-
Notifications
You must be signed in to change notification settings - Fork 44
/
Copy pathsolve.py
13 lines (8 loc) · 1.06 KB
/
solve.py
1
2
3
4
5
6
7
8
9
10
11
12
13
#!/usr/bin/python
from gmpy2 import *
from wienerAttack.RSAwienerHacker import *
N = 123011419727242929605859484379712787224119427868122185028414426038747211967728126687082223191959583800124030930442533997557997625495312608148837196827665382944411142837816321635710707548473070155845149369804586838545770200114861944189730393681376431146673015470955622822572616394605670811484761576817673309001
C = 87973714357981711192552122844931994201928929629523523402698449229349318496325838631069992408358538609456707487292932430988908376333690020467856573339571710564864261213347859858094994302558444565941871798549199610810852463994468365272979667205962334739912686073389255122096601393196371860158722056997802747144
E = 20370827750732677953101194500404700852089173301382884082478321647291201786559551992537091540692087873762090234342322985115231826746732803397154738501467143140654322623572067396058860233911575260540468106570172920030157403146163826401598627492164762337650828047117823273414399019740348998847585859920303350373
d = hack_RSA(E, N)
print hex(powmod(C, d, N))[2:].decode('hex')