Question

Discrete Structures problemSuppose we use p = 7 and q = 5 to generate keys for RSA. a) What is n ? b) What is on)? c) One choice of e is 5. What are the

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a)

n= p*q

n=7*5 = 35

b)

Phi(n) = (p-1)(q-1)

Phi(n) = (7-1)(5-1)

Phi(n)=6*4 = 24

c) public key that is e should be coprime to phi(n) and should be less than phi(n).

Choice are 5,7,11,13,17,19,23

d) as explained in above part, (e,phi(n)) should be coprime and e<phi(n).

e) if e= 5, then to calculate d, we need to satisfy following equation.

=> (e*d) mod phi(n) = 1

=> ( 5*d) mod 24 = 1

Substitute d = 5, then above equation is satisfied.

So, d is 5

f) m = 3 (plain text)

To encrypt

m^e mod n

3^5 mod 35

243 mod 35 = 33

33 is cipher text.

g)

decryption

c^d mod n

33^5 mod 35 = 3

So, we got plain text back.

Add a comment
Know the answer?
Add Answer to:
Discrete Structures problem Suppose we use p = 7 and q = 5 to generate keys...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Suppose we use p = 7 and q = 5 to generate keys for RSA. a)...

    Suppose we use p = 7 and q = 5 to generate keys for RSA. a) What is n ? ___________________ b) What is φ(n) ? _______________________ c) One choice of e is 5. What are the other choices for e? _________________________________________________________________________________   d) Explain how you got your answer for part c.   e) For the choice of e = 5 what is d? _________________________ Show work. f) Using the public key (n, e), what is the message 3 encrypted as?...

  • Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decry...

    Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message. Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message.

  • Exercise 4 Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decrypti...

    Exercise 4 Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message. Exercise 4 Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message.

  • Discrete Math 1. Use the primes P1 = 3 and P2 = 17 and the value...

    Discrete Math 1. Use the primes P1 = 3 and P2 = 17 and the value E = 3 with the RSA algorithm to compute the values below needed to get the keys: What is the value of N? What is the value of Z? What is the value of D? (ABET 5) Using the values from the problem 9) above, show how to encrypt the message, M = 44. Do NOT simplify, just show the computation needed to encrypt...

  • 5. We must assume that keys are not secure forever, and will eventually be discovered; thus...

    5. We must assume that keys are not secure forever, and will eventually be discovered; thus keys should be changed periodically. Assume Alioe sets up a RSA cryptosystem and announces N = 3403, e = 11. (a) Encrypt m = 37 using Alice's system (b) At some point. Eve discovers Alice's decryption exponent is d = 1491. Verify this (by decrypting the encrypted value of rn = 37). (c) Alice changes her encryption key to e = 31, Encrypt rn...

  • prime factorization. Assume that zoy wants to send a message to sam. sam generates public and...

    prime factorization. Assume that zoy wants to send a message to sam. sam generates public and private keys using RSA Encryption algorithm and publishes the public key (n=4717, e=19). zoy has a secret message M to send. Nobody knows the value of M. She encrypts the message M using the public key and sends the encrypted message C=1466 to sam. alex is an intruder who knows RSA and prime factorization well. She captures the encrypted message C=1466. She also has...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and...

    Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and e = 17. Please find a private key d which ed = 1 (mod 40) (40 = (11-1)(5-1)) 2) From the previous problem, suppose we have a message "one" (Letter A to Z are coded as 00 to 25), what will be the ciphered message? 3)Rewrite the classic Binary Search method as a Recursive Function (just the pseudocode.) 4)Deduce that, if A ⊆ B,...

  • your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and...

    your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...

  • just need help with part c key and public key cryptography methods 2. (a) Explain the...

    just need help with part c key and public key cryptography methods 2. (a) Explain the difference between the symmetric (b) In the famou s RSA algorithm for public key cryptography, very large prime numbers are used so as to make ult for the attackers to find from their product the prime factors. However, for an illustration of the ideas behind the RSA algorithm, you could chooses two small prime numbers 7 and 11, and a public key e 13...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT