Next:
Factoring Given
Up:
Public-Key Cryptography
Previous:
Some Complete Examples
Contents
Index
Attacking RSA
Suppose Nikita's
public key is
and her decryption key is
, so
. If somehow we compute the factorization
, then we can compute
and hence compute
. Thus if we can factor
then we can break the corresponding RSA public-key cryptosystem.
Subsections
Factoring
Given
When
and
are Close
Factoring
Given
Further Remarks
William 2007-06-01