RSA cryptosystem - discrete secret primes

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
-1
down vote

favorite












Why do we bother to take $n$ as a product of two secret primes in RSA cryptosystem? If $e$ is public, $d$ is private and prime factorization of $n$ is not secret, what would happen?







share|cite|improve this question

























    up vote
    -1
    down vote

    favorite












    Why do we bother to take $n$ as a product of two secret primes in RSA cryptosystem? If $e$ is public, $d$ is private and prime factorization of $n$ is not secret, what would happen?







    share|cite|improve this question























      up vote
      -1
      down vote

      favorite









      up vote
      -1
      down vote

      favorite











      Why do we bother to take $n$ as a product of two secret primes in RSA cryptosystem? If $e$ is public, $d$ is private and prime factorization of $n$ is not secret, what would happen?







      share|cite|improve this question













      Why do we bother to take $n$ as a product of two secret primes in RSA cryptosystem? If $e$ is public, $d$ is private and prime factorization of $n$ is not secret, what would happen?









      share|cite|improve this question












      share|cite|improve this question




      share|cite|improve this question








      edited yesterday









      David G. Stork

      7,3102728




      7,3102728









      asked yesterday









      ChakSayantan

      526




      526




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          1
          down vote













          I'm referring to https://simple.wikipedia.org/wiki/RSA_algorithm



          If anybody knows the factorization of $n$, they can effectively calculate $phi(n)$ (Euler totient function) and then with the knowledge of the public key $e$ do step 5 from the linked website themselves effectively. So they have the private key $d$ and can now do everything the 'rightful' owner of the private key can do.






          share|cite|improve this answer





















            Your Answer




            StackExchange.ifUsing("editor", function ()
            return StackExchange.using("mathjaxEditing", function ()
            StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
            StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
            );
            );
            , "mathjax-editing");

            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "69"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: true,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );








             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fmath.stackexchange.com%2fquestions%2f2872684%2frsa-cryptosystem-discrete-secret-primes%23new-answer', 'question_page');

            );

            Post as a guest






























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            1
            down vote













            I'm referring to https://simple.wikipedia.org/wiki/RSA_algorithm



            If anybody knows the factorization of $n$, they can effectively calculate $phi(n)$ (Euler totient function) and then with the knowledge of the public key $e$ do step 5 from the linked website themselves effectively. So they have the private key $d$ and can now do everything the 'rightful' owner of the private key can do.






            share|cite|improve this answer

























              up vote
              1
              down vote













              I'm referring to https://simple.wikipedia.org/wiki/RSA_algorithm



              If anybody knows the factorization of $n$, they can effectively calculate $phi(n)$ (Euler totient function) and then with the knowledge of the public key $e$ do step 5 from the linked website themselves effectively. So they have the private key $d$ and can now do everything the 'rightful' owner of the private key can do.






              share|cite|improve this answer























                up vote
                1
                down vote










                up vote
                1
                down vote









                I'm referring to https://simple.wikipedia.org/wiki/RSA_algorithm



                If anybody knows the factorization of $n$, they can effectively calculate $phi(n)$ (Euler totient function) and then with the knowledge of the public key $e$ do step 5 from the linked website themselves effectively. So they have the private key $d$ and can now do everything the 'rightful' owner of the private key can do.






                share|cite|improve this answer













                I'm referring to https://simple.wikipedia.org/wiki/RSA_algorithm



                If anybody knows the factorization of $n$, they can effectively calculate $phi(n)$ (Euler totient function) and then with the knowledge of the public key $e$ do step 5 from the linked website themselves effectively. So they have the private key $d$ and can now do everything the 'rightful' owner of the private key can do.







                share|cite|improve this answer













                share|cite|improve this answer



                share|cite|improve this answer











                answered yesterday









                Ingix

                2,075125




                2,075125






















                     

                    draft saved


                    draft discarded


























                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fmath.stackexchange.com%2fquestions%2f2872684%2frsa-cryptosystem-discrete-secret-primes%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Comments

                    Popular posts from this blog

                    What is the equation of a 3D cone with generalised tilt?

                    Color the edges and diagonals of a regular polygon

                    Relationship between determinant of matrix and determinant of adjoint?