Question

Someone sends you a message of "9". They also send you a copy of their message...

Someone sends you a message of "9". They also send you a copy of their message encrypted with their private key. The "signed", or encrypted copy is "4". Their public key is (exponent 23, clock 55), Show how to authenticate that the message is from them

0 0
Add a comment Improve this question Transcribed image text
Answer #1

This question can be answered using the basics of Public-Key Cryptography.

Someone sent you a mesage, "9". This can be treated as the plaintext.

Then, they sent you the "signed" or "encrypted" copy "4". This can be treated as the cipher text generated by encrypting with their private key.

Remember, you do not have access to their private key, but you have the access to their public key.

As given in the question, their public key is (exponent 23, clock 55).

We need to authenticate that the message is from them. For doing so, we need to check by converting the ciphertext (4) into plaintext (9).

Given plaintext = 9.

Using the standard public key encryption formulae, we know that

Ciphertext = Plaintext public encrypt exponent (mod n)

Here, Paintext = 9, public encrypt exponent = 23, and clock = n = 55, given.

Thus Ciphertext = 923 mod 55

which upon calculation, comes out to be 8862938119652501095929 mod 55.

Hence, you can clearly see the mod function upon input 55 and 923 will generate the output as 4, since 4 will be the common remainder when 923 is divided by 55.

Hence, till now, we have verified that the plaintext 9 when encrypted using the key details given in question, matches with the Ciphertext we have received. This is an indicator of authenticity.

Further, we can decrypt the signed copy that we have received, by applying the following formula:

Plaintext = Ciphertext exponent mod n

where ciphertext = 4, exponent = 23, n = clock = 55.

Hence, plaintext = 423 mod 55.

which upon calculation results into 70368744177664 mod 55.

Which clearly indicates that 423 upon division by 55 will leave a remainder in terms of 9.

Hence, the Plaintext evaluates to 9.

The commonly agreed public key perfectly interconverts the message and the signed copy.

By the above two comparisions, we can be sure about the authenticity of the two messages, one being the plaintext 9 and other being the signed text 4, and hence can be sure about the fact that 9 and 4 are from the same source.

Add a comment
Know the answer?
Add Answer to:
Someone sends you a message of "9". They also send you a copy of their message...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • prime factorization. Assume that zoy wants to send a message to sam. sam generates public and...

    prime factorization. Assume that zoy wants to send a message to sam. sam generates public and private keys using RSA Encryption algorithm and publishes the public key (n=4717, e=19). zoy has a secret message M to send. Nobody knows the value of M. She encrypts the message M using the public key and sends the encrypted message C=1466 to sam. alex is an intruder who knows RSA and prime factorization well. She captures the encrypted message C=1466. She also has...

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

  • Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings...

    Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...

  • 1. Create an RSA private key 2. Output the key in a text format so that it shows the following:     modulus     public e...

    1. Create an RSA private key 2. Output the key in a text format so that it shows the following:     modulus     public exponent (e)     private exponent (d)     the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...

  • Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted...

    Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted message from a socket client to a socket server. The message will be encrypted using AES symmetric encryption algorithm in the client. The server receives this ciphertext and decrypt it using the same symmetric key. Before communication over symmetric encryption, you need to first securely distribute the symmetric key between sender and receiver. You can use asymmetric encryption to help distribute the symmetric key. The...

  • Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...

    Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture. Question 11 options: 160 X 10 ^9 160 X 10^36 160 X 10^72 160 X 10^18 Question 12 (1 point) PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the...

  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and...

    your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT