Why I Do Cyber Security Research … The Sheer Joy of Cracking Puzzles!

--

I have a short journey into work on a bus, so I always try to have a “bus paper”, and which is a normally research paper which I can dip into. For some reason my best learning is done on the bus into work in the morning (and not so much on the trip back in the evening). But for a change this week, I focused on this blog post [here]:

And so the author tackles the cracking of RSA in such an engaging way. He sets up the problem beautifully, and then poses a question that is unanswered. Finally, he follows through with a workable solution. Basically it is cybersecurity problem solving in a nutshell.

So, I’m not going to cover the basics of the RSA method, but, if you are interested in cracking your own simple examples, here is how it is done:

In RSA, we generate two prime numbers (p and q) and multiply them to give N (the modulus). This becomes part of…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.