RSA Public-Key Flow

Watch how number theory turns two primes into a working public/private key pair.

RSA relies on the difficulty of factoring large composites. With a toy example we can safely explore the complete lifecycle: generating keys, encrypting a secret, decrypting it, and producing a signature. Advance through the timeline to see each calculation unfold on the shared modulus n = 3233.

Core Values

Key Material

Public key
(e, n) = (17, 3233)
Private key
(d, n) = (2753, 3233)
Message
m = 65 ("A")