⚙️ Configuration
Generating cryptographically secure keys...
📚 RSA Cryptography Overview
How RSA Works:
- Key Generation: Select two large prime numbers (p and q), compute n = p × q
- Public Key: Consists of the modulus (n) and public exponent (e, typically 65537)
- Private Key: Consists of the modulus (n) and private exponent (d)
- Encryption: Anyone can encrypt with the public key: C = M^e mod n
- Decryption: Only the private key holder can decrypt: M = C^d mod n
Key Size Recommendations:
- 512 bits: Educational only - Can be factored quickly
- 1024 bits: Deprecated - No longer considered secure
- 2048 bits: Current industry standard for most applications
- 4096 bits: High security applications, government use
Real-World Applications:
- SSL/TLS: Securing HTTPS web connections
- Email Security: PGP/GPG encryption and signing
- Digital Signatures: Verifying document authenticity
- SSH: Secure remote server access
- Code Signing: Verifying software integrity