Level - Hard
Description:
[rsa5.txt]
p = 7178876958634653777731766746331570801087078598979323678722571773250226897596843663658886727760181155918742651585369954973310114397150915147874204166363477
q = 7048941806937289699817013888952484018046084829080892293214556888827368433937252692440447392040590638763680127233293725642661273304549490508896727339216371
This problem requires that you exploit the "same modulus" attack, where a single message is encrypted twice with the same modulus but different e
values. See solve.py
for solution.
Flag - byuctf{NEVER_USE_SAME_MODULUS_WITH_DIFFERENT_e_VALUES}