With RSA, intially we start with two random prime numbers (\(p\) and \(q\) and then generate the modulus \(N=p.q\). With our RSA key, there are a number of formats that can be used for the keys. ![]() We can also sign data with the private key, and prove the signature with the public key. The public key can be used to encrypt data, and the private key to decrypt it. With RSA, we generate a private key and a public key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |