Talk:RSA code: Difference between revisions

m
Line 46:
: [http://www.willamette.edu/~mjaneba/rsa129.html RSA 129 factors]
: [[wp:The_Magic_Words_are_Squeamish_Ossifrage|The RSA 129 text "The Magic Words are Squeamish Ossifrage"]]
: [[http://www.math.okstate.edu/~wrightd/numthry/rsa129.html summaries of rsa 129 status reports and full details of keys (see below)]
: [http://www.math.okstate.edu/~wrightd/crypt/crypt-intro/node21.html More info on the challenge text and signature]
: [[wp:Modular_exponentiation|Modular exponentiation]] will challenge any naive implementation of RSA. Your bignums may blow up decrypting the message above. This would be a worthy prerequisite task.
: The RSA 129 blocking was to encode " "=0, A=1,.. Z=26 and encode them by 100's so that 200805 was THE.
 
-[[User:Dgamey|Dgamey]] 15:56, 22 April 2011 (UTC) update: --[[User:Dgamey|Dgamey]] 1901:2019, 2426 April 2011 (UTC)
 
==== Question for the task author and other editors ====
Anonymous user