1.Lets assume the two keys of alice and bob be p and q respectively
P=77, q=13
Now according to RSA algorithm
N=p*q = 77*13 = 1001
φ = (p-1)(q-1) = 76*12 = 912
Now we choose an integer e such that 1 < e < φ(n) and e and φ (n) are coprime. Let e =11
Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 83
[( 83* 11) % 912 = 1]
Public key is (e, n) => (11,1001)
2.Private key is (d, n) => (83, 1001)
3.Compare of results for bob and alice
The encryption of m = 29 is c = 29^11 % 1001 = 679
The decryption of c = 679 is m = 679^77 % 1001 = 29
Please note it is possible solution for RSA algorithm .However there can be multiple solution existing
This question tests your knowledge of encryption and decryption using the RSA method. the numbers in...
5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....
Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...
o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...
2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she decides to set-up her own public key as follows. She chooses the primes p=563 and q = 383, so that the modulus is N = 21 5629. She also chooses the encryption key e-49. She posts the num- bers N = 215629 and e-49 to her website. Bob, who is in love with Alice, desires to send her messages every hour. To do so,...