Photo by Dragonfly Ave on Unsplash

Hazmat, Python and RSA Encryption

RSA has survived over 40 years and is still used in many applications. With public-key encryption, we generate a key pair: a public key and a private key. If Bob wants to encrypt something for Alice, he will use her public key to encrypt the data, and then she will use her private key to decrypt it. In this case, we will use RSA encryption and use a public key to encrypt, and a private key to decrypt. Overall, in RSA, we generate…

--

--

--

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Coforma Teams with Shift5 to Advance Cyberattack Defense Product Design

A computer illustration of hardware diagrams, and diagnostics overlaid an image of a control board.

A Quick Guide on How To Delete an iCloud Account Without Password

HIPAA Compliance: What You Need To Know!

Securing Ends with Data Encryption for the Cloud

Five Measures to Make Alibaba Cloud Storage More Secure

$FIWA listing on PancakeSwap and KyberDMM today at 10:00 AM UTC

GDPR for Small Business Owners in North America

Moving Beyond Social Security Numbers Part 1: Claiming Your Unique, Digital Identity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

The Tensions Around The RSA Method

An Nginx/Apache Alternative for C2 Redirecting

Stream a Pi Camera to Oracle Cloud

The comments feature of Google Docs has been used for spear-phishing attacks