tanszek:oktatas:techcomm:breaking_rsa
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
tanszek:oktatas:techcomm:breaking_rsa [2024/10/07 15:12] – [Step 5: Decrypt the Ciphertext] knehez | tanszek:oktatas:techcomm:breaking_rsa [2024/11/26 08:23] (current) – [Example: Breaking RSA if we find \( p \) and \( q \)] knehez | ||
---|---|---|---|
Line 36: | Line 36: | ||
To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \). | To break the RSA encryption, we need to find the **private key** \( d \). This requires us to factor \( N \) into its prime factors \( p \) and \( q \). | ||
- | #### Step 2: Factor \( N \) | + | === Step 2: Factor \( N \) === |
We need to factor \( N = 55 \): | We need to factor \( N = 55 \): | ||
* \( p = 5 \) | * \( p = 5 \) |
tanszek/oktatas/techcomm/breaking_rsa.1728313940.txt.gz · Last modified: 2024/10/07 15:12 by knehez