Using public key P = (e, n) to transform messages M:
Using secret key S = (d, n) to transform ciphertext C:
Use Modular-Exponentiation:
If = O(1), Then Public Key requires O(1) modular multiplications, bit operations Secret key requires modular multiplications bit operations.