Now this program can fit into three lines of code,
Using perl and dc, though the logic's distorted.
Cryptographic machines are a weapon of war,
And the government says they must not be exported.
Make a barcoded card, or if you are a bard
run the code through a modem, it's not very hard.
Now, if I were being mean I'd stick some modem tones in here}}
Then this song would be a munition, its music you could never take
From the land of the free, and the home of the brave.
The description of the RSA public key crpytography algorithm is mathematically
accurate; though it's worth noting that any practical implementation will do
the exponentiation and modules in a single operation. Perhaps the only
obscure point occurs when specifying that $de \equiv 1 \bmod (p-1)(q-1)$. The
twisted phraseology that defines $k$ as $(p-1)(q-1)$ is particularly kludgy,
but what the hell, it scans.