Posted comments (22)

Posted by Alfian at October 26, 2011 04:10:44 CEST
thx
Posted by Overmind at November 10, 2011 15:25:09 CET
very useful, i loaded this engine to hushmail and now all my messages use new keys every time. thanks i was sick of just using old AES, im parinod (hence the hushmail) and just wanted something more rigigd that 256 bit
Posted by Permana at August 13, 2012 08:33:46 CEST
hi,

just ask,

in Step 4, Plain Text
why when I enter "TEST" encode in Hexa the result is "7ce7dd7cafff" ?? need explain pls.
Posted by Yclick at September 12, 2012 18:57:14 CEST
why does rsa_keys.txt keys contains leading zero ? (00) ?

Example: Prime1: 00:f7:7d:ae:...

Your tool seems to ignore these leading zero... also why are they existing ?
Posted by Riddhi at September 14, 2012 09:23:46 CEST
Thanks a lot...

But i am confused..Ypu have used 2 Private keys here.. I heard about only 2 keys..1 is Private and 2 is Public..I may be wrong..But Why we need 2 Private keys? Can you Explain please?

I am new in RSA Encryption..

Thanks a lot in Advance.
Posted by Jaime at September 14, 2012 22:42:17 CEST
absolutely amazing!!!!!!!!!!!!!!!!!!!!
Posted by Jithu at September 19, 2012 12:02:31 CEST
Is there any option to get the publik key of this set, I want to encrypte the data from php side and decrypt it using javascript.I have the code to decrypt data, but it works only if the encryption from php side with corresponding public key
Posted by Abel at September 24, 2012 14:36:30 CEST
"Message(m):" may be like "Enter plaintext *:"?

I mean, Is it possible that used to encrypt value (Message M) is the same as PlainText?

Is it possible that I could use my own used to encrypt value (without padding or encoding)??

Thanks a lot!
Posted by Nader Javanmardi at October 3, 2012 07:56:52 CEST
I want to create RSa key for run sstp
Posted by Nader Javanmardi at October 3, 2012 07:58:29 CEST
is it possible that I could use my own used to encrypt value (without padding or encoding)
Posted by Nilesh at January 10, 2013 13:34:25 CET
Hi,

I dumped the .PEM key to .text format. And it shows modulus, public and private exponents, prime1, prime2, exponent1, exponent2 and coefficient. Does that mean my .PEM private key is in Chinese Remainder format?
Posted by Robert Hegler at February 25, 2013 21:54:34 CET
I entered lots of random letters, and the decrypted message did not match. Does anyone know why this happened?
Posted by Codeuniquely at September 13, 2013 13:13:09 CEST
The Base64 values generated for Modulus don;t parse in you own Decode app
Posted by Jorge Caceres at January 19, 2015 17:25:58 CET
It is possible to generate a key pair, public and private key with distinct modulus bitsize length, the public key with 2048 bits and the private with 1024 bits of length?
Posted by Shitsada at March 10, 2015 11:05:32 CET
AMAZING THIS IS SUPER STUFF! THANKS
Posted by Ebu at March 26, 2015 08:16:55 CET
Hi.
How can i convert a string to a number using base64? Please somebody help me.
Thank you in advance
Posted by Anonymous at February 19, 2017 21:39:00 CET
can anyone explain what these different parts are doing?
Posted by Abhinav at June 21, 2017 19:14:34 CEST
I need to do the exact opposite of this. So if I have all of the components, Modulus
Public exponent
Private exponent
First prime
Second prime
First exponent
Second exponent
Coefficient
can how can I get the private key then ?
Posted by Kalpesh R Ramani at September 7, 2018 06:30:34 CEST
Absolutely Amazing.
Posted by Shitnotworking at April 28, 2020 17:41:54 CEST
doesnt work
Posted by Brandon Pierce at May 12, 2020 07:43:44 CEST
openssl genrsa -out rsa_privatekey.pem 1024
openssl rsa -out rsa_keys.txt -text -in rsa_privatekey.pem
Posted by Anonymous at July 31, 2021 00:04:10 CEST
It's not really clear how the hex/decimal in m is decrypted to plaintext. I tried doing it via code, and I get back gibberish.