Public-Key Crypto
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Most CTF hard crypto ends up here: RSA, ECC/ECDSA, lattices, and bad randomness.
Recommended tooling
- SageMath (LLL/lattices, modular arithmetic): https://www.sagemath.org/
- RsaCtfTool (Swiss-army knife): https://github.com/Ganapati/RsaCtfTool
- factordb (quick factor checks): http://factordb.com/
RSA
Start here when you have n,e,c and some extra hint (shared modulus, low exponent, partial bits, related messages).
ECC / ECDSA
If signatures are involved, test nonce problems first (reuse/bias/leaks) before assuming hard math.
ECDSA nonce reuse / bias
If two signatures reuse the same nonce k, the private key can be recovered.
Even if k isn’t identical, bias/leakage of nonce bits across signatures can be enough for lattice recovery (common CTF theme).
Technical recovery when k is reused:
ECDSA signature equations (group order n):
r = (kG)_x mod ns = k^{-1}(h(m) + r*d) mod n
If the same k is reused for two messages m1, m2 producing signatures (r, s1) and (r, s2):
k = (h(m1) - h(m2)) * (s1 - s2)^{-1} mod nd = (s1*k - h(m1)) * r^{-1} mod n
Invalid-curve attacks
If a protocol fails to validate that points are on the expected curve (or subgroup), an attacker may force operations in a weak group and recover secrets.
Technical note:
- Validate points are on-curve and in the correct subgroup.
- Many CTF tasks model this as “server multiplies attacker-chosen point by secret scalar and returns something.”
Tooling
- SageMath for curve arithmetic / lattices
ecdsaPython library for parsing/verification
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.


