RSA encryption: implementation and attacks