A common means of modern encryption is a one-way system in which encryption is easy but decryption is computationally impractical. |
More recent viruses and blended threats also extract passwords, decryption keys and logged keystrokes. |
This in turn allows for the decryption of the individual string keys, which finally allow for decryption of individual usernames and passwords. |
There are even better encryption techniques that are asymmetric, that is, the keys used for encryption and decryption are not the same. |
For example, in this case, it is easier to try to factor the modulus N than to perform an exhaustive key search on all possible decryption keys. |
The password is then used to generate the symmetric encryption key for the RSA private key, which allows for its decryption. |