There are even better encryption techniques that are asymmetric, that is, the keys used for encryption and decryption are not the same. |
For example, in this case, it is easier to try to factor the modulus N than to perform an exhaustive key search on all possible decryption keys. |
This in turn allows for the decryption of the individual string keys, which finally allow for decryption of individual usernames and passwords. |
The password is then used to generate the symmetric encryption key for the RSA private key, which allows for its decryption. |
Using a small decryption exponent, d, has the advantage of allowing rapid decipherment. |
Asymmetric encryption relies on two keys that work together as a pair an encryption key and a decryption key. |