0

Consider 2 users have a common public key component $N$ in standard textbook RSA encryption. The 2 parties have their respective keys $(e_1,d_1)$, $(e_2,d_2)$ respectively. How can user $2$ decrypt the ciphertext $c$ encrypted to user 1? Please explain how the attack works.

Crypto_Research
  • 719
  • 3
  • 10

0 Answers0