns as formulas. Estimate the expected bit size of unknowns. Try to identify a path towards a solution, as the sequence of unknowns to compute. Try to put all stated or testable facts to good use (e.g. in the case at hand: that $n_3$, $n_4$, $n_5$ are prime). Basic tools include algebra, the FLT and the CRT (plus, in some advanced cases, Copersmith's theorem). Show us your progress in the question if you hope for more hints.

Does the suspicious low public exponent encryption of $n_3$, $n_4$, and $n_5$ have anything to do with factoring $n_2$?

You don't present any argument towards this. And $e=3$ is not used in conjunction with $n_2$. On top of it, breaking poorly devised RSA encryption with whatever odd public exponent leads to factoring the modulus as a byproduct only when it's recovered a private exponent, or exploited the implementation, or the plaintext somewhat helps the factorization.

Polish
Source Link
fgrieu
  • 150.9k
  • 13
  • 327
  • 631
Loading
Source Link
fgrieu
  • 150.9k
  • 13
  • 327
  • 631
Loading