tanszek:oktatas:techcomm:breaking_rsa
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:techcomm:breaking_rsa [2024/10/07 15:12] – knehez | tanszek:oktatas:techcomm:breaking_rsa [2024/11/26 08:23] (current) – [Example: Breaking RSA if we find \( p \) and \( q \)] knehez | ||
---|---|---|---|
Line 36: | Line 36: | ||
To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \). | To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \). | ||
- | #### Step 2: Factor \( N \) | + | === Step 2: Factor \( N \) === |
We need to factor \( N = 55 \): | We need to factor \( N = 55 \): | ||
* \( p = 5 \) | * \( p = 5 \) | ||
Line 94: | Line 94: | ||
So, the original **message** \( m = 2 \). | So, the original **message** \( m = 2 \). | ||
- | ### Summary: | + | === Summary: |
* We started with the public key \( (e = 17, N = 55) \) and a ciphertext \( C = 18 \). | * We started with the public key \( (e = 17, N = 55) \) and a ciphertext \( C = 18 \). | ||
* After factoring \( N \) into \( p = 5 \) and \( q = 11 \), we calculated \( \phi(N) = 40 \) and found the private key \( d = 33 \). | * After factoring \( N \) into \( p = 5 \) and \( q = 11 \), we calculated \( \phi(N) = 40 \) and found the private key \( d = 33 \). |
tanszek/oktatas/techcomm/breaking_rsa.1728313930.txt.gz · Last modified: 2024/10/07 15:12 by knehez