User Tools

Site Tools


tanszek:oktatas:techcomm:breaking_rsa

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
tanszek:oktatas:techcomm:breaking_rsa [2024/10/07 15:12] – [Step 5: Decrypt the Ciphertext] kneheztanszek:oktatas:techcomm:breaking_rsa [2024/11/26 08:23] (current) – [Example: Breaking RSA if we find \( p \) and \( q \)] knehez
Line 36: Line 36:
 To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \). To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \).
  
-#### Step 2: Factor \( N \)+=== Step 2: Factor \( N \) ===
 We need to factor \( N = 55 \): We need to factor \( N = 55 \):
   * \( p = 5 \)   * \( p = 5 \)
tanszek/oktatas/techcomm/breaking_rsa.1728313940.txt.gz · Last modified: 2024/10/07 15:12 by knehez