Configure and click Process to see results
RSA keys are generated by selecting two large prime numbers and computing their product (modulus). The public key consists of the modulus and public exponent (typically 65537), while the private key includes the modulus and private exponent derived from the primes.
Encryption: Uses the public key to transform plaintext into ciphertext. The mathematical operation ensures that only the corresponding private key can decrypt the message.
Decryption: Uses the private key to recover the original plaintext from ciphertext. The asymmetric nature ensures secure communication without pre-shared secrets.
Encrypt email contents or attachments using recipient's public key. Only they can decrypt with their private key.
Securely exchange symmetric keys (AES, DES) over insecure channels by encrypting them with RSA.
Sign documents by encrypting a hash with your private key. Others verify with your public key.
RSA keys are embedded in X.509 certificates used for HTTPS and secure connections.
Your keys and messages are processed in-session only. We don't log, store, or transmit your cryptographic data to third parties.
Built on standard Java Cryptography Architecture (JCA) using well-tested RSA implementations. No proprietary or unverified algorithms.
Designed for learning, testing, and development. Perfect for understanding RSA concepts, cipher modes, and cryptographic operations.
Part of 8gwifi.org's suite of cryptography tools, serving developers and security professionals since 2017.
About the Developer: This tool is developed and maintained by Anish Nath, a Security Engineer with expertise in cryptography, PKI, and secure application development. Anish has created multiple open-source security tools and regularly publishes technical content on cryptographic implementations.
Connect: Twitter |
Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.