Member-only story

When Students Fix Crypto Bugs, You Have Great Students

Prof Bill Buchanan OBE FRSE
3 min readMar 2, 2025

--

Every teacher thinks they have the best students, and on our Applied Cryptography module, we have some amazing students.

So I set a challenge of:

Bob has used the RSA method with three different moduli to encrypt the same message for Alice. These modulus values are 1594022851, 1608005621, and 2695456781. The corresponding ciphered values are 947692931, 369611262, and 1596261156. Determine the English town.

The generator for this is here:

And, diligently one of our students set about the problem, and was left puzzled:

“Hmm, been trying this aswell, I didn’t go with the CRT approach initially, since the moduli are small I could easily factorise into p & q, then select the lowest common value for the public exponent e (which is 5 as it turns out, 3 won’t work for the second and third, 5 works for all i.e., an inverse exists). Ok, decrypting with these gives gobbldygook, I can't be sure what public key was used — when I try the CRT it won't work (because the assumption is that e = 3 ). When I…

--

--

Prof Bill Buchanan OBE FRSE
Prof Bill Buchanan OBE FRSE

Written by Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.

No responses yet