DA-Op3n ca interface
crypto fun



Login
Flag user key as compromised
User keys may be compromised, so if you know that a key has been compromised, you can lock the key-based login with this key until a new key has been set. In order to prove the compromise, you have to provide the factorization of the public key modulus. Just provide the factors in decimal each on its own row. For example, for the following key:
-----BEGIN PUBLIC KEY-----
MCAwDQYJKoZIhvcNAQEBBQADDwAwDAIFAMO/MykCAwEAAQ==
-----END PUBLIC KEY-----
provide the primes as
58679
55967
Syntactic sugar causes cancer of the semicolon. Alan J. Perlis