Cryptanalysis of the RSA Algorithm Under a System Distributed Using SBC Devices

Computer security in cryptography context has become a career starring those who publish and protect information and who try to access it for some purpose, which occurs from the first cryptographic techniques dating from the fifth century BC. This situation is now reflected in the implementation of increasingly complex encryption techniques to the point of establishing algorithms that are not yet available to be deciphered.