Alice forms her public and private keys as follows:
Chooses large primes and , then form .
Chooses e coprime with .
Publishes as her public key.
Computes private key such that .
To encrypt a message (where ) the user Bob forms .
To decrypt the message, Alice forms .
This recovers message because:
So and similarly, so by the Chinese remainder theorem, , and since we know we know that .
|Date of creation||2013-03-22 15:14:50|
|Last modified on||2013-03-22 15:14:50|
|Last modified by||aoh45 (5079)|