![]() ![]() So, 'c' is the ciphertext, 'd' is the private exponent, 'N' is the modulus and 'm' is supposed to contain the plaintext hex bytes. The tool 'xxd' created the hexdump and inserted line breaks I think. ![]() This created a hex dump of the file called 'encrypted.hex'. The RSA cryptosystem is one of the first public-key cryptosystems, based on the math of the modular exponentiations and the computational difficulty of the RSA problem and the closely related integer factorization problem (IFP). Openssl rsa -pubin -inform PEM -text -noout encrypted.hex ![]() After working hard and long, I have been able to extract the private exponent from the public key since the modulus was small: I have an encrypted file that I am trying to decode as part of an experiment. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |