Skip to content

Commit

Permalink
Fix link
Browse files Browse the repository at this point in the history
  • Loading branch information
shhossain authored Feb 2, 2024
1 parent b7c09f5 commit 49a327e
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions Cryptography/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,15 +34,15 @@ Hash functions are used to map data of arbitrary size to data of fixed size. The
3. [Playfair Cipher](notadded)
4. [DES](notadded)
5. [AES](notadded)
6. [RSA](##RSA (Rivest-Shamir-Adleman))
6. [RSA](#rsa-rivest-shamir-adleman)
7. [Diffie-Hellman Key Exchange](notadded)
8. [ElGamal](notadded)
9. [Digital Signature Algorithm](notadded)
10. [Elliptic Curve Cryptography](notadded)

## RSA (Rivest-Shamir-Adleman)
**IMPORTANT NOTE**:
1. Do not implement techniques like these yourself in an enviroment, that can hurt you in any kind of way.
1. Do not implement techniques like these yourself in an environment, that can hurt you in any kind of way.
2. The shown RSA method is already broken! This guide aims to give you a basic understanding of the algorithm.
Broken down, the RSA method is nothing more than the multiplicative inverse within a residue class ring.
This means that the task is to find an inverse modulo the Eulerian phi function of a high integer n that is difficult to compute.
Expand Down

0 comments on commit 49a327e

Please sign in to comment.