'''rsa3-->c1,c2,e1,e2 公共模数攻击'''标签:脚本,gmpy2,pow,rsa,模数,c2,c1,e1,e2 From: https://www.cnblogs.com/shadowkillnet/p/17754457.html
from Crypto.Util.number import *
import gmpy2
'''
c1 = pow(m, e1, N)
c2 = pow(m, e2, N)
'''
'''
m = pow(c1, d1, N)
m = pow(c2, d2, N)
'''
c1=
n=
e1=
c2=
e2=
s = gmpy2.gcdext(e1, e2)
s1 = s[1]
s2 = -s[2]
c2 = gmpy2.invert(c2, n)
m = (pow(c1,s1,n) * pow(c2,s2,n)) % n
print(long_to_bytes(m))