In Simmons and Norris paper they demonstrate the cycling attack with the following example:
p = 383 q = 563 s = 49 and t = 56957 ( a prime)
The attacker knows the publicly available r = pq = 215,629 , s = 49 and an encrypted message C. By forming C1 = C49 , C2 = C149, etc. He will find Cj = C for 1,2,5 or 10
I do not understand how they figured out they will have M = Cj-1 in at most 10 steps? They do mention that 49 belongs to the exponent 10 mod φ(r) = 214,684 but I am not sure what that means. Could anyone explain? please. Thank you!