$parameter_n[1], 'k' => $counter_k, 'a' => $counter_a); $uri = 'https://asecuritysite.com/encryption/copper'; $proxy = ''; $header_flag = TRUE; $result = curl_post_form($header, $data, $uri, $proxy, $header_flag); if (preg_match ('/Value is prime/', $result) == 1) { echo $result; } } } /* https://asecuritysite.com/encryption/copper p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 0 a = 1 p = 65537 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 1 a = 10 p = 962947420735983928518670875997352257334993136848407386541772594119 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 2 a = 8 p = 1925894841471967854113892432142592765907101254833416721965967128461 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 3 a = 10 p = 2888842262207951782632563307799621115727831398060833537373699576659 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 3 a = 12 p = 2888842268486202984677183224410114807785901996516180457699983627091 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 4 a = 9 p = 3851789682943935708227807167412464479039489461283912713252897189657 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 4 a = 12 p = 3851789689222186911734129440311249236982321127122393533115947118361 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 7 a = 1 p = 6740631945151887489398623511307941004374933914243491527911744504427 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 7 a = 11 p = 6740631945151983286447672237135743722099581008932059780062917853803 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 8 a = 1 p = 7703579365887871416455569727209075433571353044849704603327707995697 p = k * M + (65537^a mod M) n = 39 M = 962947420735983927056946215901134429196419130606213075415963491270 k = 8 a = 3 p = 7703579365887871416455569727209075433571353044849704884815569739313 https://www.mobilefish.com/services/rsa_key_generation/rsa_key_generation.php phi(n) = (p - 1) * (q - 1) phi(n) = 14e6e6e84a6c9bc76fcd3e57153c4eb8069b4a417024e38cc40c7cad483421d8d46903b67e137fe19997b0afcf43d17967663b7757574900 n = p * q (modulus) n = 14e6e6e84a6c9bc76fcd3e57153c4eb8069b4a417024e38cc40c7cadda80dc43be06fdbec34b7aadee2c3ea0918171be4031f98934d10561 (decimal: 59345135046533379070949212431851844835352661985729183720911732659737228034511329429220576921531616803463218368738626766508388015736161) e = (publicExponent) e = 10001 (decimal: 65537) d = e^-1 mod phi (privateExponent) d = 10764b26687761b991b47484e194bdeaf2491c12ade05fd75e10f7a1025d0ccb597fdc0cbeff5c98b1ff66891114b8c685495f4c7edda001 p = (prime1) p = 49265d3574cefd04229bfd662a4a46f8611ed0226c665f0a6ebdde31 (decimal: 7703579365887871416455569727209075433571353044849704884815569739313) (n = 39, k = 8, a = 3) q = (prime2) q = 49265d3574cefd04229bfd662a4a46f8611ed0226c655f076ebbde31 (decimal: 7703579365887871416455569727209075433571353044849704603327707995697) (n = 39, k = 8, a = 1) dP = d mod (p - 1) (exponent1) dP = 2646c9dd2ffb23902760028f942f7bc57a647a3a990854510c3393f1 dQ = d mod (q - 1) (exponent2) dQ = 2646c9dd2ffb23902760028f942f7bc57a647a3a9907ce5b004993f1 qlnv = q^-1 mod p (coefficient) qlnv = 23c7b4c478c1d3174522a8362a1536f33b637a1bfc32fef67f732fe0 public_key_vulnerable_generated.txt (hex ASN.1) 3054300d06092a864886f70d0101010500034300304002390014e6e6e84a6c9bc76fcd3e57153c4eb8069b4a417024e38cc40c7cadda80dc43be06fdbec34b7aadee2c3ea0918171be4031f98934d105610203010001 public_key_vulnerable_generated.txt (base64 ASN.1) MFQwDQYJKoZIhvcNAQEBBQADQwAwQAI5ABTm5uhKbJvHb80+VxU8TrgGm0pBcCTjjMQMfK3agNxDvgb9vsNLeq3uLD6gkYFxvkAx+Yk00QVhAgMBAAE= https://tools.ietf.org/html/rfc8017 IETF RFC 8017 RSAPublicKey ::= SEQUENCE { modulus INTEGER, -- n publicExponent INTEGER -- e } RSAPrivateKey ::= SEQUENCE { version Version, modulus INTEGER, -- n publicExponent INTEGER, -- e privateExponent INTEGER, -- d prime1 INTEGER, -- p prime2 INTEGER, -- q exponent1 INTEGER, -- d mod (p-1) exponent2 INTEGER, -- d mod (q-1) coefficient INTEGER, -- (inverse of q) mod p otherPrimeInfos OtherPrimeInfos OPTIONAL } ?>