Lawrence wrote:the one actually used for encryption is damn near impossible, which is exactly the point in public key encryption. it's like "hey, here's how you encrypt something, good luck trying to decrypt it without my key though, mwahahaha".
but we're just doing small scale RSA which still isn't very easy
I know what you mean. A few years ago the firm I worked for were doing something with secure document storage for a company mergers and acquisitions system. I understood not word one of how to implement it.