An RSA Cipher Challenge

--

The RSA encryption method has been around for nearly 40 years, and uses a public and a private key. If Alice sends an encrypted message to Bob, she will use his public key and encrypt it to ciphertext. Bob then receives this, and decrypts the message with his private key. So for all the budding Cybersecurity wizards, here is a little challenge…

Bob generates an RSA key pair, and gets the following keys:

-----BEGIN RSA PRIVATE KEY-----
MIICXgIBAAKBgQDoIhiWs15X/6xiLAVcBzpgvnuvMzHBJk58wOWrdfyEAcTY10oG
+6auNFGqQHYHbfKaZlEi4prAoe01S/R6jpx8ZqJUN0WKNn5G9nmjJha9Pag28ftD…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.