Question

Suppose that Paul wants to use the public RSA value n = 185 and the private key d = 55. What is the value of the public key?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER! h = 185 = 37x5 = p xq b=37, q=5 d=55 We Need to find Know that e*d = 1 hod (6-1) (a-l e=ď mod (6-1) (9-1) :-) = 55 mo

Add a comment
Know the answer?
Add Answer to:
Suppose that Paul wants to use the public RSA value n = 185 and the private...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Bob wants to use the pair (1,143) as an RSA public key. Determine the value of...

    Bob wants to use the pair (1,143) as an RSA public key. Determine the value of the private key.Encrypt a message M=57. What does this tell you about the security of this public key?

  • Alice has the RSA public key (n, e) = (11413, 251) and private key d =...

    Alice has the RSA public key (n, e) = (11413, 251) and private key d = 1651. And Bob also has his own RSA public key (n’, e’) = (20413, 2221) and private key d’ = 6661. Alice wants to send the message 1314 to Bob with both authentication and non-repudiation. Use Maple, calculate what is the ciphertext sent by Alice. And Verify that Bob is able to recover the original plaintext 1314.

  • Suppose that Marie publishes the following public RSA values n = 33 and e = 7....

    Suppose that Marie publishes the following public RSA values n = 33 and e = 7. What is the value of the private key?

  • p=3, q=7 Suppose that Bob wants to create an example of an RSA public-key cryptosystem by using the two primes p ??? an...

    p=3, q=7 Suppose that Bob wants to create an example of an RSA public-key cryptosystem by using the two primes p ??? and q ???. He chooses public encryption key e He was further supposed to compute the private decryption key d such that ed 1 mod A(pq)). However, he confuses A and and computes instead d' such that ed' =1 (mod P(pq)). (i) Prove that d' works as a decryption key, even though it is not necessarily the same...

  • Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and...

    Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and e = 17. Please find a private key d which ed = 1 (mod 40) (40 = (11-1)(5-1)) 2) From the previous problem, suppose we have a message "one" (Letter A to Z are coded as 00 to 25), what will be the ciphered message? 3)Rewrite the classic Binary Search method as a Recursive Function (just the pseudocode.) 4)Deduce that, if A ⊆ B,...

  • Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189)....

    Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...

  • 4. Suppose Alec wishes to communicate with Diego, who is using RSA with a public key...

    4. Suppose Alec wishes to communicate with Diego, who is using RSA with a public key (e, n) and corresponding private key d. Alec takes his message m and sends c m mod n to Diego. Unfortunately, Eve is able to intercept Alec's message, modifying it to instead send d'c() mod n for some (secret) r that Eve chooses. (a) Diego receives Alec's tampered ciphertext d' and tries to decrypt it using his private key d. What is the resulting...

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

  • If a public key has the value (e, n)-(13,77) (a) what is the totient of n,...

    If a public key has the value (e, n)-(13,77) (a) what is the totient of n, or (n)? (b) Based on the answer from part (a), what is the value of the private key d? (Hint: Remember that d * e-1 mod (n), and that d < ф(n)) You may use an exhaustive search or the Modified Euclidean Algorithm for this. Show all steps performed. For both (c) and (d), use the Modular Power Algorithm, showing all steps along the...

  • Suppose that you are computing an RSA key pair.   (Marks 6)        What are ? and ?...

    Suppose that you are computing an RSA key pair.   (Marks 6)        What are ? and ? and ?(?) for an ? = 51?        Find a legal RSA public key pair for this ? and ?.        How many possible values for ?? are there? In a RSA cryptosystem, a person Renee uses two prime numbers p = 13        and q = 17 to generate her public and private keys. If the public key of       Renee is 35, then the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT