A method for decrypting encrypted data/message whereby a computing device derives the prime numbers that are used to make up a public key by searching the decimals of the inverse of the quasi-prime number that is the public key. The computing devices designates a search range around a jump point of the decimals of the inverse of the public key and searches within the search range for prime numbers by testing them against the quasi-prime. When the prime numbers are found, the computing device then uses them to derive the private key and decrypt the data.