Skip to content
logo
Defence blues
RSA Common modulus
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans
    • Blue team @Purpleteaming
      • In the beginning …
      • Middle ground
        • Persistence
        • Buffer overflows
        • Reverse engineering
        • Steganography
        • Cryptanalysis
          • Cryptanalysis notes
          • Root-me cryptanalysis challenges
            • Old tricks, new treats: Unmasking classical ciphers
            • AES challenges
            • Riding the currents: Stream cipher exploits
            • Unlocking RSA: Asymmetric mischief
              • RSA Factorisation
              • RSA Decipher oracle
              • RSA Continued fractions
              • RSA Common modulus
                • Resources
              • RSA Multiple recipients
            • Curves ahead: Navigating elliptic curve cryptography
            • The raccoon’s secret recipes for digital mischief
        • Evasion
      • End of story
    • Blue team @SOC
    • Blue team for dev
    • Blue team @Home
    • Bulletproofing servers
    • Resources

    RSA Common modulus¶

    RootMe Challenge: Arithmetic Power: A message was sent by a company to two of its engineers, but they were negligent in the choice of the keys of its employees. Decrypt the sent message.

    Extended GCD algorithm and Bezout’s identity.

    Resources¶

    • Bézout’s Identity - Theorem of the day

    • PGCD PGCM - Théorèmes de Bézout et de Gauss

    • Bézout’s identity - euclidean algorithm

    2026-03-25 20:00
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7