diff --git a/README.md b/README.md index 94f7c05a..c3e51f32 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,12 @@ -# RsaCtfTool +# Crown Sterling: Semi Prime Factorization -[![GitHub issues](https://img.shields.io/github/issues/Ganapati/RsaCtfTool.svg)](https://github.com/Ganapati/RsaCtfTool/issues) -[![GitHub forks](https://img.shields.io/github/forks/Ganapati/RsaCtfTool.svg)](https://github.com/Ganapati/RsaCtfTool/network) -[![GitHub stars](https://img.shields.io/github/stars/Ganapati/RsaCtfTool.svg)](https://github.com/Ganapati/RsaCtfTool/stargazers) -[![Rawsec's CyberSecurity Inventory](https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat.svg)](https://inventory.rawsec.ml/tools.html#RsaCtfTool) -[![GitHub license](https://img.shields.io/github/license/Ganapati/RsaCtfTool.svg)](https://github.com/Ganapati/RsaCtfTool) +Code samples to support the white paper "**Novel Geometric Methods for Semiprime Factorization"** + +Get started with this example as used in the public demonstration: + + ./RsaCtfTool.py --publickey ./examples/siqs.pub --private + +**Details** RSA tool for ctf - uncipher data from weak public key and try to recover private key Automatic selection of best attack for the given public key