SOLUTION-
Digital signature -
S= h(m)d mod n
Given, message (m) = 19
Public key<3,33>
Private key<7,33>
d=7 , n=33
=>197 mod 33
=> 893871739 mod 33
=> 13
Digital signature = 13
IF YOU HAVE ANY DOUBT PLEASE COMMENT DOWN BELOW I
WILL SOLVE IT FOR YOU:)
----------------PLEASE RATE THE ANSWER-----------THANK
YOU!!!!!!!!----------
QUESTION 5 Assume Alice's public key is 3,33>, and her private key is 7,33>. She wants...
5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....
Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...
prime factorization. Assume that zoy wants to send a message to sam. sam generates public and private keys using RSA Encryption algorithm and publishes the public key (n=4717, e=19). zoy has a secret message M to send. Nobody knows the value of M. She encrypts the message M using the public key and sends the encrypted message C=1466 to sam. alex is an intruder who knows RSA and prime factorization well. She captures the encrypted message C=1466. She also has...
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Question 4 (5 points) Consider the following scenario: Alice wants to send Bill a message. Alice encrypts some information using Bill's public key; Bill decrypts the ciphertext using his private key. This is an example of: Question 4 options: 1) symmetric encryption 2) digital certificate 3) asymmetric encryption 4) digital signature
QUESTION 1 Bob has received Alice's public key. Which one of the following is NOT a step that Bob must take to process her key? O 1. Sign the key 2. Import the key into the WinPT Key Manager 3. Enter his e-mail address O 4. Verify the fingerprint for the key QUESTION 2 Bob has just installed GPG for his operating system. Which one of the following items O 1. His email address O 2. The email address of...
Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 = 13·19 and e = 25. What is her secret key and what is her signature corresponding to the message M = 63? n=247=13 x 19
In the use of asymmetric keys (use of private-public key pairs). If a service wants to ensure it is no longer their concern (after encryption) that a message would be intercepted what key would they use?
1. Create an RSA private key 2. Output the key in a text format so that it shows the following: modulus public exponent (e) private exponent (d) the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...