This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network_stuff:cryptography [2024/12/19 21:09] – jotasandoku | network_stuff:cryptography [2024/12/19 21:25] (current) – jotasandoku | ||
|---|---|---|---|
| Line 137: | Line 137: | ||
| * d: Private decryption key (kept secret) | * d: Private decryption key (kept secret) | ||
| * n: The modulus (also public) | * n: The modulus (also public) | ||
| - | * | + | |
| encrypted = (message ^ e) mod n | encrypted = (message ^ e) mod n | ||
| decrypted = (encrypted ^ d) mod n | decrypted = (encrypted ^ d) mod n | ||
| - | There' | + | There' |
| - | (p-1) and (q-1) | + | |
| + | - p and q are like the blueprint for making copies of the key | ||
| + | - n being hard to factor means no one can recreate the blueprint, even though they can see the lock | ||
| [[https:// | [[https:// | ||