Categories:
Android (13)
Apple Mac (27)
DH Keys (39)
DSA Keys (83)
EC Keys (2483)
Firefox (39)
General (10)
Google Chrome (49)
Intermediate CA (152)
Java VM (29)
JDK Keytool (28)
Microsoft CertUtil (29)
Microsoft Edge (9)
Mozilla CertUtil (21)
OpenSSL (236)
Other (7)
Portecle (38)
Publishers (6653)
Revoked Certificates (16)
Root CA (85)
RSA Keys (5357)
Tools (46)
Tutorial (1)
What Is (22)
Windows (127)
Collections:
Other Resources:
OpenSSL "rsa -text" - Print RSA Key in Text
How to print RSA private key contents in text format using OpenSSL "rsa" command?
✍: FYIcenter.com
If you want to see contents of an RSA private key in text format, you can use the OpenSSL "rsa -text" command as shown below:
C:\Users\fyicenter>\local\openssl\openssl.exe OpenSSL> rsa -in my_rsa.key -text -noout Private-Key: (2048 bit) modulus: 00:c7:54:90:53:51:9f:b0:13:41:e9:75:36:9e:aa: f0:20:79:b5:22:65:cf:01:cb:08:9d:03:5f:84:57: 29:ce:99:2e:dc:a9:a6:d0:ba:43:64:5d:68:aa:4a: 8b:34:b9:61:d2:a5:48:22:57:ee:30:d9:d5:34:b0: 28:cd:b5:1b:68:96:a5:15:47:52:18:f0:15:97:b8: c5:45:9c:69:0d:a8:be:77:85:36:c1:ed:78:30:ed: e4:4f:0c:bb:1f:76:5e:44:ac:d6:92:52:f6:14:27: 8a:a3:67:36:d2:0c:c5:39:fc:5d:78:fc:12:c7:d9: 41:4f:b7:9f:14:d7:39:34:74:4f:74:f6:cf:fd:ed: 59:c7:55:6a:07:cc:00:29:38:11:c1:a7:d0:98:57: d8:51:b6:e4:d8:27:39:7e:d6:7c:ca:15:9c:e3:7f: b6:a9:6c:e1:5a:6e:88:83:c9:27:6d:aa:4f:2c:c3: f0:e9:b1:73:c0:3f:9c:93:ee:9d:ef:36:c2:1b:ef: 8d:ac:1b:97:1f:ce:7c:88:32:5f:cc:b8:2b:c2:27: 3b:7d:6d:1c:46:21:7e:c8:1a:62:4e:60:30:e8:6f: 47:1f:40:90:bb:c1:cd:06:03:1f:5d:92:2e:62:36: 44:47:83:0e:6e:6a:92:1a:24:53:c8:df:66:10:5b: 52:5b publicExponent: 65537 (0x10001) privateExponent: 00:9c:03:6d:1f:39:90:d2:40:90:63:48:d1:e2:68: 8a:9f:f0:82:bc:94:90:ec:a7:5c:6b:80:7b:5f:5a: d5:a7:15:b0:5f:18:0e:2f:ea:c9:da:a1:5d:cd:83: a0:e7:38:7d:ff:60:4c:50:4d:20:6a:6d:e4:f9:63: 33:dc:a5:f6:f8:ea:87:f5:5a:a8:40:4a:91:ab:f9: fb:b5:9b:51:82:56:64:15:aa:57:8c:7b:f0:89:e3: 78:c2:02:85:e7:7f:3f:13:63:70:62:80:ba:88:55: d6:a6:44:9f:dc:d2:10:00:6d:ad:3f:87:94:af:85: 35:20:4e:e9:1d:67:c3:27:70:cc:1d:f5:75:dc:ca: 42:5d:b0:cd:09:7b:d4:a4:ec:fd:95:a8:9f:4b:d3: 00:34:c3:12:64:fb:35:20:08:b4:40:ea:b6:ce:6a: eb:6a:be:a8:38:34:7e:82:df:b9:ef:5b:a6:32:94: b6:ee:12:52:ab:9e:6a:7e:d7:c6:84:53:ec:30:04: f8:7b:91:7f:dd:c0:f7:b9:f0:0d:bc:b5:9d:85:1d: e1:c2:cb:40:85:a0:0d:b2:9d:de:12:f5:e4:c9:1c: bf:7a:26:71:03:a0:e8:77:11:77:fc:2f:36:be:93: ab:03:0e:5d:4f:47:36:4b:1a:bb:e9:dc:87:8e:cc: ce:61 prime1: 00:e6:3d:cd:6d:77:84:8e:c0:20:d8:68:2d:80:e2: 4d:42:88:c0:40:c1:74:0a:e1:1c:53:e0:85:5c:b2: 3a:7e:11:34:2f:63:3b:32:ca:06:c3:f8:d8:96:8e: 61:f3:1f:26:8f:1c:5a:cc:04:32:a0:86:d0:ff:00: a6:74:61:92:d0:ad:bd:50:ac:fe:a5:e8:9c:2e:fe: 4c:c7:9f:4e:d3:3e:bc:a9:e7:09:f5:89:28:ed:8c: bc:8a:4f:b9:b6:53:d8:55:5c:a4:a5:61:35:e5:32: 5d:44:4b:87:55:0e:f1:3c:cd:05:35:c7:52:64:b2: 0d:e0:bf:2b:76:f9:f6:9d:2b prime2: 00:dd:a1:74:e0:2c:f6:f6:a8:4e:3b:8a:b4:1f:14: eb:fc:17:3d:af:f2:96:44:26:99:85:be:2d:06:14: d9:e6:11:e0:28:0f:29:f3:43:3c:ff:09:c6:6b:ef: 79:13:bd:e0:06:b8:cb:31:d4:1b:3d:bc:ac:53:51: 1a:73:49:34:86:f9:28:59:5f:06:72:62:7a:1e:03: 27:28:cf:6a:05:fa:52:da:72:e9:be:b8:c6:9f:94: f8:f5:1c:8f:5a:5e:c3:07:95:d0:05:98:3b:81:18: f4:61:39:29:ee:7d:f6:9f:2b:1c:ab:76:9d:e5:7a: 7d:08:af:ef:ec:ef:50:67:91 exponent1: 7e:b7:42:e9:5d:5f:0a:45:b9:8e:01:00:12:2f:fa: 7f:84:cd:f2:95:c5:ec:fa:e9:e1:4b:ef:7a:0d:e9: 5d:5a:d0:92:c8:15:5b:a5:8e:c5:aa:9e:61:76:29: 78:6a:0b:89:b5:fc:4e:ce:7c:a2:96:b0:4d:b8:28: e4:62:93:2f:e0:7f:11:f8:b4:09:d1:94:ab:d4:6f: a3:6a:0d:32:fc:13:4f:9b:05:83:2a:22:e9:62:8c: 9d:be:b5:22:20:d1:2e:61:d7:87:e1:91:8c:fc:04: 12:c3:52:cf:40:73:0a:98:77:a6:9a:75:c1:4f:b1: 8d:a1:09:25:e8:fa:8e:93 exponent2: 19:76:f5:a0:d4:49:c3:e9:6e:a3:b4:ba:21:60:1c: 05:28:fe:73:7a:e1:fd:0e:9a:51:1d:9a:ba:ba:26: 97:22:b2:a8:a7:a5:60:47:f7:78:2e:3d:58:25:79: b9:e4:f5:1a:90:9c:f8:2a:b0:be:95:31:0f:99:9f: fa:63:0c:df:fd:3c:bf:98:05:7b:9b:09:00:ed:c7: d0:0e:94:d5:fe:ff:0a:0e:6e:00:f5:e6:0c:6b:e7: 76:f2:43:1e:55:08:ff:94:1d:04:a7:8b:1e:b8:29: 4c:0a:6f:60:f1:a4:26:81:a3:97:a7:d7:58:88:8c: 59:35:2d:d2:01:65:31:a1 coefficient: 4a:72:e8:f6:9a:47:4d:ee:ee:70:92:3f:8f:e9:37: 68:c6:83:c5:0d:dd:d1:7d:1c:68:ae:19:c6:2e:29: 44:91:a8:50:aa:34:f7:d8:a7:9d:53:78:22:6d:b3: 8e:b3:f1:ee:96:f4:f2:67:a6:8f:9c:15:f5:95:65: 59:8c:5c:18:e6:de:5b:8f:30:71:79:c2:83:34:0d: c6:42:86:90:bb:15:eb:a9:db:f6:1c:33:8d:25:b9: fa:84:c2:39:bb:6a:dd:35:f0:20:97:34:41:cb:07: 4a:89:82:03:bd:a4:8e:ed:f7:43:51:53:73:48:9d: 8b:42:c6:7d:0f:08:d1:4a
This test tells us that an RSA key (private key and public key pair) is made of:
modulus, also called n: The modulus part of the private key and the public key publicExponent, also called e: The exponent part of the public key privateExponent, also called d: The exponent part of the private key prime1, also called p: The first prime number prime2, also called q: The second prime number coefficient, also called qInv (Inverse of q): qInv * q mod p = 1 exponent1, also called dp: d mod (p-1) exponent2, also called dq: d mod (q-1)
Options used in this command are:
⇒ OpenSSL "rsa -pubout" - Extract RSA Public Key
⇐ OpenSSL "rsa" Command Options
2024-01-12, 15627🔥, 1💬
Popular Posts:
What can I use OpenSSL "ca" command for? What are options supported by the "ca" command? OpenSSL "ca...
Do you want to learn how to manage certificates in IE (Internet Explorer) 8? Here is a collection of...
How to convert a certificate file in DER (Distinguished Encoding Rules) format to PEM (Privacy Enhan...
Certificate Summary: Subject: Certification Authority of WoSign Issuer: StartCom Certification Autho...
What is PKCS (Public-Key Cryptography Standards) #7? What is it used for? PKCS (Public-Key Cryptogra...