Question

Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 =...

Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 = 13·19 and e = 25.
What is her secret key and what is her signature corresponding to the message M = 63?


n=247=13 x 19
0 0
Add a comment Improve this question Transcribed image text
Answer #1

n = 247 = 13 * 19
so,
p = 13 & q = 19

\phi ( n ) = (13-1) * (19 -1) = 216

e =25

secret key is d such that

e*d = 1 mod 216

using eucledian theorem

d is multiplicative inverse of e in Z216

q r1 r2 r t1 t2 t
8 216 25 16 0 1 -8
1 25 16 9 1 -8 9
1 16 9 7 -8 9 -17
1 9 7 2 9 -17 26
3 7 2 1 -17 26 -95
2 2 1 0 26 -95 216
1 0 -95 216

t = t1 -q*t2

t1 = t2

t2 = t

value of t = -95 or (216 - 95) = 121

so d =121

where secret key = (d,n) = (121 , 247)

signature = md mod n

= 63121 mod 247 = 232

Add a comment
Know the answer?
Add Answer to:
Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 =...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e...

    Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e = 3), Alice uses this public key to encrypt a message M for Bob. The resulting ciphertext is 110. Recover the message M. (You can use online modular calculators available at the Web.)

  • Alice has the RSA public key (n, e) = (11413, 251) and private key d =...

    Alice has the RSA public key (n, e) = (11413, 251) and private key d = 1651. And Bob also has his own RSA public key (n’, e’) = (20413, 2221) and private key d’ = 6661. Alice wants to send the message 1314 to Bob with both authentication and non-repudiation. Use Maple, calculate what is the ciphertext sent by Alice. And Verify that Bob is able to recover the original plaintext 1314.

  • (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice...

    (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice uses this public key to encrypt the word “MARCH” and send the ciphertext to Bob. First, she represents this word in ASCII where the capital letters A, B, C, . . . , X, Y, Z are represented by integers 65, 66, 67, . . . , 88, 89, 90 respectively. Then she encrypts the five integers that represent M, A, R, C, H...

  • Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189)....

    Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

  • 5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...

    5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public...

  • Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustra...

    Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...

  • 6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. Wh...

    6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. What is your secret decoding key d? (a) 179 (b) 205 (c 214 (d) none of these. 6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. What is your secret decoding key d? (a) 179 (b) 205 (c 214 (d) none of these.

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT