<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>RSA on Aditya Telange</title><link>https://adityatelange.in/writeups/cryptohack/rsa/</link><description>Recent content in RSA on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo</generator><language>en</language><copyright>2026 Aditya Telange</copyright><lastBuildDate>Fri, 20 May 2022 00:00:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/writeups/cryptohack/rsa/index.xml" rel="self" type="application/rss+xml"/><item><title>Cryptohack - RSA Starter 1 [10 pts]</title><link>https://adityatelange.in/writeups/cryptohack/rsa/rsa-starter-1/</link><pubDate>Fri, 20 May 2022 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/cryptohack/rsa/rsa-starter-1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;The Solution is shared considering &lt;a href="https://cryptohack.org/faq/#solutions"&gt;CAN I SHARE MY SOLUTIONS?&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="problem"&gt;Problem&lt;/h2&gt;
&lt;p&gt;All operations in RSA involve &lt;a href="https://en.wikipedia.org/wiki/Modular_exponentiation"&gt;modular exponentiation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Modular exponentiation is an operation that is used extensively in cryptography and is normally written like: &lt;code&gt;2&lt;sup&gt;10&lt;/sup&gt; mod 17&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;You can think of this as raising some number to a certain power (&lt;code&gt;2&lt;sup&gt;10&lt;/sup&gt; = 1024&lt;/code&gt;), and then taking the remainder of the division by some other number (&lt;code&gt;1024 mod 17 = 4&lt;/code&gt;). In Python there&amp;rsquo;s a built-in operator for performing this operation: &lt;code&gt;pow(base, exponent, modulus)&lt;/code&gt;&lt;/p&gt;</description></item></channel></rss>