A multi-attack RSA tool for CTF challenges that decrypts data from weak public keys and recovers private keys.
RsaCtfTool is a Python-based multi-attack utility designed to break RSA encryption by exploiting weak public keys. It decrypts ciphertext and recovers private keys using a variety of factorization algorithms and cryptanalytic attacks, primarily for CTF challenges and educational exploration of RSA vulnerabilities.
CTF players, cryptography students, and security researchers who need to analyze or break RSA implementations in controlled environments like capture-the-flag competitions.
Developers choose RsaCtfTool for its comprehensive collection of RSA attacks in one tool, ease of use via command-line interface, and focus on CTF-specific scenarios, making it a go-to solution for educational cryptography challenges.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Implements multiple factorization methods like Fermat, Pollard Rho, and ECM, plus cryptanalytic attacks such as Wiener's and Boneh-Durfee, providing a one-stop solution for diverse RSA weaknesses.
Includes support for novelty primes, past CTF primes, and integration with Z3 and Wolfram Alpha, directly targeting common challenge patterns in competitions.
Can create public keys from n and e, convert SSH keys to PEM, and check for ROCA vulnerability, enhancing utility in various CTF and educational scenarios.
Offers batch processing of multiple keys and options to send results to FactorDB, streamlining the process for handling multiple challenges efficiently.
Only supports RSA with two prime factors (semiprime), as stated in the README, so it cannot attack multiprime RSA or other variants used in some implementations.
Requires SageMath for optimal performance and relies on external tools like msieve for advanced factorization, complicating setup and increasing resource overhead.
Designed primarily for educational and CTF contexts, so it is ineffective against properly generated, secure RSA keys used in real-world applications, as admitted in the README.