Points: 350
Cryptography
Dr. Xernon made the mistake of rolling his own crypto.. Can you find the bug and decrypt the message? Connect with
nc 2018shell1.picoctf.com 6262
.
Just try the first thing that comes to mind.
The first thing that comes to mind is to factorise n, to get the totient, and generate the private key. We use msieve as our factorising tool.
Just factorise the primes, and get p and q. A Python script is needed to decrypt the ciphertext and get the flag
Working solution solve.py
picoCTF{us3_l@rg3r_pr1m3$_2711}