Chapter 8: Problem 27
Alice and Bob use RSA public key encryption in order to communicate between them. Trudy finds out that Alice and Bob shared one of the primes used to determine the number \(n\) of their public key pairs. In other words, Trudy found out that \(n_{a}=p_{a} \times q\) and \(n_{b}=p_{b} \times q\). How can Trudy use this information to break Alice's code?
Short Answer
Step by step solution
Key Concepts
These are the key concepts you need to understand to accurately answer the question.