IT Security Question|Information Systems
urgently respond to the below question with 250 words or more.
1. The RSA public-key algorithm depends on the difficulty that an attacker would have in factoring large numbers. Do some research into how numbers are factored, and what the computing time might be. Be sure to show the reference(s) that you have used.