The writeup for "ezRSA" from Ramadan CTF 2026 details a cryptography challenge involving RSA decryption without quantum computing. Here's a summary of key points:
-
Challenge Overview: The problem involves decrypting an RSA ciphertext with a given public exponent (e) and modulus (n), but the quantum computing hint is misleading.
-
Solution Approach:
- Fermat Factorization: Initially attempted, but not applicable here.
- Wiener's Attack: Exploits small private key (d). The writeup shows how to implement this using continued fractions and checking if derived p and q factors multiply back to n.
- Pollard's p-1 Algorithm: Another factorization method tried when Wiener fails.
- FactorDB Query: Checks an online database for precomputed factorizations of the modulus.
-
Key Takeaways:
- Quantum computing is a red herring in this challenge context.
- Implementation weaknesses (like small d) can break RSA regardless of key size.
- Systematically escalate attacks from simple to complex methods.
- Use automated tools like RsaCtfTool for efficiency.
-
Flag: Not explicitly shown
Read the full article at InfoSec Write-ups - Medium
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



