i found this from adam back's home page that says export crypto sig
the code is :
-export-a-crypto-system-sig -RSA-3-lines-PERL
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
i not a coder or developer so asking this , what is meaning of export crypto sig
http://www.cypherspace.org/adam/rsa/The guide at
http://www.cypherspace.org/adam/rsa/rsa-details.html works for me on my MacOS:
$ cat > rsa
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
$ wc rsa
3 7 178 rsa
$ echo "squeamish ossifrage" | ./rsa -k=10001 -n=1967cb529 > msg.rsa
-i used with no filenames on the command line, reading from STDIN.
$ ./rsa -d -k=ac363601 -n=1967cb529 < msg.rsa
-i used with no filenames on the command line, reading from STDIN.
squeamish ossifrage
$
Should work just as well on any Linux system...
It encrypts the message by taking numbers modulo 6819722537 (1967cb529 in hex) to the power 65537 (10001 in hex), and decrypts by taking numbers modulo 6819722537 to the power 2889233921 (ac363601 in hex),
which gives back the original since 65537 * 2889233921 = 1 mod phi(6819722537).
Note that n=6819722537 is the product of two primes p=66593 and q=102409 and thus phi(n) = (p-1)*(q-1).
See
https://en.wikipedia.org/wiki/RSA_(cryptosystem) for details.
The seemingly odd choice of plaintext is explained in
https://en.wikipedia.org/wiki/The_Magic_Words_are_Squeamish_Ossifrage