Using a small decryption exponent, d, has the advantage of allowing rapid decipherment. |
This in turn allows for the decryption of the individual string keys, which finally allow for decryption of individual usernames and passwords. |
The security module authorizes these programs for decryption. |
There are even better encryption techniques that are asymmetric, that is, the keys used for encryption and decryption are not the same. |
The password is then used to generate the symmetric encryption key for the RSA private key, which allows for its decryption. |
Now anyone can use your public key to encrypt email messages to you, but only you alone can use your private key for decryption. |